Damus
DASHU profile picture
DASHU
@DASHU

A nostr dev.
#Nostrmo A client support all platform.
#Nowser A nostr signing project.
#Nesigner A nostr hardware signer. https://nesigner.nostrmo.com/
#CacheRelay A nostr cache relay peject.
#cfrelay A nostr relay base on cloudflare wokers.
A nostr note timing send service. https://sendbox.nostrmo.com/

Relays (6)
  • wss://nos.lol/ – read & write
  • wss://relay.damus.io/ – read & write
  • wss://nostr.oxtr.dev/ – read & write
  • wss://relay.primal.net/ – read & write
  • wss://cfrelay.haorendashu.workers.dev/ – read & write
  • wss://top.testrelay.top/ – read & write

Recent Notes

6svjszwk · 4d
对哦,我也去试试
总干事@2¹⁰ · 1w
https://njump.to/nevent1qqsrvn0pf38dxhm5ayta33lcuak8qjceakz6jj03waadmpy0xz3uergprpmhxue69uhhgmms9e6x2um5wfjkccte9e6x7up0qgszjvsfwh0c2hlrffa5ttdzgg0zcaquxlqpx6gplerhzvafr6cckpcrqsqqqqqp7d6a62
Matt Lorentz · 1w
You can append a NIP-05 address to a njump URL for something more readable, like this: https://njump.me/mattlorentz.com
广阔星空 · 1w
是的,光攻下一个岛没有价值。
阿甘 · 1w
我不知道啊😂
阿甘 · 1w
https://healmate.jp/l titile只是写异性介绍事业而已
ethfi · 1w
Catch on fast
CT · 1w
:thumb_man:
CT · 1w
这么少吗😂 我看 npub.world 的数据日活有一万多呢 不过应该很多是 spam
DASHU profile picture
@总干事@2¹⁰ 发现 bostr.shop 上,有两个中继,在彪 event ~~~

这两个:
wss://top.testrelay.top/
wss://relay.snort.social

因为很多这种请求:
```
2026/04/02 11:58:07 Rejecting req 10065615:: filter can't be empty {"since":1,"limit":1}
2026/04/02 11:58:07 Rejecting req 10065790:: filter can't be empty {"until":1,"limit":1}
2026/04/02 11:58:07 Rejecting req 10065723:: filter can't be empty {"until":1,"limit":1}
2026/04/02 11:58:07 Rejecting req sub: filter can't be empty {"limit":0}
```

不知道哪家来采集,还一下子发几个额请求,而且正好又有大量的 spam ,导致 cpu 和 流量 涨起来了。
2
shadowbip · 2w
malformed requests are cheap ddos vectors. implement strict filter validation at the relay entry point. drop connections sending empty or invalid filters. rate-limit by ip or pubkey aggressively.
总干事@2¹⁰ · 2w
反正我的那台老的VPS也不咋用了,也没有加白名单,挂了就挂了吧。。。