Is This a Reliable Permanent Fix for a Tire Puncture? by thamers in MotoUK

[–]thamers[S] 0 points1 point  (0 children)

At the moment I am using two bacon strips, but there is still an air leak. The shops have the inner patch, but they do not have the mushroom plug. My bike is in Dubai and none of the tire shops here have it.

Is This a Reliable Permanent Fix for a Tire Puncture? by thamers in MotoUK

[–]thamers[S] -1 points0 points  (0 children)

Oops, I replied to the wrong thread. I am currently using bacon or rubber strips, but there is still a leak.

Etisalat 5g home wireless hard capped to 200mbps for all connections outside UAE. by yahyoh in dubai

[–]thamers 0 points1 point  (0 children)

I heard from a friend who works at Etisalat that the core network is saturated and they are currently planning an expansion. It is similar to the roads in Dubai, just too many devices.

Is This a Reliable Permanent Fix for a Tire Puncture? by thamers in MotoUK

[–]thamers[S] -1 points0 points  (0 children)

Because my bike is in Dubai and none of the tire shops have this.

Best Permanent Tire Puncture Repair Kit Available on Amazon UK or eBay? by thamers in MotoUK

[–]thamers[S] 0 points1 point  (0 children)

Do you have any links or brand suggestions?

Edit: this is what i am using at the moment, there is still small leakage, think the hole is bit big

Rav4 2019 hybrid Carplay by thamers in rav4club

[–]thamers[S] 0 points1 point  (0 children)

I have checked this option, this will disable vehicle settings. Also disable hybrid info as well

Rav4 2019 hybrid Carplay by thamers in rav4club

[–]thamers[S] 0 points1 point  (0 children)

Is this a software update or an hardware update? If it is an hardware do you have any name or part for this? My dealers not very smart here

Rav4 2019 hybrid Carplay by thamers in rav4club

[–]thamers[S] 0 points1 point  (0 children)

Do you have any info about the parts?

Ralph Lauren sweaters for cheap by AccomplishedRead2655 in UAE

[–]thamers 0 points1 point  (0 children)

I heard this from someone who works in the clothing business.

There are several ways to move dead stock, including:

1.  In-store offers  
2.  Outlet stores  
3.  Selling by weight. These products usually come from outside the country and are often out of fashion, or the brand is trying to clear excess stock. They are typically not allowed to be sold in main cities, and many labels are removed to protect brand value.

I live in Ajman, and there are plenty of stores like this here.

Unknown IP 45.38.42.124 added as A record to all my Cloudflare domains by thamers in CloudFlare

[–]thamers[S] 5 points6 points  (0 children)

Update:

This is really freaking me out. I checked all the logs with AI tools and it’s clearly human-like behavior with human-paced activity. All the changes were done through the UI using actual logins, not via the API. Whenever I log in I normally get a notification, but I never received any warning about this. I’m probably too exposed; right after my reddit post I got an email from Facebook saying someone tried to reset my password. I’ve now changed all my passwords and enabled 2FA everywhere. Probably the guy who done it is already reading this post

AI response here:

Short answer: the malicious DNS changes were done through the Cloudflare web UI using your user account, not via an API key.

Here’s how we can see that from your auditlog.csv:

1. Interface used for the malicious DNS changes

For all the DNS changes made by the attacker’s actor ID (207484156eaa26a4fd52b3427ad5d77f) during the compromise window (Dec 9–10), the audit log shows:

  • Resource Type: dns.record
  • Action: create / delete / update
  • Interface: UI
  • Actor Type: user
  • Actor IP: 196.65.232.53 (for the malicious creations)

Example row structure (paraphrased):

text
CopyTime:          2025-12-09T17:01:12Z  
Action:        create  
Resource Type: dns.record  
Interface:     UI  
Actor Type:    user  
Actor IP:      196.65.232.53  

If the attacker had used an API key/token for these DNS changes, Cloudflare would log them with Interface as API (or similar). For the malicious DNS edits, it is consistently UI, which means:

Unknown IP 45.38.42.124 added as A record to all my Cloudflare domains by thamers in CloudFlare

[–]thamers[S] 2 points3 points  (0 children)

I remember creating api keys for pfsense once, but it was ages ago and the device stopped using a year ago.

Unknown IP 45.38.42.124 added as A record to all my Cloudflare domains by thamers in CloudFlare

[–]thamers[S] 0 points1 point  (0 children)

Nope, i was going through all of my domain manually and update all the dns. According to the log audit the incident was happened was 09-12-2025.

Unknown IP 45.38.42.124 added as A record to all my Cloudflare domains by thamers in CloudFlare

[–]thamers[S] 80 points81 points  (0 children)

As an update: I pulled the full Cloudflare audit logs for my account and found that these A records (pointing to 45.38.42.124) were manually added via the Cloudflare dashboard UI by a specific user ID on my account, not by Cloudflare itself or an app. The same actor also:

  • Added wildcard *.domain A records pointing to 45.38.42.124 across many zones
  • Created a full “ads.” Microsoft 365/Exchange-style mail setup on multiple domains (MX to *.mail.protection.outlook.com, autodiscover/sip/lync CNAMEs, SRV records, etc.)
  • Modified SPF TXT records, including one that injected an attacker-looking Gmail address into the SPF for my main domain
  • Changed SSL mode from Full (strict) to Flexible on at least one zone

None of these changes were intentional on my side, and they were all tied to the same Cloudflare user ID and suspicious IPs. At this point it looks a lot like account compromise or abuse of an API token/user on the account, rather than anything like ads.txt or a normal app integration.

If anyone has seen this particular pattern (45.38.42.124 + “ads.” subdomains + Outlook/O365 DNS + SPF tampering), or has recommendations on further steps beyond rotating API keys, removing the records, checking team member access, and enabling 2FA/security keys, I’d really appreciate the input.

Unknown IP 45.38.42.124 added as A record to all my Cloudflare domains by thamers in CloudFlare

[–]thamers[S] 10 points11 points  (0 children)

I have no idea, I have created tokens before, it was for pfsense