Ovh sas12/11/2023 ![]() If there using/building ovh to store sensitive data then god help them lol. Not surprised considering OVH is working with the French Government, Hell, May even use ovh for some of my dodgy activities from now on lol. OVH - Zero technical support, 100% support for criminals. I prob have a better chance of blocking the ip via iptables lol. I must report at least 10 hosts a day to different providers and about a 7/10 chance of them actually do something. I mean is this common practice for big providers to just simply ignore reports? Like Digital Ocean, Vultr, NFO, OVH/SYS, hetzner. All I know is a hosting provider should not let there clients use there services like this lol. Cyber attacks are on the rise! Or maybe its just simply a few boxes got pwnd and there now looking for more things to own. People attacking networks from the inside, out? Not surprised. But even then that doesnt make sense considering i have a direct ip to a ovh box and has an IRC server actively running lol(I am certain the cnc is hosted AT OVH) I mean there is actual hosts at the same network scanning for my box lol. Really what they should be doing is monitoring and start mitigating these attacks, Only reason I can think why not is that there is some sort of encryption or the botnet is using proxies for routing its packets. hence attracting a lot of malicious traffic. ![]() What I mean is ovh is prob one of the cheapest providers out there with a lot of traffic and a lot of resources for very cheap. While that maybe of been simple to detect, I'm not sure what the case is now(people using there services for way worse) But seems like ovh and other hosts are jumping on all this cloud stuff to make profit. And in fact locked the entire vps its self lol. I once used a OVH vps for stress testing on my gaming server(hosted at another host) about 5ish years ago, And there automated system blocked a lot of my traffic. Is that also including dmca(or if you're from the uk the cdpa act) Funny you say that because I was speaking to someone the other day about how long these places have been running, I am not surprised now when there hosting providers block abuse requests. I mean if I setup something like that i'd try and make it as anonymous as possible. I think there is a handful of actual sites that are using some sorta offshore/dodgy hosting. Sorta going off subject, I am a member of some well known private(invite only) trackers, And a lot of them use mainstream hosting providers lol(like a lot). I mean there network most host all kinds of malicious shit. Shame on ovh for not taking cyber threats seriously. I've read other posts on forums too of people saying ovh don't take complaints seriously lol. So even if I did trigger any ids systems its pretty obvious gathering my report(i'm not scanning the net lol).Should also mention my logs are from the honeypot session. ![]() along with that I also sent them a copy of the script(perl) it downloaded. I scanned the host so I could submit proof in my report. Which also had a copy of the same files on the apache server? ![]() Funny I say that because I also had another host I reported today that was trying to infect my box with some IoT malware, In the script it was downloading from a public index(apache) it also kept trying to connect to a open ftp server. The script this ssh bot downloaded onto my box connects to an irc server hosted on the ovh box, After I did the port scan I could simply see there running unrealIRC. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |