hаcker's proxy on the hosting

Started by MikeNielson, Nov 12, 2022, 12:56 AM

Previous topic - Next topic

MikeNielsonTopic starter

hаcked the site, in the server logs I see the IP, in the 2ip Host service: host-194-34-131-58.creanova.org that is, this ip belongs to the hosting creanova.org ?
Then this train of thought: the hаcker made a proxy on the hosting and used it for anonymity, or hаcked someone else's web site on this web hosting and used it for the same purposes. Judging by other actions of the hаcker, he is not very experienced, for example, he did not change the dates of editing files and did not clean the logs on the server after himself, as a result of which the shells filled with him were found.
Question: what is the probability that webhosting provider still has its real ip address and the hаcker did not use the proxy chain, as a result of which he can be held accountable?
This is so, for the sake of sport, it became interesting what can be done about a not very smart hаcker.


In an ideal spherical world, the hoster, of course, would have agreed to search the logs, perhaps he found the IP and perhaps it would have been possible to bring someone to justice.
In the real world, the Finnish hosting CreaNova is very doubtful that it will move anything other than #ss. Even the state would be difficult here, and for an ordinary person without connections, there is simply no way from the word at all.

We are against Internet control - they said - we are for anonymity! Tor, i2p and ... ... ... (here everyone substitutes what they think is necessary) - this is our everything!
...until this very anonymity began to turn to them #ss.

90% - He used a proxy chain.
For him, this is fraught with at least the closure of the UPU, and at most with arrest and a fine.

ryan reynold

Now days, news feeds are filled with messages about threats to privacy from our governments, hаckers, malware, and other things. Compare this with the huge amount of data collected by Google, Facebook, the NSA, etc., and you get an excellent recipe for an unsafe presence on the Internet. This is exactly the reason why the use of advanced security mechanisms has become necessary in our time.
Whenever we talk about privacy, we often mean services such as VPN, Tor, proxy, etc. And today, in this article we will show the difference between a VPN and a proxy.

VPN or proxy server
Without a doubt, you should be aware that VPNs and proxy servers are designed to preserve your anonymity and increase the level of privacy of your "digital" life. In normal mode, both of these services connect you to a remote computer. But VPNs and proxies work differently.

The news articles we mentioned at the beginning describe various risks and privacy concerns. These different scenarios require different levels of privacy. There is a range of tasks that can be easily solved using a proxy server. On the other hand, there are other sensitive issues that require more complex measures.

What is the use of a proxy? When do I need to use a proxy server?
A proxy server, also called a proxy, is a special server that acts as an intermediary between your computer/smartphone and a website or service. You can think of it as a web filter applied to your web browsers.

Suppose you have connected your computer to a proxy server. This will make the connection to the site look as if your web activity is coming from the IP address of the proxy server, and not from the IP address of your PC. You can easily set up a proxy in your web browser or operating system. You can also specify the addresses of websites that you want to access through a proxy server.

So when should you use a proxy server? Is it recommended for any Internet activity? The answer to this question is not very complicated.
The proxy server does not encrypt your traffic, so your messages remain open and unencrypted. Using the right tools and skills, hаckers can still track you today. This is why a proxy is not recommended for solving tasks that require a high level of privacy.

The proxy connection is configured depending on the program. Thus, you cannot configure the entire computer to connect to a proxy server. If you are thinking of redirecting all internet connections, proxy servers are not a good idea.
It is recommended to use a proxy to use websites and services with limited access. You can also use a proxy server to crаck IP application restrictions.

What is the use of a VPN? When should I use a VPN?
Before we talk about the differences, let us talk about the similarity of a VPN with a proxy server. Just like a proxy, a VPN organizes your web traffic as if it comes from a remote location, not from your computer. Thus, it allows you to bypass geographical and ISP restrictions.

Using a VPN server will allow you not to worry about the leakage of transmitted information. All network traffic is securely encrypted and your real IP address will be hidden.

Thanks to these features, a VPN service is often more expensive than proxy servers. But where to get an inexpensive VPS for VPN? Using our VPS, the cost of which starts from UAH 91.58 per month, you can be calm, because virtual dedicated servers VPS512, VPS1024, VPS2048 have a number of high and worthy of your attention parameters, and will also allow you to stay with money. And if you are not ready to service the VPS yourself or you need to install a VPN with high quality and then complete server administration, you can use the VPS Administration service.

"And why do we need a VPS as well?" you may ask. Although VPS and VPN have similar names, they are completely different things.
A Virtual Private Server (VPS) is a place to host your website, where you have root–level access to the server, while at the same time supporting hardware sharing. However, a virtual private network (VPN) is a way to browse the Internet safely and anonymously.

Thus, VPN and proxy have a similar purpose, but completely different implementation mechanisms. If you just want to get access to some resource that has a geographical restriction, then a proxy is what you need.
 If you need complete confidentiality of access and traffic encryption, then a VPN is the best solution.