[projectaon] Re: Fwd: [jonblake 81157683] Followup regarding your site projectaon.org

  • From: "Fred" <freds_cats@xxxxxxxxxxx>
  • To: <projectaon@xxxxxxxxxxxxx>
  • Date: Thu, 7 Nov 2013 22:01:50 -0000

I know I recently had one of my e-mails that's attached to my website cause
mayhem.  Apparently it was trying to access something like 3600 times a
hour.  Interestingly the only places the account is utilised was my iPhone
and my PC.

 

Fred

 

From: projectaon-bounce@xxxxxxxxxxxxx
[mailto:projectaon-bounce@xxxxxxxxxxxxx] On Behalf Of James Durrant
Sent: 07 November 2013 16:31
To: projectaon@xxxxxxxxxxxxx
Subject: [projectaon] Re: Fwd: [jonblake 81157683] Followup regarding your
site projectaon.org

 

Isn't is somewhat co-incidental that they move our server on Wednesday, then
on Thursday it is suddenly overloaded?
 

> Date: Thu, 7 Nov 2013 08:01:33 -0800
> Subject: [projectaon] Re: Fwd: [jonblake 81157683] Followup regarding your
site projectaon.org
> From: jonathan@xxxxxxxxxxxxx
> To: projectaon@xxxxxxxxxxxxx
> 
> Thanks for the suggestions. I've asked them to look into it,
> especially since we have no way to investigate with the website down.
> I can't even access usage logs through their administrative website.
> We'll see what they say.
> 
> One possible solution is to move to a virtual private server but that
> wouldn't solve the underlying issue. It would just isolate the problem
> to us. :-/
> 
> Jon
> 
> 
> On Thu, Nov 7, 2013 at 7:08 AM, Nicholas Jankowski <jankowskin@xxxxxxxx>
wrote:
> > agree with David's suggestion. My guess is you could ask them for the
usage
> > profile over the past few months, and try to identify whether it was a
> > sudden traffic increase and when that started.
> >
> >
> > On Thu, Nov 7, 2013 at 9:20 AM, David Davis <feline1@xxxxxxxxxxxxx>
wrote:
> >>
> >> oo-er!
> >>
> >> It wasn't me :/
> >>
> >> Usually in these kind of situations, it turns out the site has been
hacked
> >> in some way, and is being used as a relay for spambot traffic or
something
> >> similar.
> >> Can you not get the hoster to check their logs and tell you where all
the
> >> bandwith is being guzzled to?
> >> David
> >> On 7 November 2013 13:51, Jonathan Blake <jonathan@xxxxxxxxxxxxx>
wrote:
> >>>
> >>> The website has been disabled. Does anyone know of a reason that the
> >>> bandwidth to the website would have increased dramatically in the last
> >>> while?
> >>>
> >>> Jon
> >>>
> >>> ---------- Forwarded message ----------
> >>> From: DreamHost Customer Support Team <support@xxxxxxxxxxxxx>
> >>> Date: Thu, Nov 7, 2013 at 2:28 AM
> >>> Subject: [jonblake 81157683] Followup regarding your site
projectaon.org
> >>> To: jonathan@xxxxxxxxxxxxx
> >>>
> >>> Hello Jonathan,
> >>>
> >>> Unfortunately, due to the amount of traffic still trying to access
your
> >>> site after we disabled the web directory, we were forced to disable it
on
> >>> our end to prevent it from causing further issues on your shared
server.
> >>>
> >>> In order for us to re-enable your site, please reply back with any
plans
> >>> you have to lower the amount of usage your site is currently
receiving,
> >>> or you may want to consider upgrading to a VPS. I'm afraid with the
usage
> >>> being what it is currently, we're not able to keep it active in its
> >>> current state as it is causing severely high loads on your shared
server
> >>> which is affecting other customers.
> >>>
> >>> Thanks!
> >>> Chalise
> >>>
> >>> --
> >>> DreamHost Support Team + support@xxxxxxxxxxxxx
> >>> Earn over $97 for each referral: http://www.dreamhost.com/affiliates/
> >>> To continue this support case, just reply to this email.
> >>> Open a new case at: https://panel.dreamhost.com/?tab=support
> >>>
> >>> ~~~~~~
> >>> Manage your subscription at http://www.freelists.org/list/projectaon
> >>>
> >>>
> >>
> >
> 
> ~~~~~~
> Manage your subscription at http://www.freelists.org/list/projectaon
> 
> 

  _____  

No virus found in this message.
Checked by AVG - www.avg.com
Version: 2014.0.4158 / Virus Database: 3629/6817 - Release Date: 11/07/13

No virus found in this message.
Checked by AVG - www.avg.com
Version: 2014.0.4158 / Virus Database: 3629/6814 - Release Date: 11/06/13

Other related posts: