[tor-relays] Tor relays source IPs spoofed to mass-scan port 22?

tor at nullvoid.me tor at nullvoid.me
Thu Oct 31 17:42:14 UTC 2024


Hi,

I got an abuse report on my Guard, Middle, relay hosted at OVH.
I replied with the blog post and explanation that it's an attack outside 
of my server spoofing packets. No reply back from OVH, no account 
suspension either.

Regards,

mick:
> On Thu, 31 Oct 2024 11:25:30 +0200
> "Dimitris T. via tor-relays" <tor-relays at lists.torproject.org>
> allegedly wrote:
> 
>> similar situation here with hetzner.. got a first report 2 days ago,
>> and just a while ago got another abuse report, by the same
>> watchdogcyberdefence.... with more alleged activity from our ip...
>>
>> like everybody else, there's nothing coming out from our relay ip, so
>> we strongly believe "Theory three"[1] .
>>
> Agree.
> 
> I have just received another "abuse" report. Hetzner have yet to
> respond to my last reply to them.
> 
> Mick
> 
> ---------------------------------------------------------------------
> Mick Morgan
> gpg fingerprint: FC23 3338 F664 5E66 876B  72C0 0A1F E60B 5BAD D312
> blog: baldric.net
> ---------------------------------------------------------------------
> 
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0x45E5F8C1504CDA42.asc
Type: application/pgp-keys
Size: 1205 bytes
Desc: OpenPGP public key
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20241031/1926e598/attachment.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 236 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20241031/1926e598/attachment.sig>


More information about the tor-relays mailing list