• iOsGG.com
  • First and foremost, Welcome to our forum! Read the rules after you registered!

Mesh3lxGh

Advanced Member
  • Content count

    198
  • Donations

    $0.00 
  • Joined

  • Last visited

Posts posted by Mesh3lxGh


  1.  IPA file successfully uploaded, please check below link. @Jaygt

     

    1- Being thankful will be appreciated :)

    2- Don't forget to resign the IPA file with your certificate ( i would recommend Othman resing method "  ask google) or just delete it then sing via cydia impactor. 

     

    meshal.store/Global0.18.0_Menu_v2.ipa

     


  2. 1 minute ago, khaledkuwait said:

    انا حملت السوبر اهني اخر شي جاري التثبيت وطلعت الشهاده مضروبه

    نزل نسخة اللعبه عن طريق الكمبيوتر وثبت عليها شهاده خاصه فيك.

    آبل توفر شهادة تجريبية ومجانية لكل مشترك لمدة 7 ايام فقط.

    اشتراك الشهادة 100$ دولار سنوياً


  3. 9 minutes ago, KingBeast333 said:

    Is there any solution to break this thing and remove this bot attacking, could you plz help if u can or maybe u can help #Admin

    it's not that easy to control the attack unless if get help from datacenter such as CISCO hardware firewall, web load balance ,CDN ...etc.

     

     i can help if he ask to reduce /limit  Req/s. it usually work.


  4. 27 minutes ago, Krueger said:

    3rd option @Cz1993 please drop ipa file

     

    12 minutes ago, Jaygt said:

    Ipa dropped is impossible.

    @Cz1993 get super install server fixed, cannot get in server with error 502 so how to sign from 00:00 to 30 and then download plus install, long long way like 西遊記 for me.

     

    10 minutes ago, fgfiera12 said:

    How tf you get the ipa ??‍♂️

    You can easily download IPA file form below link.

    Note: it has been registered by IOSGG certificate , you have to remove the old certificate then install it via cydia impactor

     

    remove $

    https$://$ioshack.$vip/games/svip/PUBG/Global0.18.0_Menu_v2.$ipa

     


  5. 1 minute ago, Mesh3lxGh said:

    If he dose not believe the owner of this server i can provide him  some an evidence.  i just have read nginx log server via an private exploit  and i can confirm that the server is under BOTNET attack (Layer 7)

     

    nginx log; very professional attack using base64 Encoded

     

    82.119.170.106 - - [23/May/2020:23:00:45 +0000] "GET /?ucrh31438gtk0fhlmwclc=cxi6yt3q3lzsphwkjo1nf HTTP/1.1" 200 0 "?ucrh31438gtk0fhlmwclc=cxi6yt3q3lzsphwkjo1nf" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3599.0 Safari/537.36"
    150.66.1.137 - - [23/May/2020:23:00:48 +0000] "GET /?6y6hiqk6lk49f0x0xyouqa=mliv51y3y7ujw76csloi HTTP/1.1" 200 0 "?6y6hiqk6lk49f0x0xyouqa=mliv51y3y7ujw76csloi" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3599.0 Safari/537.36"
    154.58.16.172 - - [23/May/2020:23:00:50 +0000] "GET /?59mvzpdhchhc6uhdd9v6l=0t9emvim5ajml5dz4f9ki HTTP/1.1" 504 0 "?59mvzpdhchhc6uhdd9v6l=0t9emvim5ajml5dz4f9ki" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3599.0 Safari/537.36"
    82.81.169.142 - - [23/May/2020:23:00:56 +0000] "GET /?y8iwiejvfyf950cb7c0vm=7wylznct0hfphizralg6i HTTP/1.1" 200 0 "?y8iwiejvfyf950cb7c0vm=7wylznct0hfphizralg6i" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3599.0 Safari/537.36"
    139.224.16.103 - - [23/May/2020:23:00:57 +0000] "GET /?fdoltrm8hklhweb87d1f7=n83j8aazvdrgf87vnokr8b HTTP/1.1" 200 0 "?fdoltrm8hklhweb87d1f7=n83j8aazvdrgf87vnokr8b" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; rv:11.0) like Gecko"
    3.15.179.209 - - [23/May/2020:23:01:01 +0000] "GET /?s3ot2gnnjj1qvstdyyk2q=75euv5eiqcabsvl3jwduf HTTP/1.1" 200 0 "?s3ot2gnnjj1qvstdyyk2q=75euv5eiqcabsvl3jwduf" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3599.0 Safari/537.36"
    98.158.58.200 - - [23/May/2020:23:01:03 +0000] "GET /?9ig2t9dn1842nbo9q6cvy=hf0vv047d3a4k201v2ycfv HTTP/1.1" 200 0 "?9ig2t9dn1842nbo9q6cvy=hf0vv047d3a4k201v2ycfv" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3599.0 Safari/537.36"
    5.196.243.198 - - [23/May/2020:23:01:16 +0000] "GET /?ghcrqbg9hz7h64cfq61cy9=5ii8c80sri8uwhjlalbmlf HTTP/1.1" 200 0 "?ghcrqbg9hz7h64cfq61cy9=5ii8c80sri8uwhjlalbmlf" "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36"
     

    @Cz1993

     

     


  6. 3 minutes ago, KingBeast333 said:

    Really brooo how u should tell him

    If he dose not believe the owner of this server i can provide him  some an evidence.  i just have read nginx log server via an private exploit  and i can confirm that the server is under BOTNET attack (Layer 7)

     

    nginx log; very professional attack using base64 Encoded

     

    82.119.170.106 - - [23/May/2020:23:00:45 +0000] "GET /?ucrh31438gtk0fhlmwclc=cxi6yt3q3lzsphwkjo1nf HTTP/1.1" 200 0 "?ucrh31438gtk0fhlmwclc=cxi6yt3q3lzsphwkjo1nf" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3599.0 Safari/537.36"
    150.66.1.137 - - [23/May/2020:23:00:48 +0000] "GET /?6y6hiqk6lk49f0x0xyouqa=mliv51y3y7ujw76csloi HTTP/1.1" 200 0 "?6y6hiqk6lk49f0x0xyouqa=mliv51y3y7ujw76csloi" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3599.0 Safari/537.36"
    154.58.16.172 - - [23/May/2020:23:00:50 +0000] "GET /?59mvzpdhchhc6uhdd9v6l=0t9emvim5ajml5dz4f9ki HTTP/1.1" 504 0 "?59mvzpdhchhc6uhdd9v6l=0t9emvim5ajml5dz4f9ki" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3599.0 Safari/537.36"
    82.81.169.142 - - [23/May/2020:23:00:56 +0000] "GET /?y8iwiejvfyf950cb7c0vm=7wylznct0hfphizralg6i HTTP/1.1" 200 0 "?y8iwiejvfyf950cb7c0vm=7wylznct0hfphizralg6i" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3599.0 Safari/537.36"
    139.224.16.103 - - [23/May/2020:23:00:57 +0000] "GET /?fdoltrm8hklhweb87d1f7=n83j8aazvdrgf87vnokr8b HTTP/1.1" 200 0 "?fdoltrm8hklhweb87d1f7=n83j8aazvdrgf87vnokr8b" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; rv:11.0) like Gecko"
    3.15.179.209 - - [23/May/2020:23:01:01 +0000] "GET /?s3ot2gnnjj1qvstdyyk2q=75euv5eiqcabsvl3jwduf HTTP/1.1" 200 0 "?s3ot2gnnjj1qvstdyyk2q=75euv5eiqcabsvl3jwduf" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3599.0 Safari/537.36"
    98.158.58.200 - - [23/May/2020:23:01:03 +0000] "GET /?9ig2t9dn1842nbo9q6cvy=hf0vv047d3a4k201v2ycfv HTTP/1.1" 200 0 "?9ig2t9dn1842nbo9q6cvy=hf0vv047d3a4k201v2ycfv" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3599.0 Safari/537.36"
    5.196.243.198 - - [23/May/2020:23:01:16 +0000] "GET /?ghcrqbg9hz7h64cfq61cy9=5ii8c80sri8uwhjlalbmlf HTTP/1.1" 200 0 "?ghcrqbg9hz7h64cfq61cy9=5ii8c80sri8uwhjlalbmlf" "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36"
     


  7. 17 minutes ago, Krueger said:

    May be,cause no one svip member put comment here

    I keep trying since yesterday but it not able to be downloaded. it's general issue with " sign  server".

     

    As what @Cz1993 said, server is under DDOS attack and i agree/believe him on that.  ( server respond " time out" )

     

    it is not overloaded guys . THE SERVER IS UNDER DDOS ATTACK


  8. 15 minutes ago, Krueger said:

    May be,cause no one svip member put comment here

    I keep trying since yesterday but it not able to be downloaded. it's general issue with " sign .sh ".

     

    As what @Cz1993 said, server is under DDOS attack and i agree/believe him on that.  ( server respond " time out" )

     

    it is not overloaded guys . THE SERVER IS UNDER DDOS ATTACK