xtream codes v3= xtream creed
attack on many servers today to enforce us to convert to the new panel
attack on many servers today to enforce us to convert to the new panel
With
+23k members
+11k threads
+106k posts
we are the most popular IPTV community on the web.
IMPORTANT NOTE:
WE HAVE RECENTLY NOTICED THAT TOO MANY DOUBLE FAKE ACCOUNTS ARE CREATED IN THE PAST.
TO PREVENT THIS ISSUE THE DECISION WAS MADE THAT IN THE FUTURE A ANNUALLY FEE 20 EURO WILL BE RAISED FOR NEW MEMBERSHIPS.
Join now to the World of IPTV
oke and wich one they are many !!!Just follow GTA and the details he gives on security and updates ,
Channels | MatchTime Unblock CDN | Offshore Server | Contact |
100 cnx / 90€ | 5Gbps / 180€ | 48CPU-256GRAM 10Gbps 569€ | Skype live:giefsl |
500 cnx / 350€ | 10Gbps / 350€ | 48CPU-128GRAM 5Gbps / 349€ | TG @changglobize |
1000 cnx / 500€ | 20Gbps / 700€ | 40CPU-128GRAM 20Gbps / €980 | http://coronaserver.com |
Theres alot more panels to choose from other than streamcreed very much doubt they had anything to do with it with all the bad publicity they are getting for being accused of the hack ...xtream codes v3= xtream creed
attack on many servers today to enforce us to convert to the new panel
exactly, no life indeedBecause they have no life lol
Channels | MatchTime Unblock CDN | Offshore Server | Contact |
100 cnx / 90€ | 5Gbps / 180€ | 48CPU-256GRAM 10Gbps 569€ | Skype live:giefsl |
500 cnx / 350€ | 10Gbps / 350€ | 48CPU-128GRAM 5Gbps / 349€ | TG @changglobize |
1000 cnx / 500€ | 20Gbps / 700€ | 40CPU-128GRAM 20Gbps / €980 | http://coronaserver.com |
I have cleaned my servers in the following way,
first i removed /bin/bash from /etc/passwd on xtreamcodes user (/bin/false should be there)
I removed the phpfpm php file and created a new file with same name and chattr +ia it
same I did for start_services and /tmp/ui.php
then I have removed the admin folder and put the latest version on the box
for now it looks ok
I havent formatted my machines
Channels | MatchTime Unblock CDN | Offshore Server | Contact |
100 cnx / 90€ | 5Gbps / 180€ | 48CPU-256GRAM 10Gbps 569€ | Skype live:giefsl |
500 cnx / 350€ | 10Gbps / 350€ | 48CPU-128GRAM 5Gbps / 349€ | TG @changglobize |
1000 cnx / 500€ | 20Gbps / 700€ | 40CPU-128GRAM 20Gbps / €980 | http://coronaserver.com |
Why post with no wording or explanation
Why post with no wording or explanation
Channels | MatchTime Unblock CDN | Offshore Server | Contact |
100 cnx / 90€ | 5Gbps / 180€ | 48CPU-256GRAM 10Gbps 569€ | Skype live:giefsl |
500 cnx / 350€ | 10Gbps / 350€ | 48CPU-128GRAM 5Gbps / 349€ | TG @changglobize |
1000 cnx / 500€ | 20Gbps / 700€ | 40CPU-128GRAM 20Gbps / €980 | http://coronaserver.com |
We as G.P.I. claim the attacks on different panels. We managed to hack not only Xtream UI but also other panels. We do this because there is unfairness in the IPTV Buisness. There are big players who think they rule the world. We ensure that your panels and the panels of your users become unusable. The world has no borders let alone the digital world. We will take you down one by one until this game is played fair again. We are a legion, we do not forgive and we do not forget.Anyone translated it yet?
Channels | MatchTime Unblock CDN | Offshore Server | Contact |
100 cnx / 90€ | 5Gbps / 180€ | 48CPU-256GRAM 10Gbps 569€ | Skype live:giefsl |
500 cnx / 350€ | 10Gbps / 350€ | 48CPU-128GRAM 5Gbps / 349€ | TG @changglobize |
1000 cnx / 500€ | 20Gbps / 700€ | 40CPU-128GRAM 20Gbps / €980 | http://coronaserver.com |
yes officialBig question was your install the official repo
server {
listen 8447 ssl;ssl_certificate server.crt;ssl_certificate_key server.key; ssl_protocols SSLv3 TLSv1.1 TLSv1.2; #use ssl port 2053, 2083,2097,8447
index index.php index.html index.htm;
root /home/xtreamcodes/iptv_xtream_codes/admin/;
server_name YOURDNS;
if ($host != "YOURDNS") {
return 404;
}
location ~ \.php$ {
limit_req zone=one burst=8;
try_files $uri =404;
fastcgi_index index.php;
fastcgi_pass php;
include fastcgi_params;
fastcgi_buffering on;
fastcgi_buffers 96 32k;
fastcgi_buffer_size 32k;
fastcgi_max_temp_file_size 0;
fastcgi_keep_conn on;
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
fastcgi_param SCRIPT_NAME $fastcgi_script_name;
}
}
Channels | MatchTime Unblock CDN | Offshore Server | Contact |
100 cnx / 90€ | 5Gbps / 180€ | 48CPU-256GRAM 10Gbps 569€ | Skype live:giefsl |
500 cnx / 350€ | 10Gbps / 350€ | 48CPU-128GRAM 5Gbps / 349€ | TG @changglobize |
1000 cnx / 500€ | 20Gbps / 700€ | 40CPU-128GRAM 20Gbps / €980 | http://coronaserver.com |
So much talk and no one said anything that could solve the problem for good.
Don't use default ports. That's the first thing with security.
Ssh default port its 22. Change it to a 4 or 5 digit random.
They can find it with a scanner but it will make things harder.
Change default panel ports.
Common used ports are easy to find and use to attack.
To make things harder block Ssh for the server. Make it usable only on a VPN session. Or only to or ip. Block everything else on Ssh port to your ip. That's it. These are the "fixes" that I recommend.
We know, ad-blocking software do a great job at blocking ads. But our site is sponsored by advertising.
For the best possible site experience please take a moment to disable your AdBlocker.
You can create a Account with us or if you already have account, you can prefer an Account Upgrade.