|  | 
 
| 今天早上起来发现我在thrustvps购买的VPS被关了,官方给我发了一封邮件,貌似告诉我被封的原因,大家帮我看看到底是怎么回事?万分谢谢! 
 邮件的原文如下:
 复制代码 [email protected] Posted on: 01 Sep 2011 8:59 PM
================================================================
There has been a report of abuse on your server.
Per our policies, we require that all our clients respond to abuse notices as they come in. Failure to do so within a timely manner (within 24 hours) will result in a suspension of services until the server administrator has time to resolve the issue.
The initial complaint is attached to this ticket. If you don't see it under my signature, please log in to your billing interface and view the ticket there.
We will await your response indicating that you have complied with the order, dispute it, or require a reasonable extension of time to resolve the issue.
Awaiting your timely response,
-- 
Viktoriya Andrienko
Support Engineer
-------------------------------------------
From: Andrew Ramsey[SMTP:[email protected]]
Sent: Thursday, September 01, 2011 8:24:50 AM
To: [email protected]; Kate Gerry
Subject: infected customer report
Auto forwarded by a Rule
The following is a list of IP addresses on your network which we have
good reason to believe may be compromised systems engaging in
malicious activity.  Please investigate and take appropriate action to
stop any malicious activity you verify.
The following is a list of types of activity that may appear in this
report:
    BEAGLE      BEAGLE3    BLASTER    BOTNETS    BOTS        BRUTEFORCE
    DAMEWARE    DEFACEMENT  DIPNET      DNSBOTS    MALWAREURL  MYDOOM
    NACHI      PHATBOT    PHISHING    ROUTERS    SCAN445    SCANNERS
    SINIT      SLAMMER    SPAM        SPYBOT      TOXBOT
Open proxies and open mail relays may also appear in this report.
Open proxies are designated by a two-character identifier (s4, s5, wg,
hc, ho, hu, or fu) followed by a colon and a TCP port number.  Open
mail relays are designated by the word "relay" followed by a colon
and
a TCP port number.
A detailed description of each of these may be found at
   https://security.gblx.net/reports.html
NOTE: IPs identified as hosting botnet controllers, phishing websites,
or malware distribution sites (marked with BOTNETS, PHISHING, or
MALWAREURL respectively) may be null routed by Global Crossing
following a separately emailed notice.  We will make every effort
to avoid taking action which will impact legitimate services on
your network, and we will now send notices of botnet controllers
within one hour of their detection.
This report is sent every day.  If you would prefer a weekly report,
sent on Mondays, please contact us by replying to this email to
request it.  We would prefer, however, that you receive and act upon
these reports daily.
Unless otherwise indicated, time stamps are in UTC (GMT).
29761 | 109.169.60.119 | 2011-08-31 01:21:15 cbl SPAM | OC3-NETWORKS-AS-NUMBER
- OC3 Networks & Web Solutions, LLC
29761 | 212.38.176.120 | 2011-08-30 02:32:46 445/tcp SCANNERS |
OC3-NETWORKS-AS-NUMBER - OC3 Networks & Web Solutions, LLC
29761 | 212.38.176.126 | 2011-08-30 03:46:53 445/tcp SCANNERS |
OC3-NETWORKS-AS-NUMBER - OC3 Networks & Web Solutions, LLC
29761 | 216.45.55.126 | 2011-08-30 05:33:09 445/tcp SCANNERS |
OC3-NETWORKS-AS-NUMBER - OC3 Networks & Web Solutions, LLC
29761 | 96.44.168.108 | 2011-08-30 01:20:47 445/tcp SCANNERS |
OC3-NETWORKS-AS-NUMBER - OC3 Networks & Web Solutions, LLC 
--
Get in touch: 推特 @thrustvps
If you have any concerns or comments please feel free to ask for your ticket to be esculated to management.
Ticket Details
===================
Ticket ID: EIK-922817
Department: Abuse
Priority: Low
Status: Awaiting Customer Reply
 | 
 |