Game Version: (A18 b155 / A18.1 bxxx / etc)
Platform: (PC / Mac)
OS/Version: (Windows / Linux / Mac)
CPU Model: (Intel i5 9600K / AMD Ryzen 7 1800x / etc)
System Memory: (4 GB / 8 GB / 16 GB / etc)
GPU Model and VRAM: (nVidia GTX 1060 4 GB / AMD RX 580 8 GB / etc)
Screen Resolution: (width and height)
Video Settings: (Low / Medium / High / Ultra / Custom (Custom has many combinations, so just list the settings you think are relevant to the bug if any))
Game mode: (MP host / MP client / SP / Client on dedi, RWG or NAV)
Server
2022-01-29T15:32:23 0.840 INF Version: Alpha 20 (b238) Compatibility Version: Alpha 20, Build: Windows 64 Bit
2022-01-29T15:32:23 0.840 INF System information:
2022-01-29T15:32:23 0.841 INF OS: Windows 10 (10.0.14393) 64bit
2022-01-29T15:32:23 0.841 INF CPU: AMD Ryzen 9 3950X 16-Core Processor (cores: 32)
2022-01-29T15:32:23 0.841 INF RAM: 131001 MB
2022-01-29T15:32:23 0.841 INF GPU: Null Device (128 MB)
2022-01-29T15:32:23 0.842 INF Graphics API: NULL 1.0 [1.0] (shader level 5.0)
Did you wipe old saves? (Yes/No) N/A
Did you start a new game? (Yes/No) N/A
Did you validate your files? (Yes/No) N/A
Are you using any mods? (Yes/No) No
EAC on or off? Off
Status: NEW
Bug Description:
I am seeing unusual telnet activity on my server.
I had it enabled for several weeks testing a feature, but it seems someone discovered/brute forced my 16 char random password.
I am providing this report to provide you a view in to what someone is attempting to do with your telnet client / session.
(I will just disable the feature for the time being)
Detailed steps to reproduce the bug:
1) N/A
Actual result: (description of what is occurring)
Expected result: (what you expect to occur)
Recommended Comments
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now