Pages:
Author

Topic: Launching the Antminer L3+, World's Most Powerful and Efficient Litecoin Miner - page 48. (Read 284882 times)

member
Activity: 112
Merit: 11
Anyone ever reset these with the button the front before?  I can seem to get mine to reset.  My miner has been running for more than 5 minutes, manual says press and hold for 10 seconds, then release and it will restart with factory settings.  I get no response whatsoever, timing myself with my phone's stopwatch and trying iterations of a little more and little less than 10 seconds after that didn't work.  There's a help page at bitmain that says 5 seconds, and I tried that too, but that one has a photo of an S series antminer, so I assume the manual is right.
full member
Activity: 280
Merit: 100
How my L3+ was hacked!

Waking up today morning i found my L3+ was not hashing. It turns out it was hashing for some one else on nicehash with BTC address:
14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUf

https://www.nicehash.com/miner/14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUf

it seems some one out there has auto scanner searching network for L3+ and inputs default password of Root:

i only lost 8 hours of hashing on 1 machine.
here are the following mistakes i made:
1) I put the L3+ in DMZ (nicehash was not working so i figured DMZ might fix the issue)
2) I kept the default user and password
3) disabled firewall on my router

Just a headsup to people. to change the default password.

In all honesty it was my own stupidity and complacency.

First thing what I did when I booted them - I changed the root password.


How come that someone got into your private network first?


He put them in the DMZ thats before the firewall. Everyone with a bit tech knowledge can search IP addresses and find a miner in the DMZ.

Would not advise anyone to put anything there. If you cant get it going with a port forwarding sell it or let it be.

In shodan you can currently find 1600 antminer-webservers. Maybe one in a hundred will be at default or pw 1234 Smiley
But then again i found some xampp-servers with all default in the past. If you config it that way, expect to get rekt Cheesy
newbie
Activity: 24
Merit: 0
when the december batch will be delivred, do you think there will still money to be made ?
or it will be another brick along with the D3 ?

Hard to say, if so many people are getting in, then it's a diminishing return for the hashrates, haha.. but that's the cryptoworld.


On a side note, can anyone suggest a walk through of someone who may have successfully used a wireless router(with ethernet ports) to bridge to a wireless internet connection with these L3+'s (as I know that they only have Ethernet connections)...

Get an extender. Or a bridge. With an Ethernet switch.
newbie
Activity: 49
Merit: 0
when the december batch will be delivred, do you think there will still money to be made ?
or it will be another brick along with the D3 ?

Hard to say, if so many people are getting in, then it's a diminishing return for the hashrates, haha.. but that's the cryptoworld.


On a side note, can anyone suggest a walk through of someone who may have successfully used a wireless router(with ethernet ports) to bridge to a wireless internet connection with these L3+'s (as I know that they only have Ethernet connections)...
sr. member
Activity: 420
Merit: 250
Tax Attorney - Investor - Entrepreneur
How my L3+ was hacked!

Waking up today morning i found my L3+ was not hashing. It turns out it was hashing for some one else on nicehash with BTC address:
14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUf

https://www.nicehash.com/miner/14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUf

it seems some one out there has auto scanner searching network for L3+ and inputs default password of Root:

i only lost 8 hours of hashing on 1 machine.
here are the following mistakes i made:
1) I put the L3+ in DMZ (nicehash was not working so i figured DMZ might fix the issue)
2) I kept the default user and password
3) disabled firewall on my router

Just a headsup to people. to change the default password.

In all honesty it was my own stupidity and complacency.

First thing what I did when I booted them - I changed the root password.


How come that someone got into your private network first?


He put them in the DMZ thats before the firewall. Everyone with a bit tech knowledge can search IP addresses and find a miner in the DMZ.

Would not advise anyone to put anything there. If you cant get it going with a port forwarding sell it or let it be.
member
Activity: 72
Merit: 10
when the december batch will be delivred, do you think there will still money to be made ?
or it will be another brick along with the D3 ?
full member
Activity: 420
Merit: 110
Anyone ever tried http://italyiimp.com ? I see they are giving good stats for the last few days, but I also see comments from users that they're not paying ...

Read a little bit more, they say they were hacked then ...

And today Nicehash is again the most profitable.
I feel like I'm missing something ... turns out that either the people buying hashpower there are at loss, or they know some really profitable trick (that I don't) and can get more money despite the high price they're paying. That's driving me crazy ...
Probably boosted by Large Hash power buyers. Willing to accept lower profits without the PITA of owning and maintaining servers.
full member
Activity: 476
Merit: 139
Anyone ever tried http://italyiimp.com ? I see they are giving good stats for the last few days, but I also see comments from users that they're not paying ...

Read a little bit more, they say they were hacked then ...

And today Nicehash is again the most profitable.
I feel like I'm missing something ... turns out that either the people buying hashpower there are at loss, or they know some really profitable trick (that I don't) and can get more money despite the high price they're paying. That's driving me crazy ...

They are scammers. Super long payout, if you lucky. Or you only loose you money. Go to MD or PH
newbie
Activity: 32
Merit: 0
Anyone ever tried http://italyiimp.com ? I see they are giving good stats for the last few days, but I also see comments from users that they're not paying ...

Read a little bit more, they say they were hacked then ...

And today Nicehash is again the most profitable.
I feel like I'm missing something ... turns out that either the people buying hashpower there are at loss, or they know some really profitable trick (that I don't) and can get more money despite the high price they're paying. That's driving me crazy ...
sr. member
Activity: 873
Merit: 268
How my L3+ was hacked!

Waking up today morning i found my L3+ was not hashing. It turns out it was hashing for some one else on nicehash with BTC address:
14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUf

https://www.nicehash.com/miner/14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUf

it seems some one out there has auto scanner searching network for L3+ and inputs default password of Root:

i only lost 8 hours of hashing on 1 machine.
here are the following mistakes i made:
1) I put the L3+ in DMZ (nicehash was not working so i figured DMZ might fix the issue)
2) I kept the default user and password
3) disabled firewall on my router

Just a headsup to people. to change the default password.

In all honesty it was my own stupidity and complacency.

so you had your baikal hacked too or this is someone else that copied pasted your post?
https://deeponion.org/community/threads/how-my-baikal-a2000-was-hacked.9643/

That was not me, some one just copied my post for there Baikal incident. some one can't even write there original words.  Grin Grin

"Imitation is sincerest form of flattery" I guess.

Edit: I guess they are copying post to hit there post #s for onion forums i guess.
sr. member
Activity: 873
Merit: 268
How my L3+ was hacked!

Waking up today morning i found my L3+ was not hashing. It turns out it was hashing for some one else on nicehash with BTC address:
14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUf

https://www.nicehash.com/miner/14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUf

it seems some one out there has auto scanner searching network for L3+ and inputs default password of Root:

i only lost 8 hours of hashing on 1 machine.
here are the following mistakes i made:
1) I put the L3+ in DMZ (nicehash was not working so i figured DMZ might fix the issue)
2) I kept the default user and password
3) disabled firewall on my router

Just a headsup to people. to change the default password.

In all honesty it was my own stupidity and complacency.

First thing what I did when I booted them - I changed the root password.


How come that someone got into your private network first?

I had the miner in DMZ because nicehash wasn't working so i thought maybe one of the firewall was blocking it.
full member
Activity: 150
Merit: 100
How my L3+ was hacked!

Waking up today morning i found my L3+ was not hashing. It turns out it was hashing for some one else on nicehash with BTC address:
14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUf

https://www.nicehash.com/miner/14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUf

it seems some one out there has auto scanner searching network for L3+ and inputs default password of Root:

i only lost 8 hours of hashing on 1 machine.
here are the following mistakes i made:
1) I put the L3+ in DMZ (nicehash was not working so i figured DMZ might fix the issue)
2) I kept the default user and password
3) disabled firewall on my router

Just a headsup to people. to change the default password.

In all honesty it was my own stupidity and complacency.

so you had your baikal hacked too or this is someone else that copied pasted your post?
https://deeponion.org/community/threads/how-my-baikal-a2000-was-hacked.9643/
member
Activity: 106
Merit: 10
It's a good heads up, even with your self deprecating admissions of complacency... They should do better to have their new customers not accidentally "mine for awhile" with their pool connection.settings configured. It seems like at the manufactures (even the simple script based ETHOSdistro) does this .  Also glad that you got back in with no issues, and nothing worse happened, like malware or something that voided that warranty (or something Bitmain could wiggle out of supporting your for).

Thanks.
full member
Activity: 150
Merit: 100
How my L3+ was hacked!

Waking up today morning i found my L3+ was not hashing. It turns out it was hashing for some one else on nicehash with BTC address:
14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUf

https://www.nicehash.com/miner/14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUf

it seems some one out there has auto scanner searching network for L3+ and inputs default password of Root:

i only lost 8 hours of hashing on 1 machine.
here are the following mistakes i made:
1) I put the L3+ in DMZ (nicehash was not working so i figured DMZ might fix the issue)
2) I kept the default user and password
3) disabled firewall on my router

Just a headsup to people. to change the default password.

In all honesty it was my own stupidity and complacency.

First thing what I did when I booted them - I changed the root password.


How come that someone got into your private network first?
sr. member
Activity: 429
Merit: 250
I don't know about ya'll, but ever since I downloaded that latest D3 firmware, my troubles got waaay worse. These fucking things crash every 12-24 hours or so even with good temps and no HW errors.

This is the L3 not D3 thread....
member
Activity: 94
Merit: 10
is Bitmain representative here ?
it seems this topic has been started by them
We are waiting them here kindly

The D3 heater topic !!!!

https://bitcointalk.org/index.php?topic=2029822.5060

newbie
Activity: 87
Merit: 0
Did anyone receive Nov 1-10 batch L3+?

yes they shipped it early oct 21st for me.

Mine hasn't been shipped yet for some reason???

My Nov 1-10 order has not shipped, no response from cuntmain.
newbie
Activity: 32
Merit: 0
Anyone ever tried http://italyiimp.com ? I see they are giving good stats for the last few days, but I also see comments from users that they're not paying ...
full member
Activity: 476
Merit: 139
guys, what multipool with stable online and normal profit you know?

exclude mining-dutch, granatgas and prohashing
Pages:
Jump to: