Hey,

my personal experience with OVH was that they would accept 5-10 abuse reports 
per day, even if you replied to them, and then replied to the abuse report with 
the forwarded reply, but they always disable your VM/Server after 21-30 days.

OVH is also on the GoodBadHosters community page.

-GH

On Tuesday, November 5th, 2024 at 5:24 PM, t...@nullvoid.me <t...@nullvoid.me> 
wrote:

> Update for my experience with OVH.
> 

> Received 4 abuse emails in total (2 per each relay), each was replied
> within 24h. No followup on any or response.
> Still have service uninterrupted.
> 

> Hopefully the attacker's ISP kicks them off instead. All of the honeypot
> that send "incorrect" abuse emails get a flood of responses and update
> their detection scripts. Ideally no one loses any nodes, but it seems to
> have already happened.
> 

> Good luck everyone,
> 

> Dimitris T. via tor-relays:
> 

> > another abuse report from hetzner (by the same watchdogcyberdefence) a
> > few hours ago. no reply from hetzner yet to previous ticket.
> > 

> > this time, alleged attacked /20 subnet from watchdogcyberdefence was
> > firewalled since 30/10/2024, just to confirm new false abuse reports...,
> > and they confirmed (=their report, shows traffic from our ip on
> > 3/11/2024)....
> > 

> > replied to hetzner with proposed template and minor changes.
> > 

> > d.
> > 

> > Στις 31/10/24 17:58, ο/η mick έγραψε:
> > 

> > > On Thu, 31 Oct 2024 11:25:30 +0200
> > > "Dimitris T. via tor-relays" tor-relays@lists.torproject.org
> > > allegedly wrote:
> > > 

> > > > similar situation here with hetzner.. got a first report 2 days ago,
> > > > and just a while ago got another abuse report, by the same
> > > > watchdogcyberdefence.... with more alleged activity from our ip...
> > > > 

> > > > like everybody else, there's nothing coming out from our relay ip, so
> > > > we strongly believe "Theory three"[1] .
> > > 

> > > Agree.
> > > 

> > > I have just received another "abuse" report. Hetzner have yet to
> > > respond to my last reply to them.
> > > 

> > > Mick
> > > 

> > > ---------------------------------------------------------------------
> > > Mick Morgan
> > > gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
> > > blog: baldric.net
> > > ---------------------------------------------------------------------
> > 

> > _______________________________________________
> > tor-relays mailing list -- tor-relays@lists.torproject.org
> > To unsubscribe send an email to tor-relays-le...@lists.torproject.org
> 

> 

> _______________________________________________
> tor-relays mailing list -- tor-relays@lists.torproject.org
> To unsubscribe send an email to tor-relays-le...@lists.torproject.org

Attachment: publickey - hartley_george@proton.me - 0xAEE8E00F.asc
Description: application/pgp-keys

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-le...@lists.torproject.org

Reply via email to