1. Username, UUID, IP(s), and a short ban reason for each offender. Format as follows:
SaulDoodman:
uuid: '0fcdfb74-5684-4153-bd97-e35b9bec2c28'
ips:
- 23.105.186.149
reason: 'Chunkbanning players with exploits & & attempting to lag the server with entity spam'
2. What did they do? Chunkbanning with crossbows, same exploit as a currently indefinitely banned player (wtfcat)
3. What indefinitely bannable offense does this fall under according to the guidance for sanctions?
1a. Attempts at harming the server.
1b. Repeated rule-breaking (recurring category 2 & 3 offenses or punishment bypassing).
1g. Using an exploit that restricts a player's experience.
1. Respect & remain mindful of other members of the community.
2. Respect the platforms we run
3. Join the community to engage and have fun, not to advertise, promote hate or otherwise try to harm the overall community
4. Add logs and/or screenshots of the occurrence here, and tag any witnessing staff. Evidence of previous offenses that are not the direct cause of this request can also be added here.
Note the amount of rejoins.
[06:17:58 INFO]: SaulDoodman lost connection: Internal Exception: io.netty.handler.codec.DecoderException: java.lang.RuntimeException: Tried to read NBT tag that was too big; tried to allocate: 2097160bytes where max allowed: 2097152
[06:17:58 INFO]: SaulDoodman left the game.
[06:18:01 INFO]: UUID of player SaulDoodman is 0fcdfb74-5684-4153-bd97-e35b9bec2c28
[06:18:01 INFO]: SaulDoodman[/23.105.186.149:47452] logged in with entity id 79176 at ([flatlands]-25706.531189789384, 50.0, 16726.737753873567)
[06:18:01 INFO]: SaulDoodman joined the game.
[06:22:37 INFO]: SaulDoodman lost connection: Internal Exception: io.netty.handler.codec.DecoderException: java.lang.RuntimeException: Tried to read NBT tag that was too big; tried to allocate: 2097155bytes where max allowed: 2097152
[06:22:37 INFO]: SaulDoodman left the game.
[06:22:41 INFO]: UUID of player SaulDoodman is 0fcdfb74-5684-4153-bd97-e35b9bec2c28
[06:22:41 INFO]: SaulDoodman[/23.105.186.149:48732] logged in with entity id 79597 at ([flatlands]-25706.441812460267, 50.0, 16728.68561115761)
I knew the exploit was used because I have witnessed the same error below:
This is what happens when you use a version such as 1.18.2.
[06:08:56] [Server thread/INFO]: SaulDoodman[/23.105.186.149:39269] logged in with entity id 76983 at ([flatlands]-12952.815606146676, 50.0, -26423.99276476481)
[06:08:56] [Server thread/INFO]: SaulDoodman joined the game.
[06:09:12] [Server thread/INFO]: SaulDoodman issued server command: /tps
[06:09:20] [Netty Epoll Server IO #3/WARN]: [ViaVersion] ERROR IN Protocol1_18To1_17_1 IN REMAP OF CLICK_WINDOW (0x08)
[06:09:20] [Netty Epoll Server IO #3/WARN]: io.netty.handler.codec.DecoderException: com.viaversion.viaversion.exception.InformativeException: Please post this error to https://github.com/ViaVersion/ViaVersion/issues and follow the issue template
[06:09:20] [Netty Epoll Server IO #3/WARN]: {Packet Type: CLICK_WINDOW, Type: FlatVarIntItem, Data: [Pair{Type|Unsigned Byte, 3}, Pair{Type|VarInt, 6}, Pair{Type|Short, -999}, Pair{Type|Byte, 6}, Pair{Type|VarInt, 5}, Pair{Type|VarInt, 6}, Pair{Type|Short, 0}], Source 0: com.viaversion.viaversion.rewriter.ItemRewriter$9 (Anonymous), Packet ID: 8}
[06:09:20] [Netty Epoll Server IO #3/WARN]: Actual Error:
[06:09:20] [Netty Epoll Server IO #3/WARN]: Caused by: java.lang.IllegalArgumentException: Cannot read NBT (got 3323676 bytes)
[06:09:20] [Netty Epoll Server IO #3/WARN]: at com.google.common.base.Preconditions.checkArgument(Preconditions.java:163)
[06:09:20] [Netty Epoll Server IO #3/WARN]: at ViaVersion-4.4.1.jar//com.viaversion.viaversion.api.type.types.minecraft.NBTType.read(NBTType.java:44)
[06:09:20] [Netty Epoll Server IO #3/WARN]: at ViaVersion-4.4.1.jar//com.viaversion.viaversion.api.type.types.minecraft.NBTType.read(NBTType.java:36)
[06:09:20] [Netty Epoll Server IO #3/WARN]: at ViaVersion-4.4.1.jar//com.viaversion.viaversion.api.type.types.minecraft.FlatVarIntItemType.read(FlatVarIntItemType.java:44)
[06:09:20] [Netty Epoll Server IO #3/WARN]: at ViaVersion-4.4.1.jar//com.viaversion.viaversion.api.type.types.minecraft.FlatVarIntItemType.read(FlatVarIntItemType.java:30)
[06:09:20] [Netty Epoll Server IO #3/WARN]: at ViaVersion-4.4.1.jar//com.viaversion.viaversion.protocol.packet.PacketWrapperImpl.read(PacketWrapperImpl.java:135)
[06:09:20] [Netty Epoll Server IO #3/WARN]: at ViaVersion-4.4.1.jar//com.viaversion.viaversion.protocol.packet.PacketWrapperImpl.passthrough(PacketWrapperImpl.java:181)
[06:09:20] [Netty Epoll Server IO #3/WARN]: at ViaVersion-4.4.1.jar//com.viaversion.viaversion.rewriter.ItemRewriter$9.lambda$registerMap$0(ItemRewriter.java:190)
[06:09:20] [Netty Epoll Server IO #3/WARN]: at ViaVersion-4.4.1.jar//com.viaversion.viaversion.api.protocol.remapper.PacketRemapper.remap(PacketRemapper.java:158)
[06:09:20] [Netty Epoll Server IO #3/WARN]: at ViaVersion-4.4.1.jar//com.viaversion.viaversion.api.protocol.AbstractProtocol.transform(AbstractProtocol.java:324)
[06:09:20] [Netty Epoll Server IO #3/WARN]: at ViaVersion-4.4.1.jar//com.viaversion.viaversion.protocol.packet.PacketWrapperImpl.apply(PacketWrapperImpl.java:376)
[06:09:20] [Netty Epoll Server IO #3/WARN]: at ViaVersion-4.4.1.jar//com.viaversion.viaversion.protocol.packet.PacketWrapperImpl.apply(PacketWrapperImpl.java:359)
[06:09:20] [Netty Epoll Server IO #3/WARN]: at ViaVersion-4.4.1.jar//com.viaversion.viaversion.protocol.packet.PacketWrapperImpl.apply(PacketWrapperImpl.java:46)
[06:09:20] [Netty Epoll Server IO #3/WARN]: at ViaVersion-4.4.1.jar//com.viaversion.viaversion.protocol.ProtocolPipelineImpl.transform(ProtocolPipelineImpl.java:123)
[06:09:20] [Netty Epoll Server IO #3/WARN]: at ViaVersion-4.4.1.jar//com.viaversion.viaversion.connection.UserConnectionImpl.transform(UserConnectionImpl.java:313)
[06:09:20] [Netty Epoll Server IO #3/WARN]: at ViaVersion-4.4.1.jar//com.viaversion.viaversion.connection.UserConnectionImpl.transformServerbound(UserConnectionImpl.java:297)
[06:09:20] [Netty Epoll Server IO #3/WARN]: at ViaVersion-4.4.1.jar//com.viaversion.viaversion.bukkit.handlers.BukkitDecodeHandler.decode(BukkitDecodeHandler.java:55)
[06:09:20] [Netty Epoll Server IO #3/WARN]: at jdk.internal.reflect.GeneratedMethodAccessor54.invoke(Unknown Source)
[06:09:20] [Netty Epoll Server IO #3/WARN]: at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
[06:09:20] [Netty Epoll Server IO #3/WARN]: at java.base/java.lang.reflect.Method.invoke(Method.java:568)
[06:09:20] [Server thread/INFO]: SaulDoodman lost connection: Internal Exception: io.netty.handler.codec.DecoderException: com.viaversion.viaversion.exception.InformativeException: Please post this error to https://github.com/ViaVersion/ViaVersion/issues and follow the issue template
{Packet Type: CLICK_WINDOW, Type: FlatVarIntItem, Data: [Pair{Type|Unsigned Byte, 3}, Pair{Type|VarInt, 6}, Pair{Type|Short, -999}, Pair{Type|Byte, 6}, Pair{Type|VarInt, 5}, Pair{Type|VarInt, 6}, Pair{Type|Short, 0}], Source 0: com.viaversion.viaversion.rewriter.ItemRewriter$9 (Anonymous), Packet ID: 8}
Actual Error:
[06:09:20] [Server thread/INFO]: SaulDoodman left the game.
Display More
5. Are they known under any other names or IPs, and if so, are they currently (indefinitely) banned under those names and IPs? This information is used to keep track of ban bypassers. Yes, they are wtfcat.