Skip to content

News from the code monkey

533,000 visitors
33,000 Potential Hacks
1.03M Pages Delivered over all

Whether that’s good or bad I don’t know. But that appears to be what this blog has done this year. Not bad for what I regard as the regulars’ corner of a decent pub – where fat gets chewed and grumbles made among sensible people.

0 0 votes
Article Rating
Subscribe
Notify of
guest

9 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Grist
Grist
10 months ago

Good analogy, no Babycham drinkers allowed!!!

The Meissen Bison
The Meissen Bison
10 months ago

33,000 Potential Hacks

Essential reading for guardian scribblers, clearly.

BraveFart
BraveFart
10 months ago

“Not bad for what I regard as the regulars’ corner of a decent pub – where fat gets chewed and grumbles made among sensible people.”

The sort of decent pub from which the likes of cvnts like Murphy have been banned for being thick, arrogant @rseholes

Steve
Steve
10 months ago

Code Monkey not crazy,
Just proud

john77
john77
10 months ago

I haven’t been counting my potential hacks but I’m quite sure it’s a smallish fraction of 90 per day. So you seem to be a target for ill-wishers as well as the ubiquitous scammers (for pendants, ubiquitous may not be precisely accurate but there are dozens of different country codes on their email addresses so it is reasonably descriptive).
That sort of behaviour tends to fuel conspiracy theories and it would really suit the Guardianistas if they could claim that we were falling for conspiracy theories …

Tractor Gent
Tractor Gent
10 months ago

Checking my firewall logs I drop about 100k packets per week. The majority of them are connection attempts to closed ports on my firewall. They are obvious hacking attempts going nowhere and are the background traffic noise we put up with on the Net. I expect though with a live webserver running the blog the hack attempts are a bit more sophisticated, e.g. trying to fill the page with porn/left-wing insults/trojans/419s etc.

I used to have a random open port mapped to secure shell on an internal server. It was my route in before I deployed a VPN. For a long time it was quiet but it then started to go bonkers with connection attempts, perhaps because script-kiddy scanners became a bit more sophisticated. If I re-open any port mapped to ssh, it rapidly attracts lots of connection attempts using a vast variety of userids as well as the usual root, admin, etc.

Andyf
Andyf
10 months ago

With Tim the landlord steering the topics to grumble over.,,,

johnnybonk
johnnybonk
10 months ago

I’ve been here most days for about 15 years, don’t usually say much but usually here.

Raffles
Raffles
10 months ago

@johnnybonk. Me too. Found Tim on The Register & been reading his stuff here ever since.

Can you help support The Blog? If you can spare a few pounds you can donate to our fundraising campaign below. All donations are greatly appreciated and go towards our server, security and software costs. 25,000 people per day read our sites and every penny goes towards our fight against for independent journalism. We don't take a wage and do what we do because we enjoy it and hope our readers enjoy it too.
9
0
Would love your thoughts, please comment.x
()
x