[Abuse #RLTBHSQCWD] Abusive use of your service ip-193.70.56.213

Hello,
We received a copyright infringement complaint regarding an abuse content hosted on your service.

— start of the technical details —
Cloudflare received a phishing report regarding:
o-kex.ru

Please be aware Cloudflare is a network provider offering a reverse proxy, pass-through security service. We are not a hosting provider. Cloudflare does not control the content of our customers.

The actual host for o-kex.ru are the following IP addresses. 193.70.56.213. Using the following command, you can confirm the site in question is hosted at that IP address: curl -v -H «Host: o-kex.ru» 193.70.56.213/

Below is the report we received:

Reporter: Anonymous
Reported URLs:

http://www.o-kex.ru/

Logs or Evidence of Abuse: Hello,

We have discovered a phishing attack located on your network:

http://www.o-kex.ru/ [104.21.3.52]

It is possible that this attack is being restricted so it is only visible from certain countries. Before deciding that the attack has been resolved please confirm it cannot be viewed from the following countries:
China

This attack targets our customer, OKEx, website URL https://www.okex.com/ .

Would it be possible to have the fraudulent content, and any other associated fraudulent content, taken down as soon as you are able to?

Additionally, please keep the fraudulent content safe so that our customer and law enforcement agencies can investigate this incident further once the site is offline.

More information about the detected issue is provided at https://incident.netcraft.com/484159d1f07a/

Many thanks,

Netcraft

Phone: +44(0)1225 447500
Fax: +44(0)1225 448600
Netcraft Issue Number: 30291085

Please address this issue with your customer.

Regards,

Cloudflare Trust & Safety \— Forwarded email(s) —

— end of the technical details —

Your should investigate and fix this problem, as it constitutes a violation to our terms of service.

Please answer to this e-mail indicating which measures you’ve taken to stop the abusive behaviour.

Cordially,

The OVHcloud Abuse team.

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *