Could someone forward me to the correct place to post this ??? cause this should not be allowed to continue anymore
If they're using their host as a way to DDoS players, you could contact their host and tell them that they're using their services maliciously. That's all I can think of to be quite honest.
their servers are hosted in OVH (France Data Centre) But you can contact OVH through their UK website: [url]https://www.ovh.co.uk/support/contact-us/[/url]
or through their twitter: [url]https://twitter.com/ovh_support_en[/url] (I've also told them that someone(you) reported an attack, and sent them the IP addresses, so they can monitor them/all other IPs of the customer.
Just dont forget to list the servers IP, wich you think they use for DDoS:
DarkRP: 51.254.16.241
TTT: 164.132.148.206
TS3: 151.80.47.99
Synced: 149.202.89.146
Hello there, I got a response from OVH for you.
[QUOTE]
Hello, has the issue already been reported to [url]http://abuse.ovh.net[/url] ?
^Phil
[/QUOTE]
Aka, you should report it to that domain.
[editline]15th August 2016[/editline]
The staff member is also reporting it on his end.
I'll report it too when I get back home, these scumbags shouldn't be able to even have a server.
[QUOTE=JacobStar9104;50899167]I'll report it too when I get back home, these scumbags shouldn't be able to even have a server.[/QUOTE]
Are you sure the DoS attack originates from their server? what I've seen happen many times is that server owners will purchased a booter for these purposes, and hit users or other servers offline. If that's the case, you would have nothing to report or do about the matter.
[QUOTE=Garnet;50900420]Are you sure the DoS attack originates from their server? what I've seen happen many times is that server owners will purchased a booter for these purposes, and hit users or other servers offline. If that's the case, you would have nothing to report or do about the matter.[/QUOTE]
Why waste money on low-power booters, when you have multiple dedicated servers with atleast 1Gbps network, to attack them? Specially since 1Gbps (1vps, for 2$, literally) is enough to fry a home connection. Plus, you can scan thousands of IPs per second to get little bot accounts, I myself was able to scan using NTP and a self-made python script, to get around [B]30 bots in just a few seconds[/B] wich did hit with 400MBps(also enough for [B]most standard[/B] home connections).
And trust me, OVH's servers, can hit pretty hard.
[QUOTE]
And trust me, OVH's servers, can hit pretty hard.[/QUOTE]
Very true.
Call 911
Sorry, you need to Log In to post a reply to this thread.