The hosting of an abusive content (Phishing) behind your IP ip-126.96.36.199/28 has been reported to or noticed by our Abuse Team.
Technical details (such as URLs) showing the aforementioned problem follow :
— start of the technical details —
\— about — 188.8.131.52 \— description follows — To Whom It May Concern,
CSC Digital Brand Services has been informed that there is currently a website hosted by your company that is involved in a phishing scheme to obtain personal account information from the customers of Cdiscount. CSC Digital Brand Services has received numerous complaints and e-mails regarding the Web site listed below:
On behalf of Cdiscount, CSC Digital Brand Services requests that the Web site(s) listed above be deactivated immediately and the domain name removed from your servers. Cdiscount would like you to provide CSC Digital Brand Services with the source code, including any data collected, of this Web site for analysis to help prevent further phishing schemes. If any customer data has been collected, it will be forwarded to Cdiscount so that they may notify their customers regarding this issue and take other appropriate actions as needed.
Please contact us if any further information is required to expedite the process of removing this Web site from service. If needed, forward this e-mail and request to the appropriate contact that is able to deactivate this site.
Thank you for your time and consideration.
Global Security Response Team
24×7 GSRT: +18668807025
24×7 GSRT Intl: +14084777706
We are the business behind business
\— logs follow — Queried whois.ripe.net with "-B 184.108.40.206"…
% Information related to ‘220.127.116.11 — 18.104.22.168’
% Abuse contact for ‘22.214.171.124 — 126.96.36.199′ is email@example.com’
inetnum: 188.8.131.52 — 184.108.40.206
descr: Failover Ips
org-name: Kishtovkaya Aliona
address: Jormungand 404
address: 630000 Nerv 13
role: OVH NL Technical Contact
address: OVH BV
address: Corkstraat 46
address: 3047 AC Rotterdam
address: The Netherlands
% Information related to ‘220.127.116.11/16AS16276’
% This query was served by the RIPE Database Query Service version 1.97 (ANGUS)
Category: phishing \— Forwarded email(s) —
— end of the technical details —
Your should investigate and fix this problem, as it constitutes a violation to our terms of service.
Please answer to this e-mail indicating which measures you’ve taken to stop the abusive behaviour.
The OVH Abuse team.