[tor-relays] Re: Tor relays source IPs spoofed to mass-scan port 22?

Meanwhile 3* OVH abuse report (twice the same, once for 2nd IP), Virtarix, ServaRICA - all from the same watchdogcyberdefence folks. I have replied to all above ISPs, no suspensions so far.

Just received a suspension note without ANY explanation from AvenaCloud - opened a support ticket with them…

···

On November 5, 2024 at 5:51 PM, mick mbm@rlogin.net wrote:

On Tue, 5 Nov 2024 10:32:40 +0200 > > “Dimitris T. via tor-relays” > > allegedly wrote:

another abuse report from hetzner (by the same watchdogcyberdefence)

a few hours ago. no reply from hetzner yet to previous ticket.

this time, alleged attacked /20 subnet from watchdogcyberdefence was

firewalled since 30/10/2024, just to confirm new false abuse

reports…, and they confirmed (=their report, shows traffic from our

ip on 3/11/2024)…

And I have received a new “abuse” report from Hetzner raised by the

same bozos at watchdogcyberdefence, but this time purportedly aimed at

FTP port 21.

I’ve told Hetzner they are welcome to monitor traffic coming out of my

node to reassure themselves that this is nonsense.

Mick


Mick Morgan

gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312

blog: baldric.net



tor-relays mailing list – tor-relays@lists.torproject.org

To unsubscribe send an email to tor-relays-leave@lists.torproject.org


Sent with https://mailfence.com
Secure and private email