zlacker

[parent] [thread] 15 comments
1. klipit+(OP)[view] [source] 2025-12-04 12:34:10
Thanks for the kind words. I hope I won't have to close this service in a few days due to abuse but its a weird world we live in.
replies(5): >>pcthro+8e >>jjcm+rg1 >>dlensk+Hk1 >>patric+uO1 >>Valdik+Ey3
2. pcthro+8e[view] [source] 2025-12-04 14:09:31
>>klipit+(OP)
Do you have funding to cover the paying the bandwidth costs which will ultimately result from this? Or if you're running this from a home network, does anyone know if OP should be concerned of running into issues with their ISP?
replies(2): >>kiloba+oy1 >>klipit+Oy1
3. jjcm+rg1[view] [source] 2025-12-04 19:35:20
>>klipit+(OP)
As someone who has launched something free on HN before, the resulting signups were around 1/3rd valid users doing cool things and checking things out, and 2/3rds nefarious users.
replies(1): >>tonyme+Dl1
4. dlensk+Hk1[view] [source] 2025-12-04 19:52:54
>>klipit+(OP)
Dare I ask how much bandwidth it is consuming?
replies(1): >>klipit+JA1
◧◩
5. tonyme+Dl1[view] [source] [discussion] 2025-12-04 19:57:09
>>jjcm+rg1
a bit better benevolent:malicious ratio than the real world
replies(1): >>hrimfa+oJ4
◧◩
6. kiloba+oy1[view] [source] [discussion] 2025-12-04 20:54:31
>>pcthro+8e
The tunnel host appears to be a Hetzner server, they are pretty generous with bandwidth but the interesting thing I learned about doing some scalability improvements at a similar company [0] is that for these proxy systems, each direction’s traffic is egress bandwidth. Good luck OP, the tool looks cool. Kinda like pinggy.

[0] https://localxpose.io

◧◩
7. klipit+Oy1[view] [source] [discussion] 2025-12-04 20:56:12
>>pcthro+8e
I can cover hundreds of PB of bandwidth per month if needed without paying a fortune.
replies(1): >>kiloba+Wz1
◧◩◪
8. kiloba+Wz1[view] [source] [discussion] 2025-12-04 21:01:50
>>klipit+Oy1
Can you share more details? I know Hetzner offers unlimited bandwidth in some cases but I thought it limited only to servers with the 1Gbs uplink
replies(1): >>aamosc+LQ1
◧◩
9. klipit+JA1[view] [source] [discussion] 2025-12-04 21:04:45
>>dlensk+Hk1
Its around 700MB today so far.
10. patric+uO1[view] [source] 2025-12-04 22:18:20
>>klipit+(OP)
I run playit.gg. Abuse is a big problem on our free tier. I’d get https://github.com/projectdiscovery/nuclei setup to scan your online endpoints and autoban detections of c2 servers.
replies(1): >>jborak+BZ3
◧◩◪◨
11. aamosc+LQ1[view] [source] [discussion] 2025-12-04 22:29:54
>>kiloba+Wz1
Work closet /s
12. Valdik+Ey3[view] [source] 2025-12-05 12:53:59
>>klipit+(OP)
My service (which doesn't have public access, only via SSH as a client) was used by a ransomware gang, which involved the service in investigation from Dutch CERT and Dubai police.

It's still live though.

◧◩
13. jborak+BZ3[view] [source] [discussion] 2025-12-05 15:09:42
>>patric+uO1
Thanks for sharing this. I run packetriot.com, another tunneling service and I ended up writing my own scanner for endpoints using keyword lists I gathered from various infosec resources.

I had done some account filtering for origins coming out of Tor, VPN networks, data centers, etc. but I recently dropped those and added an portal page for free accounts, similar to what ngrok does.

It was very effective at preventing abuse. I also added mechanism for reporting abuse on the safety page that's presented.

replies(1): >>patric+Tu4
◧◩◪
14. patric+Tu4[view] [source] [discussion] 2025-12-05 17:17:05
>>jborak+BZ3
Have you found a way to detect xworm c2c servers?
◧◩◪
15. hrimfa+oJ4[view] [source] [discussion] 2025-12-05 18:22:22
>>tonyme+Dl1
2/3rds of people in the world are malicious?
replies(1): >>tonyme+CS5
◧◩◪◨
16. tonyme+CS5[view] [source] [discussion] 2025-12-06 01:14:28
>>hrimfa+oJ4
2/3 of resources will typically be spent by malicious/nefarious/abusive users.

[edit] for clarity

[go to top]