[tor-relays] OVH killed me

gerard at bulger.co.uk gerard at bulger.co.uk
Sat Jul 17 23:08:25 UTC 2021


 

I have had no reports of abuse with my partial exit for a couple of years, then suddenly OVH kills the server

(Reinstalling is a pain and IPV6 not autoloaded and they and Ubuntu keep changing networking)   Anyway

 

“Abnormal activity has been detected on your VPS vps585081.ovh.net.

As your VPS poses too greater threat to our infrastructure, we had no choice but to put it in FTP rescue mode. This mode enables you to access the data on your VPS. An email containing information on FTP rescue mode has been sent to you. 

Actions can no longer be carried out on your VPS via your Manager/API. Only the following actions are possible:

- Reinstallation of your VPS.

Please do not hesitate to contact our technical support team so that this situation does not become critical.

You will find the logs brought up by our system below, which led to this alert.

- START OF ADDITIONAL INFORMATION -

Attack detail : 7Kpps/3Mbps
dateTime srcIp:srcPort dstIp:dstPort protocol flags bytes reason 
2021.07.17 15:44:37 CEST 51.38.64.xxx:39859 192.124.249.xx:443 TCP SYN 60 ATTACK:TCP_SYN 
2021.07.17 15:44:37 CEST 51.38.64.xxx:38510 67.222.30.xx:443 TCP SYN 60 ATTACK:TCP_SYN 
2021.07.17 15:44:37 CEST 51.38.64.xxx :43014 67.222.30.xx:443 TCP SYN 60 ATTACK:TCP_SYN 



When I fire it up how to mitigate against this?   My new server with the original IPV4 address is under attack  already but tor is not running yet

 

Gerry

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20210718/fe4022a4/attachment.htm>


More information about the tor-relays mailing list