关于严禁金光VPS被滥用的公告
今天收到了服务商的邮件,就在金光VPS测试的两天时间里,有人利用VPS攻击别人的教育网站,我们强烈谴责这种滥用服务器,并可能导致服务器被关闭的恶劣行为。在此重申金光VPS的使用规定:若发现用户滥用服务器,导致金光网收到服务商的协查邮件
1、免费测试用户将被立刻关停VPS,并永久取消该用户在金光的任一免费空间的使用资格。
2、付费用户将被立刻关停VPS,已付未到期费用不予退还。
严禁用户的以下用途:
私服游戏、视频聊天室、大流量下载、盗版、攻击、挂马、扫肉鸡、扫ip、任何类型刷流量等违法应用!
*******************************************************
Dear valued ServerDeals customer,
We have received an abuse complaint regarding your service with us. ServerDeals takes these types of complaints seriously; therefore, failure to comply within 24 hours will result in the temporary suspension of your account.
Please review the ticket and respond accordingly with the following details:
1) Was the hacking activity detected resulting in the spam activity on the server?
2) If you found the abusing scripts, what kind of software was in use to send the emails? Please enclose the files types (names) along with the IP addresses accessing the host to perform
such type of activity;
3) Were the services stopped to stop the outbreak or any other measures taken?
Please provide as many details as possible.
Thank you for your compliance in this situation. The abuse complaint is as follows:
--------------------------------------------------
216.231.140.235 was observed probing caltech.edu for security holes. It
has been blocked at our border routers. It may be compromised.
For more info contact security@its.caltech.edu
Please include the entire subject line of the original message
Greg
(time zone of log is PDT, which is UTC-07:00, date is MMDD)
log entries are from Cisco netflow, time is flow start time
date.time srcIP srcPort dstIP dstPort proto #pkts
1013.21:37:50.197 216.231.140.235 59268 134.4.129.214 3389 6 1
1014.02:16:48.110 216.231.140.235 65338 134.4.129.200 3389 6 1
1014.07:52:15.557 216.231.140.235 61429 134.4.128.202 3389 6 3
1014.12:02:02.491 216.231.140.235 49847 131.215.255.248 3389 6 1
1014.12:04:59.046 216.231.140.235 56306 131.215.255.142 3389 6 1
1014.12:05:10.821 216.231.140.235 50173 134.4.130.14 3389 6 1
1014.12:11:28.494 216.231.140.235 55043 131.215.255.129 3389 6 1
1014.12:14:37.407 216.231.140.235 51853 131.215.255.172 3389 6 1
1014.12:16:50.332 216.231.140.235 63774 131.215.255.159 3389 6 1
1014.12:33:06.255 216.231.140.235 52954 131.215.255.205 3389 6 1
1014.12:33:17.976 216.231.140.235 64677 131.215.255.153 3389 6 1
1014.12:33:26.677 216.231.140.235 55364 134.4.129.185 3389 6 1
1014.12:34:21.077 216.231.140.235 53337 131.215.253.148 3389 6 3
1014.12:42:01.797 216.231.140.235 57642 134.4.129.178 3389 6 1
1014.12:49:30.873 216.231.140.235 55186 134.4.130.19 3389 6 1
1014.12:53:20.373 216.231.140.235 57480 131.215.255.221 3389 6 1
1014.13:11:35.595 216.231.140.235 50366 131.215.255.182 3389 6 1
1014.13:13:40.277 216.231.140.235 62860 131.215.254.79 3389 6 2
1014.13:13:48.518 216.231.140.235 53471 131.215.255.155 3389 6 1
1014.13:24:48.417 216.231.140.235 65214 131.215.247.242 3389 6 1
contact info 来自:
spamcop hosttracker
whois
contact: abuse@nexeontech.com
Email: security-noreply@caltech.edu 支持金光。 可以封了这家伙IP,封号处理{:soso_e151:} 一定要严惩
那个MJJ的~这么没有良心 一定要严惩 这些家伙拿免费的不当东西啊 拉出去阉了 216.231.140.235 一查不就知道了,我当时拿到的测试VPS是216.231.140.234 一定要严惩
页:
[1]
2