Хостинг от REDY
Menu
Служба поддержки
Получи скидку
на хостинг
SALE
-50%
предложение ограничено

Варианты решения Ваших вопросов

  хостинг
<< Назад       Хостинг

Вопрос: Добрые вечер. Не могу зайти в cpanel хостинга *.*. И сайт не открывается.
Ответ:

Здравствуйте

на вас пришла жалоба

Subject: Abuse; Cust; Arvid Logicum OÜ: Malicious Content - ***.*.***.**

Arvid Logicum OÜ,

Please be advised that Cogent Abuse has received a complaint regarding Malicious Content residing at IP address - 149.*.***.**.

Please investigate and reply back with your findings to include any actions taken on your end to address the issue to avoid further AUP actions.

**acceptable-use-policy

*. Introduction of malicious programs into the Cogent network or servers or other products and services of Cogent (e.g., viruses, trojan horses and worms).

If you have any questions, require additional details or assistance please reply to this notification or send an email to abuse@cogentco.com.  To update or modify contacts for these types of notifications, please visit * .

Regards,

Abuse Team
Cogent Communications
abuse@cogentco.com
========================
Malicious Content URL:
hxxps://haysec[.]**rss-url.php
========================

Hello,

We have discovered a malicious web shell being hosted on your network:

hxxps://haysec[.]**rss-url.php [***.*.***.**]

Web shells are scripts that attackers upload to compromised web-servers in order to gain remote access. When accessed using a web browser, web shells can allow attackers to upload files, execute arbitrary commands on the server, and send spam. Web shells are often used to create phishing or malware attacks on the compromised server.

Attackers often attempt to disguise web shells as benign pages. Common techniques include returning a fake *** page and making the web shell input fields on the page invisible. Please check the attacker is not attempting to hide the web shell before dismissing this report.

Additionally, please keep the fraudulent content safe so that our customer and law enforcement agencies can investigate this incident further once the site is offline.

Many thanks,

Netcraft

Phone: +**(*)**** ******
Fax: +**(*)**** ******
Netcraft Issue Number: *******

To contact us about updates regarding this attack, please respond to this email. Please note: replies to this address will be logged, but aren't always read. If you believe you have received this email in error, or you require further support, please contact: takedown@netcraft.com.

Вопрос: Скажите как решить проблему?
Ответ:

уберите ссылку  и файл

hxxps://haysec[.]**rss-url.php 

для этого сообщите ваш wan IP.

Ущнаь его вы можете здесь 

https://www.redy.pro/*ip.php

Вопрос: Ваш IP адрес: **.***.***.***
Вопрос: Это мой ip .
Ответ:

Доступ открыт для Вас.

Сообщите когда проблема будет укстранена.

Вопрос: Добрый день. Не могу установить wordpress на домен *.*.
Ответ:

Здравствуйте

Вы решили проблему с жалобой?

 

Вопрос: * дня всё было нормально но сегодня опять та же проблема. Сайт не работает.
Ответ:

Вы решили проблему с жалобой?

Вопрос: Нет мои сайты не работают. Пишет ошибка.
Вопрос: Нет мои сайты не работают. Пишет ошибка.
Вопрос: Поверьте пожалуйста хостинг *.*
Ответ:

Ваш сайт заблокирован.

Вам необходимо решить вопрос с жалобой.

После этого возможна раблокировка сайта.

Вопрос: С какой жалобой? Что мне надо зделат?
Вопрос: Очистить все сайты и проверить на наличие вирусов?
Вопрос: Где посмотреть жалобу?
Ответ:

на вас пришла жалоба

 

Subject: Abuse; Cust; Arvid Logicum OÜ: Malicious Content - ***.*.***.**

Arvid Logicum OÜ,

Please be advised that Cogent Abuse has received a complaint regarding Malicious Content residing at IP address - 149.*.***.**.

Please investigate and reply back with your findings to include any actions taken on your end to address the issue to avoid further AUP actions.

**acceptable-use-policy

*. Introduction of malicious programs into the Cogent network or servers or other products and services of Cogent (e.g., viruses, trojan horses and worms).

If you have any questions, require additional details or assistance please reply to this notification or send an email to abuse@cogentco.com.  To update or modify contacts for these types of notifications, please visit * .

Regards,

Abuse Team
Cogent Communications
abuse@cogentco.com
========================
Malicious Content URL:
hxxps://haysec[.]**rss-url.php
========================

Hello,

We have discovered a malicious web shell being hosted on your network:

hxxps://haysec[.]**rss-url.php [***.*.***.**]

Web shells are scripts that attackers upload to compromised web-servers in order to gain remote access. When accessed using a web browser, web shells can allow attackers to upload files, execute arbitrary commands on the server, and send spam. Web shells are often used to create phishing or malware attacks on the compromised server.

Attackers often attempt to disguise web shells as benign pages. Common techniques include returning a fake *** page and making the web shell input fields on the page invisible. Please check the attacker is not attempting to hide the web shell before dismissing this report.

Additionally, please keep the fraudulent content safe so that our customer and law enforcement agencies can investigate this incident further once the site is offline.

Many thanks,

Netcraft

Phone: +**(*)**** ******
Fax: +**(*)**** ******
Netcraft Issue Number: *******

To contact us about updates regarding this attack, please respond to this email. Please note: replies to this address will be logged, but aren't always read. If you believe you have received this email in error, or you require further support, please contact: takedown@netcraft.com.


<< Назад

Закрыть
Ты уходишь??!
Протестируй БЕСПЛАТНО хостинг!!
Хочу бесплатно протестировать
Попробуй VPS
от $0.80
Хочу VPS
Не уходи
© 2006 - 2024 REDY. All rights reserved