In my experience, OVH is one of the larger worlwide host of spammers, DDoS, 
intrusion attempts (SIP, SSH, IMAP, SMTP, etc., etc.), etc., together with 
cloudstar.is. Any criminal action you can think off … sure a IPs from OVH or 
Cloudstar are involved!

 

I’m sure there are many other, but in my own case, this is the major %.

 

I’m fighting with them every other day, they never do *anything* despite having 
provided logs, demonstrations of GDPR abuse, etc., etc.

 

For some reason, it looks to me that most of the so called “email marketing” 
companies (or databases), which to me are all criminal companies (because it is 
clear that they keep breaking GDPR and many other rules every other day), using 
OVH (and sometimes other DCs), are from France. May be their DPA is not doing 
anything or maybe nobody is complaining “enough” to them.

 

Regards,

Jordi

@jordipalet

 

 

 

El 12/2/20 18:51, "anti-abuse-wg en nombre de Javier Martín" 
<anti-abuse-wg-boun...@ripe.net en nombre de javier.mar...@centrored.net> 
escribió:

 

Hi all.

This one of the abuse emails that cries out to heaven.

There is an idiot who does not stop attacking us and does not answer the abuse 
email.

Someone knows what to do in this cases? RIPE said that is nothing to do because 
there is not a "return from their server" to our email.

This provider is full of spam, we banned all theirs ips. 

https://en.asytech.cn/check-ip/89.248.160.193

https://ipinfo.io/AS202425

It is very striking how a Seychelles provider with a new AS number can spam 
without limits.

Kind regards.

Javier

Sobre 12/02/2020 18:44:24, Alex de Joode <a...@idgara.nl> escribió:

Alessandro,

 

The abuse notification below, is absolutely terrible: it only highlights the 
OVH IP that was used, however it completely fails to identify the IP/hostname 
that was "attacked", no action (other than forward the notice to the user of 
the IP) can be taken.​

 

Please in the future include all relevant data in you abuse notice. (src+dst ip 
are relevant!)

 

Thx.

​-- 

IDGARA | Alex de Joode | a...@idgara.nl | +31651108221 | Skype:adejoode


On Wed, 12-02-2020 13h 16min, Alessandro Vesely <ves...@tana.it> wrote:


Dear Abuse Team

The following abusive behavior from IP address under your constituency
188.165.221.36 has been detected:

2020-02-11 11:39:25 CET, 188.165.221.36, old decay: 86400, prob: 34.72%, SMTP 
auth dictionary attack

188.165.221.36 was caught 102 times since Fri May 18 01:42:13 2018

original data from the mail log:
2020-02-11 11:39:05 CET courieresmtpd: started,ip=[188.165.221.36],port=[58534]
2020-02-11 11:39:05 CET courieresmtpd: started,ip=[188.165.221.36],port=[62026]
2020-02-11 11:39:05 CET courieresmtpd: started,ip=[188.165.221.36],port=[63198]
2020-02-11 11:39:25 CET courieresmtpd: started,ip=[188.165.221.36],port=[58743]
2020-02-11 11:39:25 CET courieresmtpd: started,ip=[188.165.221.36],port=[50520]
2020-02-11 11:39:25 CET courieresmtpd: 
error,relay=188.165.221.36,port=58743,msg="535 Authentication failed.",cmd: 
AUTH LOGIN 42D117A2.9F10013D




**********************************************
IPv4 is over
Are you ready for the new Internet ?
http://www.theipv6company.com
The IPv6 Company

This electronic message contains information which may be privileged or 
confidential. The information is intended to be for the exclusive use of the 
individual(s) named above and further non-explicilty authorized disclosure, 
copying, distribution or use of the contents of this information, even if 
partially, including attached files, is strictly prohibited and will be 
considered a criminal offense. If you are not the intended recipient be aware 
that any disclosure, copying, distribution or use of the contents of this 
information, even if partially, including attached files, is strictly 
prohibited, will be considered a criminal offense, so you must reply to the 
original sender to inform about this communication and delete it.

Reply via email to