theGhost
Yes. They are definately exploiting the software and it's connection to all other communities. I took your "MUST" and NO DIFFERENCE regardless of RG is on or off in the Web2.0 enviro. So frustrated and irritated I began developing a list of "hack attacking servers" and the places they are coming from. Here is my list in the last 24 hours

RIPE Network Coordination Centre (50+ instances)
RackVibe LLC
Internet Specialties West ISWEST-BLK-1
HostForWeb Inc. SCNET (20+ instances)
Global see more Net Access (5+ instances)
HostForWeb Inc. HOSTFORWEB-1 (20+ instances)
Advanced Internet Technologies
Value Eyecare Network, INC (20+ instances)
Bluehost Inc
ADDD2NET COM INC DBA LUNARPAGES
Latin American and Caribbean IP address Regional Registry
Covad Communications Co
ThePlanet.com Internet Services, Inc
HostDime.com, Inc.tw telecom holdings, inc (10+ instances)
Asia Pacific Network Information Centre

Although they are not INFECTING my Dolphin environments...They are punching the server at 3-5 min intervals revolving the attack off different Dolphins hosted throughout the NET.

I'll keep playing withit and see if I can find a way to stop/block it.
VictorT
Stephen, thanks for your E-mail with logs. We are looking into it.
SergeyZ
Actually they use different servers/proxies/ip's to make the checks of vulnerable servers and sites. Also they use robots. This is why they check your site every 3-5 mins.
theGhost
Different Servers all over the NET this I know. I have been watching and tracking trying to find source which is a daunting process. But I eventually began making some head way on source. Also noticed some interesting patterns which I have forwarded to VictorT.
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.
PET:0.038841009140015