Message:19662 In: SYSOP.WW
From: I0OJJDate: Thu, 26 Mar 26 20:08:00 Z
Newsgroups: SYSOP.WW
Subject: Packet errors from rmgate.ampr.org
Message-ID:
Path: N2NOV|I0OJJ|I0OJJ
R:260326/2016z @:N2NOV.#RICH.NY.USA.NOAM $:QJ0I0OJJ_003
R:260326/2010z @:I0OJJ.ITA.EU [Rome] $:QJ0I0OJJ_003
R:260326/2008z @:I0OJJ.ITA.EU [Rome] obcm1.13-38-g65b7
>From i0ojj%i0ojj.ita.eu@i0ojj.ampr.org Thu Mar 26 21:10:59 2026
Received: from i0ojj.ampr.org by i0ojj.ampr.org (JNOS2.0q) with SMTP
id AA17056974 ; Thu, 26 Mar 2026 21:10:59 +0100
Message-Id:
>From: i0ojj@i0ojj.ita.eu
X-JNOS-User-Port: Telnet (obcm @ 44.134.109.10) -> Sending message
From: I0OJJ @ I0OJJ.ITA.EU (Gustavo)
To: SYSOP @ WW
X-Info: This message was generated automatically
Dear Sysops,
just to inform you about the packet errors
filtered at gw.ampr.org (44.0.0.1) and having
as a source my rmgate.ampr.org (44.27.131.17).
See msg to 44net@ww dispatched in 7plus format.
The main reason for that is due to the continue
tentative access of un-authorized no-hams sites
which on 24h per day tried to force (mainly) my
JNOS2 gateway on all possible protocols and on
any access ports.
The positive thing is that, until now, no data
seems to be compromised :)
--
73 and ciao, gustavo i0ojj
non multa, sed multum
Return To Bulletin List