In my experience, OVH is one of the larger worlwide host of spammers, DDoS, intrusion attempts (SIP, SSH, IMAP, SMTP, etc., etc.), etc., together with cloudstar.is. Any criminal action you can think off … sure a IPs from OVH or Cloudstar are involved!

 

I’m sure there are many other, but in my own case, this is the major %.

 

I’m fighting with them every other day, they never do *anything* despite having provided logs, demonstrations of GDPR abuse, etc., etc.

 

For some reason, it looks to me that most of the so called “email marketing” companies (or databases), which to me are all criminal companies (because it is clear that they keep breaking GDPR and many other rules every other day), using OVH (and sometimes other DCs), are from France. May be their DPA is not doing anything or maybe nobody is complaining “enough” to them.

 

Regards,

Jordi

@jordipalet

 

 

 

El 12/2/20 18:51, "anti-abuse-wg en nombre de Javier Martín" <anti-abuse-wg-bounces@ripe.net en nombre de javier.martin@centrored.net> escribió:

 

Hi all.

This one of the abuse emails that cries out to heaven.

There is an idiot who does not stop attacking us and does not answer the abuse email.

Someone knows what to do in this cases? RIPE said that is nothing to do because there is not a "return from their server" to our email.

This provider is full of spam, we banned all theirs ips. 

https://en.asytech.cn/check-ip/89.248.160.193

https://ipinfo.io/AS202425

It is very striking how a Seychelles provider with a new AS number can spam without limits.

Kind regards.

Javier

Sobre 12/02/2020 18:44:24, Alex de Joode <alex@idgara.nl> escribió:

Alessandro,

 

The abuse notification below, is absolutely terrible: it only highlights the OVH IP that was used, however it completely fails to identify the IP/hostname that was "attacked", no action (other than forward the notice to the user of the IP) can be taken.​

 

Please in the future include all relevant data in you abuse notice. (src+dst ip are relevant!)

 

Thx.

​-- 

IDGARA | Alex de Joode | alex@idgara.nl | +31651108221 | Skype:adejoode


On Wed, 12-02-2020 13h 16min, Alessandro Vesely <vesely@tana.it> wrote:


Dear Abuse Team

The following abusive behavior from IP address under your constituency
188.165.221.36 has been detected:

2020-02-11 11:39:25 CET, 188.165.221.36, old decay: 86400, prob: 34.72%, SMTP auth dictionary attack

188.165.221.36 was caught 102 times since Fri May 18 01:42:13 2018

original data from the mail log:
2020-02-11 11:39:05 CET courieresmtpd: started,ip=[188.165.221.36],port=[58534]
2020-02-11 11:39:05 CET courieresmtpd: started,ip=[188.165.221.36],port=[62026]
2020-02-11 11:39:05 CET courieresmtpd: started,ip=[188.165.221.36],port=[63198]
2020-02-11 11:39:25 CET courieresmtpd: started,ip=[188.165.221.36],port=[58743]
2020-02-11 11:39:25 CET courieresmtpd: started,ip=[188.165.221.36],port=[50520]
2020-02-11 11:39:25 CET courieresmtpd: error,relay=188.165.221.36,port=58743,msg="535 Authentication failed.",cmd: AUTH LOGIN 42D117A2.9F10013D


**********************************************
IPv4 is over
Are you ready for the new Internet ?
http://www.theipv6company.com
The IPv6 Company

This electronic message contains information which may be privileged or confidential. The information is intended to be for the exclusive use of the individual(s) named above and further non-explicilty authorized disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited and will be considered a criminal offense. If you are not the intended recipient be aware that any disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited, will be considered a criminal offense, so you must reply to the original sender to inform about this communication and delete it.