Login: GUEST @ JH4XSY.14.JNET1.JPN.AS [Tsuchiura]
home | newest check | boards | help index | log | ps | userlogin | send sysop | slog | status forward | bcm news | users | version | remove cookieI0OJJ > SYSOP 27.03.26 05:09l 23 Lines 641 Bytes #6 (0) @ WW BID : QJ0I0OJJ_003 Read: GUEST Subj: Packet errors from rmgate.ampr.org Path: JH4XSY<IW0QNL<SR1BSZ<EA2RCF<I0OJJ Sent: 260326/2008z @:I0OJJ.ITA.EU [Rome] obcm1.13-38-g65b7 From: I0OJJ @ I0OJJ.ITA.EU (Gustavo) To: SYSOP @ WW X-Info: This message was generated automatically Dear Sysops, just to inform you about the packet errors filtered at gw.ampr.org (44.0.0.1) and having as a source my rmgate.ampr.org (44.27.131.17). See msg to 44net@ww dispatched in 7plus format. The main reason for that is due to the continue tentative access of un-authorized no-hams sites which on 24h per day tried to force (mainly) my JNOS2 gateway on all possible protocols and on any access ports. The positive thing is that, until now, no data seems to be compromised :) -- 73 and ciao, gustavo i0ojj non multa, sed multum
前のメール | 次のメール