|
今天早上起来发现我在thrustvps购买的VPS被关了,官方给我发了一封邮件,貌似告诉我被封的原因,大家帮我看看到底是怎么回事?万分谢谢!
邮件的原文如下:- [email protected] Posted on: 01 Sep 2011 8:59 PM
- ================================================================
- There has been a report of abuse on your server.
- Per our policies, we require that all our clients respond to abuse notices as they come in. Failure to do so within a timely manner (within 24 hours) will result in a suspension of services until the server administrator has time to resolve the issue.
- The initial complaint is attached to this ticket. If you don't see it under my signature, please log in to your billing interface and view the ticket there.
- We will await your response indicating that you have complied with the order, dispute it, or require a reasonable extension of time to resolve the issue.
- Awaiting your timely response,
- --
- Viktoriya Andrienko
- Support Engineer
- -------------------------------------------
- From: Andrew Ramsey[SMTP:[email protected]]
- Sent: Thursday, September 01, 2011 8:24:50 AM
- To: [email protected]; Kate Gerry
- Subject: infected customer report
- Auto forwarded by a Rule
- The following is a list of IP addresses on your network which we have
- good reason to believe may be compromised systems engaging in
- malicious activity. Please investigate and take appropriate action to
- stop any malicious activity you verify.
- The following is a list of types of activity that may appear in this
- report:
- BEAGLE BEAGLE3 BLASTER BOTNETS BOTS BRUTEFORCE
- DAMEWARE DEFACEMENT DIPNET DNSBOTS MALWAREURL MYDOOM
- NACHI PHATBOT PHISHING ROUTERS SCAN445 SCANNERS
- SINIT SLAMMER SPAM SPYBOT TOXBOT
- Open proxies and open mail relays may also appear in this report.
- Open proxies are designated by a two-character identifier (s4, s5, wg,
- hc, ho, hu, or fu) followed by a colon and a TCP port number. Open
- mail relays are designated by the word "relay" followed by a colon
- and
- a TCP port number.
- A detailed description of each of these may be found at
- https://security.gblx.net/reports.html
- NOTE: IPs identified as hosting botnet controllers, phishing websites,
- or malware distribution sites (marked with BOTNETS, PHISHING, or
- MALWAREURL respectively) may be null routed by Global Crossing
- following a separately emailed notice. We will make every effort
- to avoid taking action which will impact legitimate services on
- your network, and we will now send notices of botnet controllers
- within one hour of their detection.
- This report is sent every day. If you would prefer a weekly report,
- sent on Mondays, please contact us by replying to this email to
- request it. We would prefer, however, that you receive and act upon
- these reports daily.
- Unless otherwise indicated, time stamps are in UTC (GMT).
- 29761 | 109.169.60.119 | 2011-08-31 01:21:15 cbl SPAM | OC3-NETWORKS-AS-NUMBER
- - OC3 Networks & Web Solutions, LLC
- 29761 | 212.38.176.120 | 2011-08-30 02:32:46 445/tcp SCANNERS |
- OC3-NETWORKS-AS-NUMBER - OC3 Networks & Web Solutions, LLC
- 29761 | 212.38.176.126 | 2011-08-30 03:46:53 445/tcp SCANNERS |
- OC3-NETWORKS-AS-NUMBER - OC3 Networks & Web Solutions, LLC
- 29761 | 216.45.55.126 | 2011-08-30 05:33:09 445/tcp SCANNERS |
- OC3-NETWORKS-AS-NUMBER - OC3 Networks & Web Solutions, LLC
- 29761 | 96.44.168.108 | 2011-08-30 01:20:47 445/tcp SCANNERS |
- OC3-NETWORKS-AS-NUMBER - OC3 Networks & Web Solutions, LLC
- --
- Get in touch: 推特 @thrustvps
- If you have any concerns or comments please feel free to ask for your ticket to be esculated to management.
- Ticket Details
- ===================
- Ticket ID: EIK-922817
- Department: Abuse
- Priority: Low
- Status: Awaiting Customer Reply
复制代码 |
|