[Abuse #LSTPNWMJFK] Abusive use of your service ip-51.178.209.176/28

Hello,

The hosting of an abusive content (Phishing) behind your IP ip-51.178.209.176/28 has been reported to or noticed by our Abuse Team.

Technical details (such as URLs) showing the aforementioned problem follow :

— start of the technical details —
\— about — 51.178.209.176 \— description follows — To Whom It May Concern,

CSC Digital Brand Services has been informed that there is currently a website hosted by your company that is involved in a phishing scheme to obtain personal account information from the customers of Cdiscount. CSC Digital Brand Services has received numerous complaints and e-mails regarding the Web site listed below:

https://elizabet.hlopchatka.ru/sanda-men-smart-watch-mens-bluetooth-sport-ujq/

On behalf of Cdiscount, CSC Digital Brand Services requests that the Web site(s) listed above be deactivated immediately and the domain name removed from your servers. Cdiscount would like you to provide CSC Digital Brand Services with the source code, including any data collected, of this Web site for analysis to help prevent further phishing schemes. If any customer data has been collected, it will be forwarded to Cdiscount so that they may notify their customers regarding this issue and take other appropriate actions as needed.

Please contact us if any further information is required to expedite the process of removing this Web site from service. If needed, forward this e-mail and request to the appropriate contact that is able to deactivate this site.

Thank you for your time and consideration.

Madhu Kumar
Global Security Response Team
24×7 GSRT: +18668807025
24×7 GSRT Intl: +14084777706
email-removed@provider.com

CSC®
cscglobal.com
We are the business behind business

\— logs follow — Queried whois.ripe.net with "-B 51.178.209.180"…

% Information related to ‘51.178.209.176 — 51.178.209.191’

% Abuse contact for ‘51.178.209.176 — 51.178.209.191′ is email-removed@provider.com’

inetnum: 51.178.209.176 — 51.178.209.191
netname: OVH_266139658
country: NL
descr: Failover Ips
org: ORG-KA784-RIPE
admin-c: OTC7-RIPE
tech-c: OTC7-RIPE
status: LEGACY
mnt-by: OVH-MNT
created: 2020-03-31T04:46:26Z
last-modified: 2020-03-31T04:46:26Z
source: RIPE

organisation: ORG-KA784-RIPE
org-name: Kishtovkaya Aliona
org-type: OTHER
address: Jormungand 404
address: 630000 Nerv 13
address: RU
e-mail: email-removed@provider.com
phone: +7.9139714482
abuse-c: ACRO29215-RIPE
mnt-ref: OVH-MNT
mnt-by: OVH-MNT
created: 2019-12-16T10:14:12Z
last-modified: 2019-12-16T10:14:12Z
source: RIPE

role: OVH NL Technical Contact
address: OVH BV
address: Corkstraat 46
address: 3047 AC Rotterdam
address: The Netherlands
e-mail: email-removed@provider.com
admin-c: OK217-RIPE
tech-c: GM84-RIPE
nic-hdl: OTC7-RIPE
abuse-mailbox: email-removed@provider.com
notify: email-removed@provider.com
mnt-by: OVH-MNT
created: 2009-03-18T15:51:01Z
last-modified: 2009-03-18T15:51:01Z
source: RIPE

% Information related to ‘51.178.0.0/16AS16276’

route: 51.178.0.0/16
origin: AS16276
mnt-by: OVH-MNT
created: 2019-11-27T15:23:33Z
last-modified: 2019-11-27T15:23:33Z
source: RIPE

% This query was served by the RIPE Database Query Service version 1.97 (ANGUS)

Category: phishing \— Forwarded email(s) —

— end of the technical details —

Your should investigate and fix this problem, as it constitutes a violation to our terms of service.

Please answer to this e-mail indicating which measures you’ve taken to stop the abusive behaviour.

Cordially,

The OVH Abuse team.

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *