-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Hi,
We also get (and ignore) these automated reports. Try to convince your ISP to reassign the IP range and list you as abuse contact.
If that does not work, you can simply block celepar's ranges. Scanning 129 recent mails:
Destination: 200.189.113.170 (80) Destination: 200.189.113.212 (80) Destination: 200.189.113.213 (80) Destination: 200.189.113.220 (80) Destination: 200.189.113.49 (80) Destination: 200.189.113.50 (80) Destination: 200.189.123.184 (80) Destination: 200.189.123.185 (80)
inetnum: 200.189.112/20 aut-num: AS19723 abuse-c: ADC633 owner: COMPANHIA DE INFORMATICA DO PARANA - CELEPAR
- - -- Moritz Bartl https://www.torservers.net/
On 05/22/2012 05:18 PM, mick wrote:
Hi
I have today, reluctantly, switched my node torofotheworld.aibohphobia.org from an exit node to relay only. My ISP has stayed faithful over several abuse reports in the past, but this week following two more in quick sucession (from brazilian government services by the look of it) they have asked that I shut down the exit policy. Rather than lose the node entirely, I have agreed.
Some bozo has been using sqlmap to scan servers through tor.
Mick
blog: baldric.net
fingerprint: E8D2 8882 F7AE DEB7 B2AA 9407 B9EA 82CC 1092 7423
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays