[tor-relays] Tor relays source IPs spoofed to mass-scan port 22?
tor at nullvoid.me
tor at nullvoid.me
Thu Oct 31 17:42:14 UTC 2024
Hi,
I got an abuse report on my Guard, Middle, relay hosted at OVH.
I replied with the blog post and explanation that it's an attack outside
of my server spoofing packets. No reply back from OVH, no account
suspension either.
Regards,
mick:
> On Thu, 31 Oct 2024 11:25:30 +0200
> "Dimitris T. via tor-relays" <tor-relays at lists.torproject.org>
> allegedly wrote:
>
>> similar situation here with hetzner.. got a first report 2 days ago,
>> and just a while ago got another abuse report, by the same
>> watchdogcyberdefence.... with more alleged activity from our ip...
>>
>> like everybody else, there's nothing coming out from our relay ip, so
>> we strongly believe "Theory three"[1] .
>>
> Agree.
>
> I have just received another "abuse" report. Hetzner have yet to
> respond to my last reply to them.
>
> Mick
>
> ---------------------------------------------------------------------
> Mick Morgan
> gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
> blog: baldric.net
> ---------------------------------------------------------------------
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0x45E5F8C1504CDA42.asc
Type: application/pgp-keys
Size: 1205 bytes
Desc: OpenPGP public key
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20241031/1926e598/attachment.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 236 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20241031/1926e598/attachment.sig>
More information about the tor-relays
mailing list