SEOClerks

Paypal is being targeted with a ddos attack



Write the reason you're deleting this FAQ

Paypal is being targeted with a ddos attack

Paypal is currently under attack by an unknown source. They are getting hit with a ddos attack, or distributed denial of service attack. This is a type of attack that overloads a server by sending millions of traffic packages to the server all at once and it will eventually be too much and take down the server so no one can access the website.

Back in the day people would use something called "low orbit ion cannon" to easily run a ddos attack if they didn't really know what they were doing. It was basically software that you input the website name and how many visitors you wanted to send to it per minute, and it would crash a server. The attack on paypal is similar to this, but I doubt they are using old time software to do this.

Taking down paypals servers is not easy feat because of how large they are in order to handle all their current traffic. The attackers must have an intricate set up in order to do this, and I'm pretty sure it's not a single person doing this. A huge team of people (anonymous maybe) could do this if they set their minds to it.

I found out that paypal was down because I was attempting to log in through the app to check my balance and I thought my business partner had changed our password. I soon found out that not many people could access it in the US. It seems to be up and down all day and hopefully it stops soon so I can access my account and withdraw money for dinner :'(

Another thing we figured out is that Googles DNS is failing. This is most likely due to the same reason that paypal is failing over and over again. ProCoder said that a lot of big corporations are using Dyn DNS and it seems their website is down as well.

This is a coordinated attack and probably took a good amount of planning.


Is anyone else having problems with paypal?



Like what you read here? Follow Me!
https://www.seoclerks.com/user/Razzy


Thanks,

Razzy

Comments

Please login or sign up to leave a comment

Join
EliteWriter
Yes I noticed that there was something wrong on PayPal earlier. However now it seems to be fine as I managed to log in.



Are you sure you want to delete this post?

procoder
Yeah, they're getting hit by a massive ddos attack wave in the history, and it seems that they all are using the same dns service "Dyn Dns" which was the target of that ddos attack. I've been wondering how is that possible, it should be really really a powerful attack since the world's biggest sites are facing a lot of problems right now. DDOS attacks are in rise these days, and basically there is no way to stop a ddos attack, the only way is to "mitigate" it which in the most cases it doesn't work always if the attack is very powerful like in this case.

I'm pretty sure that behind this attack it's a massive botnet, botnet basically can infect any kind of device, can you imagine if all of those devices will be used for ddos attack? Whoever is doing that, it has some serious power on his hand that can cause a lot of damage, if they don't stop it in time.



Are you sure you want to delete this post?

EliteWriter
In such a case, would people's funds in PayPal accounts be at a risk?



Are you sure you want to delete this post?

TommyCarey
No, it basically just overloads the server and crashes it. All sensitive data is locked away and can't be accessed.



Are you sure you want to delete this post?

EliteWriter
Thanks I appreciate your explanations Razzy and Procoder.



Are you sure you want to delete this post?

procoder
No it does not affect data, it cause only malfunction on the server.



Are you sure you want to delete this post?

hitmeasap
I don't understand these DDOS things, but from what I've heard, there's literally only 2 countries that could have done something like this. Russia and China. But that can't be the case, right? - I mean, DDOS attacks are common in e-sport tournaments nowadays, and it looks like a ddos attack could be done with the use of 1 computer to mess with an entire tournament..



Are you sure you want to delete this post?

procoder
I'll try to make it easy to understand as much as possible.

DOS (Denial of Service) - Attacking from one device only
DDOS(Distributed Denial of Service) - Attacking from multiple devices

Now, DOS and DDOS are the same thing, the only difference is that DDOS it has much power as it will use multiple infected devices to attack the "target".

The function of DDOS is to flood the server with huge traffic that exceed the maximum of capacity that the server can handle. Let's say you have a website that can handle only 2K visitors/day, so if your server will receive 10K visitors / day , so definitely your website will go down as the max of visitors that server can handle is only 2K.



Are you sure you want to delete this post?

hitmeasap
Thank you pro, I appreciate the explanation. Seems pretty easy to flood a server with traffic then. As long as you know the capacity of it. I mean, you should basically be able to flood a server using a pretty simple traffic bot then? Or am I wrong?



Are you sure you want to delete this post?

procoder
You're welcome! I can't say yes or no, the only thing that I know is that it depends on many factors, especially on the server protection.



Are you sure you want to delete this post?

MusicMoguls
Hey Razzy im glad you made a topic about this you actually beat me to it lol! Paypal is not the only site thats being affected by this attack. Soundcloud, Paypal, Twitter, Netflix and many others are feeling the wrath of this denial of service attack. The entire east coast is being hit and downed by this its insane! I wonder what kind of resources you need to pull off an attack like this. They have been saying that the attack has been coming from different places all over the world. The company DYN which is the main company being attacked made a statement on twitter about the situation. They Said "?We are aware of the ongoing service interruption of our Managed DNS network. For more information visit our status page." What i dont understand is how did they think that message would reach everyone if Twitter is also being attacked lol. Thanks for sharing this world event!



Are you sure you want to delete this post?

hitmeasap
We had some crazy problems with Swedish sites too. Government websites for instance, have been affected. However, due to the paypal discussion. In case paypal actually got hacked, and not DDOS attacked, and people's money got stolen.. Would you get the funds back?

I believe I read somewhere a few years ago, that paypal never would return the funds in case your own account got hacked, so how about paypal being hacked themselves?



Are you sure you want to delete this post?

Lynne
Andre I would assume banks and online payment processors like Paypal would have to have insurance and be covered for this sort of thing right?



Are you sure you want to delete this post?

MusicMoguls
Im glad you bring this up! In my opinion getting your money back would depend on the size of the attack and how much funds where stolen. If they hacked all of Paypal and stole millions of dollars i think its safe to say that your money would not get returned and Paypal would have to file for some sort of bail out or go bankrupt. Fortunately with this type of attack no information or money is stolen. Basically you have to think of it as a 4 lane highway and an accident happened closing 4 of the 4 lanes. Traffic gets backed up and nobody can move down the road smoothly. I believe this has been resolved already but its a eye opener. These guys made it look very easy to take down an entire coast. I just wonder if the DDOS was a diversion and they hacked something else in the meantime. These guys are becoming smarter by the day. We cant trust that our government would tell us the truth either.



Are you sure you want to delete this post?

exjordanary
Thee Source of many of the DDOS Attacks targeted at Visa, Mastercard, and Paypal is by the "Anonymous" Hacktivist Group.
Paypal is being targeted with a ddos attack

The attack is called "OPERATION PAYBACK" - and is in retaliation for Paypal retracting their Support for the 'Anonymous' Organization.
Just Google "Anonymous DDOS Operation Payback"
-ex



Are you sure you want to delete this post?

anwebservices
Well for hackers it's big challenge to disable such large and powerful server like PayPal and similar websites have, so it can be testing some new way of DDOS attack Paypal is being targeted with a ddos attack Doesn't have to be "REAL" attack! You know, nowadays a lot of kids doing such things to challenge them selves either.
Hopefully it's not something serious that PayPal server can't take, and thanks for sharing such information, so we are informed if website is inaccessible sometime this days Paypal is being targeted with a ddos attack

Regards
ANWEBSERVICES



Are you sure you want to delete this post?

procoder
Yeah, but it's not that they attacked directly paypal, they ddoses the Dyn DNS company that the biggest sites were using as upstream dns provider , let's say they took down the "heart" of those sites. Basically all websites that are hosted by their service were offline due to that cyberattack, and from what I've heard there are many sites hosted by them. If they had power to take down a powerful dns service as Dyn DNS is, basically they can do whatever they want. And according to some security sites this was the biggest ddos attack in the history exceeding 1TBs.



Are you sure you want to delete this post?

Lynne
Oh my gosh this is insane. The worst part of this ddos attack is that if you what you are saying it just means it is a pure malicious attack? I can understand why people would want to hack into Paypal and steal money but what they are doing can't really have any benefit other than maybe giving them a kick... but the amount of people that are inconvenienced and perhaps loss of income because people can't buy anything if they use Payapl...



Are you sure you want to delete this post?

Cristian
I read the news last night, everyone was going crazy about these attacks. I wonder who really is behind them? Is in the Russian hackers? Because I had no problem accessing all the attacked websites last night, everything was working great for me while people in the US were going nuts so it was definitely a targeted attack.

FB was still online, though, guess they have a better defence against DDoS attacks. The attack on Paypal worries me the most, I rely on Paypal 100% for my freelance payments.



Are you sure you want to delete this post?

MusicMoguls
If i had to play the game of guess who, i would probably say Russia or China is Behind this. You have to remember these sites where not attacked directly. The company that handles all of the DNS servers for these websites was attacked therefore crippling all of the clients they where serving at the time. Your payments or your data is not affected by a DDOS attack. Basically what this type of attack does is close down access to the sites, in no way did these guys gain control of anyones funds or accounts. They did not steal information rather they just sent so much traffic to the DNS Server provider that nobody could access the sites.



Are you sure you want to delete this post?

idealmike
It seems as though we are through the worst of this now. These things happen from time to time and they get a little bit more prepared for it each time it happens. This one was a big ddos attack though with Dyn saying up to 10,000,000 IP addresses being used and it effected a lot more sites and services other than just PayPal as some of you many know it's effected a lot of online services, TV streaming services and the like from PSN (meaning I couldn't play COD for a while!), Hulu and Netflix, Reddit, Spotify, Etsy, Shopify, Github, Imgur, Twitter and Pinterest and several other big social media sites were effected by it all for a while.

But like most ddos attacks, eventually they run out of steam. In this case IP's, and it calms down and services start working again. If anything all it does it cause a temporary downtime and inconvenience for the users of those sites and services. And that is what they do it for! To be an inconvenience for them and the sites/services. No other real reason other than that to try and prevent them from making money and just because they can. But only for a while until they get ready to launch their next strike which could come from anywhere at any time!

Ah well, but such is the nature of the Internet. But what can you do about it?



Are you sure you want to delete this post?

Corzhens
It looks like the DDOS attack is similar to email flooding of the olden days to paralyze the inbox. But this time it is the server that is the target. I wonder why such attacks can be done to a server. From what I understand of the server, it has a filtering method so spams and bots cannot just enter it freely. And with Paypal as a huge company, I don't think that DDOS can be successful in its mission.



Are you sure you want to delete this post?

Order Now
Process Time: 0.82481098175049

Possible Duplicate queries found!
MatchCountSQLScript
SELECT * FROM members_ledger WHERE ip = ? AND added>=unix_timestamp(NOW())-864001SELECT querystring, added FROM members_ledger WHERE ip = ? AND added>=unix_timestamp(NOW())-86400

/opt/clerks-staging/docroot/include/functions/includes/security.php 398 fetchMemberLedger() include_once()

SELECT * FROM `questions` as q JOIN categories_faq as c ON q.catid=c.CATID WHERE (q.status=1 OR (q.status=2 AND userid='') ) AND q.quesid='20126'1SELECT q.*, c.seo as CatSEO, c.name as CatName, c.parentid FROM `questions` as q JOIN categories_faq as c ON q.catid=c.CATID WHERE (q.status=1 OR (q.status=2 AND userid='') ) AND q.quesid='20126'

/opt/clerks-staging/docroot/viewfaq.php 496 () ()

SELECT * FROM seoclerks.members WHERE USERID='19821'1SELECT * FROM seoclerks.members WHERE USERID='19821'

/opt/clerks-staging/docroot/include/functions/includes/member.php 445 GetAllUserDetails() ()

SELECT * FROM categories_faq WHERE CATID='55'1SELECT CATID, seo, name, metatitle, h2header, metakeywords, metadescription, metaheader, parentid, image_name FROM categories_faq WHERE CATID='55'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() GetCategorySeoFromType()

SELECT * FROM seoclerks.members WHERE USERID=198211SELECT googleplus_profile FROM seoclerks.members WHERE USERID=19821

/opt/clerks-staging/docroot/include/functions/main.php 16914 GetGooglePlusProfileFromId() ()

SELECT * FROM ratings_faq as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=20126 LIMIT 51SELECT m.username FROM ratings_faq as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=20126 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM answers a, seoclerks.members b WHERE a.quesid='20126' AND a.userid=b.USERID and b.status='1' AND a.status=1 ORDER BY a.combined_votes DESC, a.date_answered asc1SELECT a.answer, a.USERID, a.upvotes, a.downvotes, a.ansid, a.parentid, a.combined_votes, a.date_answered, b.username, b.userlevel, b.profilepicture FROM answers a, seoclerks.members b WHERE a.quesid='20126' AND a.userid=b.USERID and b.status='1' AND a.status=1 ORDER BY a.combined_votes DESC, a.date_answered asc

/opt/clerks-staging/docroot/viewfaq.php 1245 () ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109825 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109825 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109827 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109827 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109828 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109828 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109831 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109831 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109939 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109939 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109830 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109830 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109860 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109860 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109868 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109868 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109870 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109870 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109875 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109875 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109833 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109833 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109859 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109859 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109872 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109872 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109888 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109888 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=110307 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=110307 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109840 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109840 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109851 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109851 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109846 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109846 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109877 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109877 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109889 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109889 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109974 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=109974 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=126001 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=126001 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

UPDATE questions SET total_views = total_views + 1 WHERE quesid='20126'1UPDATE questions SET total_views = total_views + 1 WHERE quesid='20126'

/opt/clerks-staging/docroot/include/functions/main.php 1765 update_Faqviewcount() ()

SELECT * FROM questions WHERE quesid!='20126' AND status='1' AND (question like '%Paypal targeted ddos attack%' OR question like '%Paypal%' OR question like '%targeted%' OR question like '%ddos%' OR question like '%attack%') -- ORDER BY RAND() LIMIT 151SELECT quesid, question, seo, userid FROM questions WHERE quesid!='20126' AND status='1' AND (question like '%Paypal targeted ddos attack%' OR question like '%Paypal%' OR question like '%targeted%' OR question like '%ddos%' OR question like '%attack%') -- ORDER BY RAND() LIMIT 15

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() ()

SELECT * FROM seoclerks.members WHERE USERID='2255' limit 11SELECT profilepicture FROM seoclerks.members WHERE USERID='2255' limit 1

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_member_profilepicture()

SELECT * FROM seoclerks.members WHERE USERID='9329' limit 11SELECT profilepicture FROM seoclerks.members WHERE USERID='9329' limit 1

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_member_profilepicture()

SELECT * FROM seoclerks.members WHERE USERID='2429' limit 11SELECT profilepicture FROM seoclerks.members WHERE USERID='2429' limit 1

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_member_profilepicture()

SELECT * FROM seoclerks.members WHERE USERID='2921' limit 11SELECT profilepicture FROM seoclerks.members WHERE USERID='2921' limit 1

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_member_profilepicture()

SELECT * FROM seoclerks.members WHERE USERID='8695' limit 11SELECT profilepicture FROM seoclerks.members WHERE USERID='8695' limit 1

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_member_profilepicture()

SELECT * FROM members_ledger WHERE script='/opt/clerks-staging/docroot/viewfaq.php' AND querystring LIKE '%id=20126%' AND added>=UNIX_TIMESTAMP(NOW())-1200 GROUP BY USERID 1SELECT USERID, username FROM members_ledger WHERE script='/opt/clerks-staging/docroot/viewfaq.php' AND querystring LIKE '%id=20126%' AND added>=UNIX_TIMESTAMP(NOW())-1200 GROUP BY USERID

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() ()

SELECT * FROM categories1SELECT * FROM categories

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() parseRedundantQueriesCache()

select * from categories_software order by name asc1select * from categories_software order by name asc

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_GetSoftwareCategories()

select * from categories_wanttobuy order by name asc1select * from categories_wanttobuy order by name asc

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_wantcategories()

select * from categories_wanttotrade order by name asc1select * from categories_wanttotrade order by name asc

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_tradecategories()

SELECT * FROM seoclerks.members WHERE USERID='212316.jpg'1SELECT profilepicture FROM seoclerks.members WHERE USERID='212316.jpg'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage()

SELECT * FROM seoclerks.members WHERE USERID='377074.png'1SELECT profilepicture FROM seoclerks.members WHERE USERID='377074.png'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage()

SELECT * FROM seoclerks.members WHERE USERID='19821.png'1SELECT profilepicture FROM seoclerks.members WHERE USERID='19821.png'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage()

SELECT * FROM seoclerks.members WHERE USERID='6160.png'1SELECT profilepicture FROM seoclerks.members WHERE USERID='6160.png'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage()

SELECT * FROM seoclerks.members WHERE USERID='139192.png'1SELECT profilepicture FROM seoclerks.members WHERE USERID='139192.png'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage()

SELECT * FROM seoclerks.members WHERE USERID='306632.jpg'1SELECT profilepicture FROM seoclerks.members WHERE USERID='306632.jpg'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage()

SELECT * FROM seoclerks.members WHERE USERID='3764.png'1SELECT profilepicture FROM seoclerks.members WHERE USERID='3764.png'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage()

SELECT * FROM seoclerks.members WHERE USERID='254580.jpg'1SELECT profilepicture FROM seoclerks.members WHERE USERID='254580.jpg'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage()

SELECT * FROM seoclerks.members WHERE USERID='134.png'1SELECT profilepicture FROM seoclerks.members WHERE USERID='134.png'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage()

SELECT * FROM seoclerks.members WHERE USERID='272.jpg'1SELECT profilepicture FROM seoclerks.members WHERE USERID='272.jpg'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage()

SELECT * FROM seoclerks.members WHERE USERID='600657.jpg'1SELECT profilepicture FROM seoclerks.members WHERE USERID='600657.jpg'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage()

select * from categories_faq order by name asc1select * from categories_faq order by name asc

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_GetFaqCategories()

Invalid SQL

count(*)sql1error_msg

Expensive SQL

Tuning the following SQL could reduce the server load substantially
LoadCountSQLMaxMin

Suspicious SQL

The following SQL have high average execution times
Avg TimeCountSQLMaxMin