The details of the abuse-complaint are as follows: 1. 80.71.227.222: 2025-06-24 23:59.Categories: Port Scan, Hacking. Comment: MultiHost/MultiPort Probe, Scan, Hack — Please go to the…
> ############################################################################# > # Netscan detected from host 136.243.94.116 # > ############################################################################# > > > TIME (UTC) SRC SRC-PORT -> DST DST-PORT SIZE PROT >…
Notice ID: c13dbc5f8b10182365dc Notice Date: 2025-06-24T10:39:10Z Serverius Holding Dear Sir or Madam: I certify under penalty of perjury that I am authorized to act on…
> ############################################################################# > # Netscan detected from host 136.243.94.116 # > ############################################################################# > > > TIME (UTC) SRC SRC-PORT -> DST DST-PORT SIZE PROT >…
Hello Contabo, Several of our customers received phishing e-mails today originating from the host below: Please block the offending user or otherwise prevent further traffic…
We are currently seeing a surge of phishing e-mails (see below) being sent from IP address 31.220.82.12.Please investigate and resolve this matter as soon as…
The following spear-phishing attack was sent out in our name to a business partner: 109.199.96.223 is entered in the DNS TXT record https://www.shodan.io/host/109.199.96.223 From: Michaela…
Abuse type: Spamming Name of the complainer: Dominik Evers The reported URL / IP: vmi2655622.contaboserver.net [109.199.96.225] Evidence or logs: Received: from BPV-EX1.bpv.intranet (10.41.2.22) by BPV-EX1.bpv.intranet…