The virtual transparent screen of the lip lens-type information processor shows that the plan to find a needle in a haystack is completely completed, and there are only less than 10,000 unknown IP addresses that have not been analyzed yet.
At the same time, the basis points of the aon network have accumulated to 1,389,200,186!
This number once again exceeded Shi Lei's estimated 1.2 billion data. Nearly 1.4 billion computer equipment infected with the Goddess of Vengeance virus provides 18 million tflops computing resources for the Aon network.
Under such a huge impact of computing resources, less than 10,000 unknown IP addresses were almost completed in just five minutes, and only less than ten unknown IP addresses were left.
Butler's parent server's real IP address is hidden in it!
Although Aon Network has 18 million tflops computing resources, iwn secret network also has more than 1 million tflops computing resources.
With so many computing resources that break through the sky and analyze the remaining unknown IP addresses, it cannot be completed quickly, which only means that all the rest are hard bones.
The best way is to analyze it one by one!
With the computing resources of Aon Network and iwn Secret Network, it is definitely not a problem to break the remaining IP addresses one by one.
Tao Wenxian and Raphael obviously understood this truth, and they were waiting for Shi Lei to make a choice.
Shi Lei counted the remaining IP addresses, and there were only eight unknown IP addresses in total. Shi Lei did not choose them deliberately. He pointed directly at the first unknown IP address and smiled and said, "Start from the beginning!"
"Okay!" Tao Wenxian and Raphael said in unison.
The three of them began to invade the first unknown IP address. At the beginning, they did not directly mobilize all computing resources. After all, they have too many computing resources. If they use them randomly, they can easily cause network blockage.
That's not the result Shi Lei needs!
Shi Lei is not doing anything to destroy it, what Shi Lei needs is the answer!
For the first time, the three of them used 5 million tflops of computing resources. Such a huge computing resources broke down the opponent's defense just after they touched the opponent's defense.
Then I encountered obstacles again!
However, Shi Lei already knows that the identity information of this unknown IP address is the internal network of the NSA National Security Bureau!
Shi Lei has always been cautious and never provoked the NSA National Security Agency or the Darpa Advanced Agency. To the greatest extent, he only plays with the CIA CIA and the FBI FBI.
If it is normal, after confirming that the other party is the internal network of the NSA National Security Bureau, Shi Lei will definitely retreat silently and clear out all traces of invasion.
Then, the cybersecurity experts of the NSA National Security Administration will also follow the opportunity and choose not to track it, thus avoiding a meaningless battle.
But Shi Lei now has control over AON Network and iwn Secret Network, and has gathered nearly 20 million TFlops of computing resources, so how can he easily retreat?
Even though the NSA National Security Bureau is obviously not the target, Shi Lei still has no intention of retreating.
"Run in and take a look, scan. Look at the guy from NSA, do you know Butler's information!" Shi Lei ordered.
Tao Wenxian and Raphael cooperated with Shi Lei to invade. With the help of huge computing resources, they almost broke the defense of the NSA National Security Agency in a destructive manner.
It’s not that the defense of the NSA National Security Bureau is too trash, nor that the cybersecurity experts of the NSA National Security Bureau are too rookies, but that Shi Lei and the other three are too unreasonable!
They directly used huge computing resources, rushing unreasonably, and easily defeated the defense of the NSA National Security Agency.
Within the NSA National Security Bureau, there is a trenching moment!
As the largest intelligence agency in the Liberian country, the NSA National Security Agency has a very high level of confidentiality, otherwise it would not have been ridiculed as ‘no.’.
Shi Lei and the other two broke through the defense of the NSA National Security Bureau and were about to scan the data within the NSA National Security Bureau when they suddenly found that they could not link to the NSA National Security Bureau's internal network.
Tao Wenxian sarcastically said: "It is embarrassing to have a disconnected network physical connection!"
Raphael did not have many surprises, "NSA National Security Agency has recorded many black operations in the Liberty countries, and it is normal to disconnect the network. They cannot allow us to scan and detect casually in their internal networks. However, the other party disconnected the physical connection to the Internet, which shows that Butler was not hidden in it."
Shi Lei affirmed Raphael's statement, "Well! Butler is not under the protection of the NSA National Security Agency! Cracking the second unknown IP address!"
The National Security Administration temporarily avoided his attack, and Shi Lei did not have any excitement. If it were in the past, Shi Lei might have been proud.
But when Ling Yumo and the others' lives were threatened, Shi Lei had no desire to be proud!
In the second unknown IP address, Shi Lei and the other two still mobilized 5 million TFlops of computing resources and tried to invade. Just like the history of the NSA National Security Bureau before, the huge computing resources easily broke through the opponent's defense.
Shi Lei immediately confirmed the other party's identity.
It turned out to be Xia Guo's Cyber Security Intelligence Department!
Tao Wenxian obviously confirmed the target identity information, and he asked: "Brother Shitou, it's S. Should we retreat?"
After all, the two are from Xia. At the same time, Mirui Technology Group is going to develop in Xia. It seems that it is not good to blatantly invade S Cyber Security Intelligence Department?
However, although the target of the invasion was Xia Guo's Cyber Security Intelligence Department, Shi Lei hesitated for a moment and decided to continue the invasion.
"Continue to attack!" Shi Lei said coldly.
The huge computing resources brought an extremely powerful invasion force. The Cybersecurity Intelligence Department could not stop the invasion of Shi Lei and the other two.
However, the Cybersecurity Intelligence Department's confrontation methods are exactly the same as those of the NSA National Security Agency, directly disconnecting the physical connection from the Internet.
Shi Lei did not want to sincerely invade S Cyber Security Intelligence Department, but just hoped to rule out the suspicion of S Cyber Security Intelligence Department.
As long as the S Cybersecurity Intelligence Department disconnects from the Internet on the physical level and eliminates the suspicion that Butler is hiding in it, Shi Lei will no longer cause trouble for the S Cybersecurity Intelligence Department.
"The third one!" Shi Lei said directly.
...
The three of them invaded seven unknown IP addresses in a row, but none of them were the real IP addresses of Butler's parent server, and only the last one was left!
Shi Lei took a deep breath, although according to theory, this one must be the real IP address of Butler's parent server!
But Shi Lei felt a little worried!
Raphael also frowned. Although the situation of choosing one of the eight was a choice from beginning to end, it was a bit sad that none of the first seven were selected, right?
Tao Wenxian opened his mouth as if he wanted to say something, but in the end he didn't say it.
"Stone, we start invading?" Raphael reminded.
Shi Lei focused his attention, "Okay!"
"How many computing resources are called?" Raphael asked.
"As usual!" Shi Lei said simply. The so-called "As usual" means that he still mobilized 5 million tflops of computing resources. The first seven unknown IP addresses were all defeated by 5 million tflops of computing resources.
The last unknown IP address still uses 5 million tflops computing resources as the basic intrusion data.
However, the unfavorable invasion operation was blocked at the eighth unknown IP address!
That's right!
The 5 million tflops computing resources were actually blocked!
Although the 5 million tflops computing resources are not all resources of Aon Network and iwn Secret Network, they are also a huge computing resource that cannot be resisted.
This fact has been verified in the first seven unknown IP addresses. Including the NSA National Security Bureau, it cannot withstand 5 million TFlops computing resources!
However, the huge computing resources that are invincible are actually blocked. What channel does the other party obtain from the computing resources?
The current situation is that the Venezia virus released by Shi Lei has infected more than 1.4 billion computer equipment around the world. Almost 90% of computer equipment worldwide are infected with the Venezia virus.
This also means that Shi Lei controls most computer equipment around the world and collects almost all computing resources that can be collected.
Even if others have the same technology as Shi Lei, they can create super viruses like the Goddess of Vengeance virus, and there is no computer device to be infected.
Shi Lei didn't understand why the eighth unknown IP address could withstand their attack?
Could it be the eighth unknown IP address, which has a private supercomputer cluster, and has more than 1 million tflops of computing resources?
Shi Lei didn't believe this situation at all!
The cost of a supercomputer is not only the cost of parts, but also the huge maintenance cost. When a supercomputer is running, it requires very high maintenance costs.
If you want to maintain a supercomputer cluster with computing resources of 1 million tflops, the cost investment is simply terrifying.
Shi Lei absolutely doesn't believe that possibility!
But if it weren't for the private supercomputer cluster, what would have been the case that would have resisted Shi Lei's invasion?