{"id":53910,"date":"2021-12-01T16:15:17","date_gmt":"2021-12-01T14:15:17","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=53910"},"modified":"2025-09-03T17:33:03","modified_gmt":"2025-09-03T14:33:03","slug":"qihoo-360-creates-mining-tracking-system-for-chinese-authorities","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/qihoo-360-creates-mining-tracking-system-for-chinese-authorities\/","title":{"rendered":"Qihoo 360 creates mining-tracking system for Chinese authorities"},"content":{"rendered":"<p>The Chinese cybersecurity company Qihoo 360 <a href=\"https:\/\/mp.weixin.qq.com\/s\/E3MzWQ-XT55wIC7S8FYD7w\">announced<\/a> that it has created a system for monitoring mining operations, designed to help authorities combat the sector.<\/p>\n<p>The 360 Threat Situation Monitoring System is intended for regional government bodies and agencies that must <a href=\"https:\/\/forklog.com\/en\/news\/bitcoin-slips-below-42000-as-china-tightens-crypto-trading-regulation\">comply with measures<\/a> to counter cryptocurrency mining.<\/p>\n<p>According to the company, the software identifies miner IP addresses, geographic location, type and frequency of connections, and also offers methods to suppress them.<\/p>\n<p>According to Qihoo 360, in November an average of 109,000 IP addresses were used daily for mining. The bulk of activity was in Guangdong, Jiangsu, Zhejiang and Shandong provinces.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/6G3cCyvi_in-IY5UfKrUQmAyXpRBFtnpgwUja9oxUOrwlFhF0TZheKw4od7NEX1Z2vrAByhobHoQiu1skyrvNvlvzrEKsD39oHi1FqNdpLUBX48tF29i_i4Jb-UI-VEblnGxca\" alt=\"Qihoo 360 has created a mining-tracking system for Chinese authorities\"\/><figcaption>Graph of miner activity in China. Data: Qihoo 360.<\/figcaption><\/figure>\n<p>The system found that miners mainly operate via home broadband, dedicated corporate lines, and data centers.<\/p>\n<p>Qihoo 360 noted that the solution uses its own capabilities in monitoring network traffic, Big Data analytics, and active defense mechanisms.<\/p>\n<p>As reported in late November, a number of leading mining pools <a href=\"https:\/\/forklog.com\/en\/news\/china-restricts-access-to-mining-pool-domains-and-cryptocurrency-media\">was unavailable<\/a> to Chinese users.<\/p>\n<p>Earlier, due to actions by the Chinese authorities, some pools <a href=\"https:\/\/forklog.com\/en\/news\/beepool-mining-pool-to-shut-down-amid-industry-pressure-in-china\">ceased operations<\/a>, others <a href=\"https:\/\/forklog.com\/en\/news\/sparkpool-stops-servicing-users-in-china\">blocked access<\/a> from Chinese IP addresses.<\/p>\n<p>Subscribe to ForkLog News on <a href=\"https:\/\/vk.com\/forklogcom\" target=\"_blank\" rel=\"nofollow noopener\">VK<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Chinese cybersecurity company Qihoo 360 announced that it has created a system to monitor mining operations, intended to help authorities combat the sector.<\/p>\n","protected":false},"author":1,"featured_media":53911,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[133,1306],"class_list":["post-53910","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-china","tag-mining-ban"],"aioseo_notices":[],"amp_enabled":true,"views":"20","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/53910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=53910"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/53910\/revisions"}],"predecessor-version":[{"id":53912,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/53910\/revisions\/53912"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/53911"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=53910"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=53910"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=53910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}