[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Tor relays source IPs spoofed to mass-scan port 22?



Hi,

I got an abuse report on my Guard, Middle, relay hosted at OVH.
I replied with the blog post and explanation that it's an attack outside of my server spoofing packets. No reply back from OVH, no account suspension either.

Regards,

mick:
On Thu, 31 Oct 2024 11:25:30 +0200
"Dimitris T. via tor-relays" <tor-relays@xxxxxxxxxxxxxxxxxxxx>
allegedly wrote:

similar situation here with hetzner.. got a first report 2 days ago,
and just a while ago got another abuse report, by the same
watchdogcyberdefence.... with more alleged activity from our ip...

like everybody else, there's nothing coming out from our relay ip, so
we strongly believe "Theory three"[1] .

Agree.

I have just received another "abuse" report. Hetzner have yet to
respond to my last reply to them.

Mick

---------------------------------------------------------------------
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B  72C0 0A1F E60B 5BAD D312
blog: baldric.net
---------------------------------------------------------------------

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Attachment: OpenPGP_0x45E5F8C1504CDA42.asc
Description: OpenPGP public key

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays