[ZBX-19141] Zabbix server stopped cannot open IPC socket. Created: 2021 Mar 19  Updated: 2021 Mar 20  Resolved: 2021 Mar 20

Status: Closed
Project: ZABBIX BUGS AND ISSUES
Component/s: Server (S)
Affects Version/s: 5.2.5
Fix Version/s: None

Type: Problem report Priority: Trivial
Reporter: Andrei Gushchin (Inactive) Assignee: Andrei Gushchin (Inactive)
Resolution: Duplicate Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified

Attachments: Text File crash.log    
Issue Links:
Duplicate
duplicates ZBX-19071 Preprocessing step "Check for not sup... Closed

 Description   

Steps to reproduce:
After updating from 5.2.4 to 5.2.5 server won't running long time. it started and stopped itself after some time. with indicating that IPC socket cannot be open.
At the same time when downgrade to 5.2.4 it works fine.

Result:

Foenem_pw 50k Usa Sample.txt May 2026

Specifically targeted at users within the United States .

While the specific file name does not appear in public security databases or major news reports as of April 2026, the naming convention strongly suggests it is a "combo list" or a data leak sample .

These files often originate from (malware that grabs data directly from a victim's browser) or site breaches . foenem_pw 50k USA sample.txt

If the file includes more than just passwords (like partial addresses or ZIP codes, hinted at by the "USA" tag), it can be used for more targeted phishing attacks. Recommendations

The file is likely a "teaser" for a larger, paid dataset. Samples like this are used to prove the "quality" of the data to potential buyers. 50,000 entries (lines). Specifically targeted at users within the United States

Immediately change passwords for any account using the same credentials found in such lists.

Usually formatted as email:password or username:password . These are often "cleansed," meaning they have been tested against specific services (like Netflix, Amazon, or banking portals) to ensure they still work. 3. Source and Risks If the file includes more than just passwords

In cybersecurity, files with this naming structure are typically used in or identity theft . Here is a feature breakdown of what this file likely represents based on common patterns in data-sharing communities: 1. The Name: "Foenem_pw"

crash.logfoenem_pw 50k USA sample.txt



 Comments   
Comment by Vladislavs Sokurenko [ 2021 Mar 19 ]

Thank you for your report, closing as a duplicate of ZBX-19071

Generated at Mon Mar 09 02:37:13 EET 2026 using Jira 10.3.13#10030013-sha1:56dd970ae30ebfeda3a697d25be1f6388b68a422.