Author

Topic: ★★ [ANN] ECCoin (ECC) ★★★ ECCoin - Green Future FORK FIXED UPGRADE NEEDED - page 120. (Read 342487 times)

member
Activity: 140
Merit: 10

ecc.miningwith.us

Now finding blocks like mad, come check us out!

Having a problem with your pool.

I have passed the payment threshold, and tried to update my account with my wallet address....but every address I generate from the wallet and input in my admin gives me a 'Failed to update your account: Invalid coin address'

I am IRC right now, but no one seems to know anything about ecc pool there.

Any chance I could get some help?

@Hostmaster Will you please remove these guys from the front page and delete their spam until they at least get their PPLNS shares down to a reasonable level and provide some explanation for how it was so high to begin with? And also until they start responding to things like this.
hero member
Activity: 826
Merit: 501
in defi we trust
Why are the votes being reduced sometimes? it was 2100+ but now 1967  1693 1400??

Votes may be removed/ignored if deemed they are automated, via proxies etc. Despite this not being explicitly disallowed previously, this has been changed to keep things fair. Votes may go down over time due to this.

But if votes can be removed, then anyone can sabotage the other coins by voting them using proxies. How is this fair?

Nothing is fair in this wordl
member
Activity: 140
Merit: 10
Votes may be removed/ignored if deemed they are automated, via proxies etc. Despite this not being explicitly disallowed previously, this has been changed to keep things fair. Votes may go down over time due to this.

But if votes can be removed, then anyone can sabotage the other coins by voting them using proxies. How is this fair?
Well, hopefully they would go down only as much as they went up thanks to the cheating. I noticed that ECC had jumped up very quickly and thought it seemed suspicious myself. I guess we will just have to work our way up the hard way.
full member
Activity: 126
Merit: 100
Why are the votes being reduced sometimes? it was 2100+ but now 1967  1693 1400??

Votes may be removed/ignored if deemed they are automated, via proxies etc. Despite this not being explicitly disallowed previously, this has been changed to keep things fair. Votes may go down over time due to this.

But if votes can be removed, then anyone can sabotage the other coins by voting them using proxies. How is this fair?
hero member
Activity: 826
Merit: 501
in defi we trust
Why are the votes being reduced sometimes? it was 2100+ but now 1967  1693 1400??

Votes may be removed/ignored if deemed they are automated, via proxies etc. Despite this not being explicitly disallowed previously, this has been changed to keep things fair. Votes may go down over time due to this.
full member
Activity: 126
Merit: 100
Why are the votes being reduced sometimes? it was 2100+ but now 1967  1693 1400??
newbie
Activity: 26
Merit: 0
member
Activity: 86
Merit: 10
sr. member
Activity: 266
Merit: 250
hello every body long time no see


i hope ecc go to the moon
Welcome back...

full member
Activity: 126
Merit: 100
Quote
Yep, now it's up.
But there is one problem - to withdraw coins you need to confirm email. But if you click "unlock" you wont receive any email, and cant withdraw anything.


I'm not mining there but I just unlocked it just to see. I received the email.

4 days left
newbie
Activity: 23
Merit: 0

https://altoutlet.com/vote/ECC

Voted

Ecc.okaypool dropped hashrate to 0 and, after 30~ minutes, dropped from net.
Well played, running with customers crypto.

It's up but with 0 hashrate as you said and displaying the following.

Network Info
Difficulty   1.00000000
Est Next Difficulty   0.00000001 (Change in 2015 Blocks)
Est. Avg. Time per Block   1193046 hours 28 minutes 16 seconds
Current Block   0

Yep, now it's up.
But there is one problem - to withdraw coins you need to confirm email. But if you click "unlock" you wont receive any email, and cant withdraw anything.
full member
Activity: 210
Merit: 100
hello every body long time no see


i hope ecc go to the moon
full member
Activity: 126
Merit: 100

https://altoutlet.com/vote/ECC

Voted

Ecc.okaypool dropped hashrate to 0 and, after 30~ minutes, dropped from net.
Well played, running with customers crypto.

It's up but with 0 hashrate as you said and displaying the following.

Network Info
Difficulty   1.00000000
Est Next Difficulty   0.00000001 (Change in 2015 Blocks)
Est. Avg. Time per Block   1193046 hours 28 minutes 16 seconds
Current Block   0
newbie
Activity: 23
Merit: 0
Ecc.okaypool dropped hashrate to 0 and, after 30~ minutes, dropped from net.
Well played, running with customers crypto.
member
Activity: 98
Merit: 10
About ECCoin

ECCoin is an energy saving coin generating most of its coins through PoS blocks. It distributes its initial coins through 45 days evenly distributed PoW mining, no halves during the initial distribution phase, thus ensures a fair distribution. After initial distribution, the PoW block will be stopped. The coin generation will be done entirely through the PoS generations.

ECCoin also adopts a variable PoS rate with the following annual interest rate:
- Year 1: 25%
- Year 2: 15%
- Year 3-9: 10%
- Starting Year 10, it will have an annual PoS interest of 1%

We just like pos...
legendary
Activity: 2534
Merit: 1129

if only we had this solution at the beginning of the attack and better when we've been DDOS a few days after launch, for sure we'll have been one of the biggest EC pool.

thank you anyway!!!
Ok enjoy, If you buy 20 dollars plan you can update full cached page every 20 minutes (more often) so it'll be more live page...

[/quote]

Good job done !  This solution works well and is the most widely used by websites.
sr. member
Activity: 266
Merit: 250
for the pools under ddos, i share with you some tricks

Use cloudflare's "I'm under attack mode"

This does'not help over 30k botnets then you full cache the attackers url. (use cloudflare full cache)
When cloudflare cache it's zero effect on your servers.

You can dedect attacked urls in google analytics, live stats :-)

I had to deal in the past so many ddoser... Port 80 attackers is a piece of cake.

Longest attacks last 4.5 days in records in very rare situations. So no worry much.

hi. thanks for the feedback.
does the cloudflare free plan is enough?
because the free plan doesn't seem to support mitigation attacks protection; this is what we would need Sad
Free plan has "i am under attack mode". All you need to open it. Also you have 3 page rules limit to put so you can full cache attacked urls.  if attacker attacks more than 3 urls at port:80 and at the same time then you will need 20 dollars plan which goes up to 20 page rules. In most case free plan will be more than enough. :-)

To make attack influence even less, just learn first the attacked url(s) from google analytics, then put simple html file there and let cloudflare cache it.

Also nginx is much resistance to attacks then apache. you can block with nginx attackers traffics (those mainly has no user agent) so you put rule in nginx to deny bad visits without correct user agent.

wow you are a life saver!! Smiley
i never configured the "page rules" settings in cloudflare and thought the free plan was a crap.
i just added a page rule according to the requests made by the attackers and cloudflare seems to do his work well from now on.

-> our frontend is now accessible again Smiley
-> http://ecc.coins4everyone.com

if only we had this solution at the beginning of the attack and better when we've been DDOS a few days after launch, for sure we'll have been one of the biggest EC pool.

thank you anyway!!!
Ok enjoy, If you buy 20 dollars plan you can update full cached page every 20 minutes (more often) so it'll be more live page...
full member
Activity: 154
Merit: 100

-> Come on to http://ecc.coins4everyone.com!


Our pool is UP and RUNNING
Our stratum has been up 100% of the time since launch!


To get plenty of EC Coins, just point your miners to:
Stratum: stratum+tcp://ecc.eu.stratum.coins4everyone.com
Port: 3469
Algorithm: scrypt
Username: Weblogin.Worker
Password: Worker Password
and then relax... We take care of the rest!

Benefits of Mining @ coins4everyone.com:
* based in Europe
* incredible uptime
* fast dedicated servers w/redundancy, tripple layer DDoS protection
* only 1% fee
* pplns
* nice & caring support
* trustworthy & skilled admins

Come on, we need more hash power, point your miners to our pool and let’s spread hashrate! ;-)
full member
Activity: 154
Merit: 100
for the pools under ddos, i share with you some tricks

Use cloudflare's "I'm under attack mode"

This does'not help over 30k botnets then you full cache the attackers url. (use cloudflare full cache)
When cloudflare cache it's zero effect on your servers.

You can dedect attacked urls in google analytics, live stats :-)

I had to deal in the past so many ddoser... Port 80 attackers is a piece of cake.

Longest attacks last 4.5 days in records in very rare situations. So no worry much.

hi. thanks for the feedback.
does the cloudflare free plan is enough?
because the free plan doesn't seem to support mitigation attacks protection; this is what we would need Sad
Free plan has "i am under attack mode". All you need to open it. Also you have 3 page rules limit to put so you can full cache attacked urls.  if attacker attacks more than 3 urls at port:80 and at the same time then you will need 20 dollars plan which goes up to 20 page rules. In most case free plan will be more than enough. :-)

To make attack influence even less, just learn first the attacked url(s) from google analytics, then put simple html file there and let cloudflare cache it.

Also nginx is much resistance to attacks then apache. you can block with nginx attackers traffics (those mainly has no user agent) so you put rule in nginx to deny bad visits without correct user agent.

wow you are a life saver!! Smiley
i never configured the "page rules" settings in cloudflare and thought the free plan was a crap.
i just added a page rule according to the requests made by the attackers and cloudflare seems to do his work well from now on.

-> our frontend is now accessible again Smiley
-> http://ecc.coins4everyone.com

if only we had this solution at the beginning of the attack and better when we've been DDOS a few days after launch, for sure we'll have been one of the biggest EC pool.

thank you anyway!!!
sr. member
Activity: 266
Merit: 250
for the pools under ddos, i share with you some tricks

Use cloudflare's "I'm under attack mode"

This does'not help over 30k botnets then you full cache the attackers url. (use cloudflare full cache)
When cloudflare cache it's zero effect on your servers.

You can dedect attacked urls in google analytics, live stats :-)

I had to deal in the past so many ddoser... Port 80 attackers is a piece of cake.

Longest attacks last 4.5 days in records in very rare situations. So no worry much.

hi. thanks for the feedback.
does the cloudflare free plan is enough?
because the free plan doesn't seem to support mitigation attacks protection; this is what we would need Sad
Free plan has "i am under attack mode". All you need to open it. Also you have 3 page rules limit to put so you can full cache attacked urls.  if attacker attacks more than 3 urls at port:80 and at the same time then you will need 20 dollars plan which goes up to 20 page rules. In most case free plan will be more than enough. :-)

To make attack influence even less, just learn first the attacked url(s) from google analytics, then put simple html file there and let cloudflare cache it.

Also nginx is much resistance to attacks then apache. you can block with nginx attackers traffics (those mainly has no user agent) so you put rule in nginx to deny bad visits without correct user agent.
Jump to: