[Abuse #WMHQDZZMSP] Abusive use of your service ip-51.77.177.176/28

Hello,
We received a copyright infringement complaint regarding an abuse content hosted on your service.

— start of the technical details —

Hello,

Cloudflare received a phishing report regarding estrela-bet-entrar.com.br

Please be aware Cloudflare offers network service solutions including pass-through security services, a content distribution network (CDN) and registrar services. Due to the pass-through nature of our services, our IP addresses appear in WHOIS and DNS records for websites using Cloudflare. Cloudflare is generally not a website hosting provider, and we cannot remove material from the Internet that is hosted by others.

The actual host for estrela-bet-entrar.com.br are the following IP addresses. 51.77.177.183. Using the following command, you can confirm the site in question is hosted at that IP address: curl -v -H «Host: estrela-bet-entrar.com.br» 51.77.177.183/

Below is the information we received:

Reporter’s Name: Giulio Scalpini
Reporter’s Email Address: abuse.efc@axur.com
Reporter’s Company Name: Axur
Reporter’s Telephone Number: 5130122987

Reported URLs:
https://estrela-bet-entrar.com.br

Logs or Evidence of Abuse: Dear Abuse/Support Team,

We detected a phishing website hosted at:

https://estrela-bet-entrar.com.br

Host: estrela-bet-entrar.com.br IP: 172.67.208.88

Country accessing the page: Brazil
User-agent : Incognito Google Chrome tab configured to mobile mode (ctrl+F12) on PC with Windows 10.

This fake website was created to attack EstrelaBet’s website and its customers. The organization’s legitimate website is:

    https://estrelabet.com/ptb/bet/main

If you have trouble accessing the phishing page, we suggest you to open the reported urls using several different user agents, such as incognito tabs, mobile configured tabs (F12 on Google Chrome), proxy sites and mobile devices with 4G data access. We are experiencing some phishing pages configured to block the access using normal desktop tabs.

Besides that, we have found issues where the page is activated and deactivated by the fraudster according to their configuration, so even though it may seem inaccessible, the phishing page can be reactivated at any time.

That is why we request your action to help us deactivate the content available not only on the reported URL, but also in the whole server related to the domain.

We kindly ask your cooperation, according to your policies, to cease this activity and shut down the phishing page as soon as possible.

Thanks in advance. We would also appreciate it if you could provide a confirmation that this message has been received and an estimate of the time to shutdown.

To contact us about this matter, please inform the tracking code: #EFC3257797

Best regards,
AXUR
abuse.efc@axur.com

Please address this issue with your customer.

To respond to this issue, please reply to email-removed@provider.com.

Regards,
Cloudflare Trust & Safety

— end of the technical details —

Your should investigate and fix this problem, as it constitutes a violation to our terms of service.

Please answer to this e-mail indicating which measures you’ve taken to stop the abusive behaviour.

Cordially,

The OVHcloud Trust & Safety team.

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *