Thank you Hector for your help and for escalating internally.

Our company is a Web Risk customer so we push URLs to Web Risk via API as 
opposed to the public facing website.

Would your team be open to possibly vetting my company for direct access to 
report Phishing Websites hosted on GCE or App Engine?

​Dan Babbitt

Director, Security Operations

Allure Security

877-669-8883 x717
https://www.alluresecurity.com/



On Friday, June 17, 2022 at 2:00:52 PM UTC-4 Hector Martinez Rodriguez 
wrote:

> The form you submitted is correct, but you can additionally use this one 
> <https://safebrowsing.google.com/safebrowsing/report_phish/> to report 
> the fraudulent clone. Nevertheless, we created an internal report to 
> escalate this concern too.
>
> On Thursday, June 16, 2022 at 4:58:18 PM UTC-5 dbab...@alluresecurity.com 
> wrote:
>
>> Hello,
>> I used the form 
>> <https://support.google.com/code/contact/cloud_platform_report> to 
>> report a phishing website 10 days ago and the site, while difficult to 
>> reach, is still publicly accessible.
>>
>> What can we do to escalate?
>>
>> IP address: 34.145.113.173
>> https://34.145.113.173/
>> *Hostname:* 173.113.145.34.bc.googleusercontent.com.
>>
>> That's a fraudulent clone of First Republic Bank's online banking website.
>>
>>
>>

-- 
You received this message because you are subscribed to the Google Groups 
"Google App Engine" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to google-appengine+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/google-appengine/42aab346-2078-4494-9361-6b9334ee77fdn%40googlegroups.com.

Reply via email to