ورود

توجه ! این یک نسخه آرشیو شده میباشد و در این حالت شما عکسی را مشاهده نمیکنید برای مشاهده کامل متن و عکسها بر روی لینک مقابل کلیک کنید : بلاک شدن آی پی توسط spamhus



jenatmilad
May 14th, 2013, 10:24
سلام.دوستان آی پی سرور بنده توسط spamhus و یاهو بلاک شده. ایمیل ارسال نمیشه
چه کاری باید انجام بدم؟

46.4.50.3

shingo
May 14th, 2013, 10:29
The IP address 46.4.50.3 corresponds to a web site that is infected with a spam or malware forwarding link.
The website's host name is "parsangroup.com", and this link is an example of the redirect: "http://parsangroup.com/bb.html".
In other words the website "parsangroup.com" has been hacked.
The web site "parsangroup.com" may not be familiar to you. This means that another customer of your provider is hosting their web site on the same IP address as you. In that case, you really need to get your provider to assist you.
Usually, the redirect takes the user's browser to a spam or malware site. It's usually fake russian pills or pornography.
Usually, the infection is a Cpanel, Plesk, Joomla or Wordpress CMS install that has become infected either through a vulnerability (meaning the CMS software is out of date and needs patching), or the owner of "parsangroup.com" has had their account information (userids/passwords) compromised. Then malicious software/files are being uploaded by ftp or ssl.
It is often simplest to disable or suspend the web site (meaning you can delist the IP to resolve your CBL listing issues) and then deal with the problem in a somewhat more leisurely/less-urgent fashion.
In many cases, particularly with older compromises, the criminals that hacked this site will have uploaded a wide variety of spamming and other compromise tools. Therefore, the account corresponding to "parsangroup.com" needs to be examined very carefully for signs of tampering. Further, the criminal will even modify existing web pages (particularly پارسان گروپ (http://parsangroup.com) itself) to have hidden references to pill/drug/porn sites. If you're not completely certain that you've removed all traces of the compromise, we strongly recommend reinstalling the site from scratch.
Furthermore, the site's passwords MUST be changed, and the customer should run anti-virus scanners on their own personal computers immediately to try to find and remove any keystroke loggers.
We believe that the malicious redirects are done by altering web server access control mechanisms (example, ".htaccess" files on Apache web servers), and causing the redirect to occur on all "404 url not found" errors. We would appreciate it if you can give us copies of the modifications that this infection has made to your system.
If you do not recognize the hostname "parsangroup.com" as belonging to you, it means that some other account on this shared hosting site has been compromised, and there is NOTHING you (or we) can do to fix the infection. Only the administrator of this machine or the owner of "parsangroup.com" can fix it.

click-server
May 14th, 2013, 10:33
با سلام
به این لینک برید ببینید کمکی میکنه
Blocklist Removal Center - The Spamhaus Project (http://www.spamhaus.org/lookup/)

click-server
May 14th, 2013, 10:34
و این لینک دوم که اطلاعات آِ پی رو وارد کن تا اصلاح بشه .
The Spamhaus Project - PBL (http://www.spamhaus.org/pbl/removal/)
موفق باسید

jenatmilad
May 14th, 2013, 10:38
رفتم.فقط توضیح داده فلان لینک با این مشخصات این کار رو کرده.اما نگفته واسه رفعش چیکار کنم :106:

هاست 97
May 14th, 2013, 10:40
احتمالا ابیوز آن هم بهتون میرسه که باید مسدود کنید
پس از مسدود سازی باز میکنن

jenatmilad
May 14th, 2013, 10:43
والا ابیوزش هم اومد. انجام دادم. 72 ساعت گذشته. جوابی هم نیومد.

click-server
May 14th, 2013, 10:51
با سلام شما این رو تکمیل کردین لینک دووم رو میگم این عکس لین دوم هست .
13070

jenatmilad
May 14th, 2013, 10:53
نه این نبود. لطف کنید لینکش رو بدید. تست کنیم.

jenatmilad
May 16th, 2013, 12:52
دوستان هنوز مشکل من رفع نشده :106::63::((

چیکار کنم؟