<html xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=utf-8"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:"Times New Roman \(Cuerpo en alfa";
panose-1:2 2 6 3 5 4 5 2 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
span.EstiloCorreo19
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:70.85pt 3.0cm 70.85pt 3.0cm;}
div.WordSection1
{page:WordSection1;}
--></style></head><body lang=ES link=blue vlink=purple><div class=WordSection1><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'>In my experience, OVH is one of the larger worlwide host of spammers, DDoS, intrusion attempts (SIP, SSH, IMAP, SMTP, etc., etc.), etc., together with cloudstar.is. Any criminal action you can think off … sure a IPs from OVH or Cloudstar are involved!<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'>I’m sure there are many other, but in my own case, this is the major %.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'>I’m fighting with them every other day, they never do *<b>anything</b>* despite having provided logs, demonstrations of GDPR abuse, etc., etc.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'>For some reason, it looks to me that most of the so called “email marketing” companies (or databases), which to me are all criminal companies (because it is clear that they keep breaking GDPR and many other rules every other day), using OVH (and sometimes other DCs), are from France. May be their DPA is not doing anything or maybe nobody is complaining “enough” to them.<o:p></o:p></span></p><div><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;color:black'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;color:black'>Regards,<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:12.0pt'><span lang=EN-US style='font-size:12.0pt;color:black;mso-fareast-language:EN-US'>Jordi<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:12.0pt'><span lang=EN-US style='font-size:12.0pt;color:black;mso-fareast-language:EN-US'>@jordipalet<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:12.0pt'><span lang=EN-US style='font-size:12.0pt;color:black;mso-fareast-language:EN-US'><o:p> </o:p></span></p></div><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:12.0pt;mso-fareast-language:EN-US'><o:p> </o:p></span></p><div><div><p class=MsoNormal style='margin-left:35.4pt'>El 12/2/20 18:51, "anti-abuse-wg en nombre de Javier Martín" <<a href="mailto:anti-abuse-wg-bounces@ripe.net">anti-abuse-wg-bounces@ripe.net</a> en nombre de <a href="mailto:javier.martin@centrored.net">javier.martin@centrored.net</a>> escribió:<o:p></o:p></p></div></div><div><p class=MsoNormal style='margin-left:35.4pt'><o:p> </o:p></p></div><div id="__MailbirdStyleContent"><p class=MsoNormal style='margin-left:35.4pt'><span style='font-size:12.0pt;color:black'>Hi all.<o:p></o:p></span></p><div><div><p class=MsoNormal style='margin-left:35.4pt'><span style='font-size:12.0pt;color:black'>This one of the abuse emails that cries out to heaven.<o:p></o:p></span></p></div><div><p class=MsoNormal style='margin-left:35.4pt'><span style='font-size:12.0pt;color:black'>There is an idiot who does not stop attacking us and does not answer the abuse email.<o:p></o:p></span></p></div></div><div><p class=MsoNormal style='margin-left:35.4pt'><span style='font-size:12.0pt;color:black'>Someone knows what to do in this cases? RIPE said that is nothing to do because there is not a "return from their server" to our email.<o:p></o:p></span></p></div><div><p class=MsoNormal style='margin-left:35.4pt'><span style='font-size:12.0pt;color:black'>This provider is full of spam, we banned all theirs ips. <o:p></o:p></span></p></div><div><p class=MsoNormal style='margin-left:35.4pt'><span style='font-size:12.0pt;color:black'><a href="https://en.asytech.cn/check-ip/89.248.160.193">https://en.asytech.cn/check-ip/89.248.160.193</a><o:p></o:p></span></p></div><div><p class=MsoNormal style='margin-left:35.4pt'><span style='font-size:12.0pt;color:black'><a href="https://ipinfo.io/AS202425">https://ipinfo.io/AS202425</a><o:p></o:p></span></p></div><div><p class=MsoNormal style='margin-left:35.4pt'><span style='font-size:12.0pt;color:black'>It is very striking how a Seychelles provider with a new AS number can spam without limits.<o:p></o:p></span></p></div><div><p class=MsoNormal style='margin-left:35.4pt'><span style='font-size:12.0pt;color:black'>Kind regards.<o:p></o:p></span></p></div><div><p class=MsoNormal style='margin-left:35.4pt'><span style='font-size:12.0pt;color:black'>Javier<o:p></o:p></span></p></div><blockquote style='border:none;border-left:solid windowtext 1.0pt;padding:0cm 0cm 0cm 8.0pt;margin-left:0cm;margin-top:15.0pt;margin-bottom:5.0pt;min-width: 500px'><p style='mso-margin-top-alt:7.5pt;margin-right:0cm;margin-bottom:5.0pt;margin-left:35.4pt'><span style='font-size:12.0pt;color:#AAAAAA'>Sobre 12/02/2020 18:44:24, Alex de Joode <alex@idgara.nl> escribió:<o:p></o:p></span></p><div><div><p class=MsoNormal style='margin-left:35.4pt'><span style='font-size:12.0pt;font-family:"Arial",sans-serif;color:black'>Alessandro,<o:p></o:p></span></p></div><div><p class=MsoNormal style='margin-left:35.4pt'><span style='font-size:12.0pt;font-family:"Arial",sans-serif;color:black'><o:p> </o:p></span></p></div><p class=MsoNormal style='margin-left:35.4pt'><span style='font-size:12.0pt;font-family:"Arial",sans-serif;color:black'>The abuse notification below, is absolutely terrible: it only highlights the OVH IP that was used, however it completely fails to identify the IP/hostname that was "attacked", no action (other than forward the notice to the user of the IP) can be taken.<o:p></o:p></span></p><div><p class=MsoNormal style='margin-left:35.4pt'><span style='font-size:12.0pt;font-family:"Arial",sans-serif;color:black'><o:p> </o:p></span></p></div><div><p class=MsoNormal style='margin-left:35.4pt'><span style='font-size:12.0pt;font-family:"Arial",sans-serif;color:black'>Please in the future include all relevant data in you abuse notice. (src+dst ip are relevant!)<o:p></o:p></span></p><div><p class=MsoNormal style='margin-left:35.4pt'><span style='font-size:12.0pt;font-family:"Arial",sans-serif;color:black'><o:p> </o:p></span></p></div><div><p class=MsoNormal style='margin-left:35.4pt'><span style='font-size:12.0pt;font-family:"Arial",sans-serif;color:black'>Thx.<o:p></o:p></span></p></div><div><div><p class=MsoNormal style='margin-left:35.4pt'><span style='font-size:12.0pt;font-family:"Arial",sans-serif;color:black'>-- <o:p></o:p></span></p><div><p class=MsoNormal style='margin-left:35.4pt'><span style='font-size:12.0pt;font-family:"Arial",sans-serif;color:black'>IDGARA | Alex de Joode | alex@idgara.nl | +31651108221 | Skype:adejoode<o:p></o:p></span></p></div></div></div><p class=MsoNormal style='margin-left:35.4pt'><span style='font-size:12.0pt;font-family:"Arial",sans-serif;color:black'><br>On Wed, 12-02-2020 13h 16min, Alessandro Vesely <vesely@tana.it> wrote:<o:p></o:p></span></p><blockquote style='border:none;border-left:solid #CCCCCC 1.0pt;padding:0cm 0cm 0cm 8.0pt;margin-left:7.5pt;margin-top:5.0pt;margin-bottom:5.0pt'><div><p class=MsoNormal style='mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:12.0pt;margin-left:35.4pt'><span style='font-size:12.0pt;font-family:"Arial",sans-serif;color:black'><br>Dear Abuse Team<br><br>The following abusive behavior from IP address under your constituency<br>188.165.221.36 has been detected:<br><br>2020-02-11 11:39:25 CET, 188.165.221.36, old decay: 86400, prob: 34.72%, SMTP auth dictionary attack<br><br>188.165.221.36 was caught 102 times since Fri May 18 01:42:13 2018<br><br>original data from the mail log:<br>2020-02-11 11:39:05 CET courieresmtpd: started,ip=[188.165.221.36],port=[58534]<br>2020-02-11 11:39:05 CET courieresmtpd: started,ip=[188.165.221.36],port=[62026]<br>2020-02-11 11:39:05 CET courieresmtpd: started,ip=[188.165.221.36],port=[63198]<br>2020-02-11 11:39:25 CET courieresmtpd: started,ip=[188.165.221.36],port=[58743]<br>2020-02-11 11:39:25 CET courieresmtpd: started,ip=[188.165.221.36],port=[50520]<br>2020-02-11 11:39:25 CET courieresmtpd: error,relay=188.165.221.36,port=58743,msg="535 Authentication failed.",cmd: AUTH LOGIN 42D117A2.9F10013D<br><br><o:p></o:p></span></p></div></blockquote></div></div></blockquote></div></div><br>**********************************************<br>
IPv4 is over<br>
Are you ready for the new Internet ?<br>
http://www.theipv6company.com<br>
The IPv6 Company<br>
<br>
This electronic message contains information which may be privileged or confidential. The information is intended to be for the exclusive use of the individual(s) named above and further non-explicilty authorized disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited and will be considered a criminal offense. If you are not the intended recipient be aware that any disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited, will be considered a criminal offense, so you must reply to the original sender to inform about this communication and delete it.<br>
<br>
</body></html>