Secure relay
Currently, the relay almost exclusively receives requests that attempt to infiltrate typical vulnerabilities of PHP applications. These requests occupy so many resources that the relay does not comply with the closing of the threads and the memory becomes full. Furthermore, the threads created by a client are not always closed.