发件人:support <[email protected]> 查看 拒收
(由 [email protected] 代发)
真实发送地址与宣称的发件人地址不一致,
请谨慎审视邮件内容的真实性。
时 间:2015年9月22日(星期二) 中午11:27 纯文本 |
收件人:hxs <[email protected]>
大 小:6.6K
打印 | 显示邮件原文 | 导出为eml文件 | 邮件有乱码? | 转发到群邮件 | 保存到记事本 | 添加到日历 | 作为附件转发
备 注:编辑删除请在此输入备注...取消
标记:已将此邮件标记为星标邮件。 取消星标标记:已将此邮件在列表中置顶。 取消置顶标记:已将此邮件标记为星标邮件,并在列表中置顶。 取消星标 取消置顶
Dear Customer,
As your server ns363210.ip-91-121-178.eu is presenting too great a threat to our network,
we had no choice but to place it in 'rescue FTP' mode. An email
containing a username and password has been sent to you so that so you can
easily retrieve any data still located in the storage space.
Please do not hesitate to contact our technical support so that this
situation does not become critical.
You can find the logs brought up by our system below which led to this alert.
- START OF ADDITIONAL INFORMATION -
Attack detail : 14Kpps/6Mbps
dateTime srcIp:srcPort dstIp:dstPort protocol flags bytes reason
2015.09.22 05:25:10 CEST 91.121.178.48:33435 162.159.211.65:80 TCP SYN 60 ATTACK:TCP_SYN
2015.09.22 05:25:10 CEST 91.121.178.48:33438 162.159.211.65:80 TCP SYN 60 ATTACK:TCP_SYN
2015.09.22 05:25:10 CEST 91.121.178.48:57191 162.159.210.65:80 TCP SYN 60 ATTACK:TCP_SYN
2015.09.22 05:25:10 CEST 91.121.178.48:57195 162.159.210.65:80 TCP SYN 60 ATTACK:TCP_SYN
2015.09.22 05:25:10 CEST 91.121.178.48:57200 162.159.210.65:80 TCP SYN 60 ATTACK:TCP_SYN
2015.09.22 05:25:10 CEST 91.121.178.48:33455 162.159.211.65:80 TCP SYN 60 ATTACK:TCP_SYN
2015.09.22 05:25:10 CEST 91.121.178.48:57208 162.159.210.65:80 TCP SYN 60 ATTACK:TCP_SYN
2015.09.22 05:25:10 CEST 91.121.178.48:33466 162.159.211.65:80 TCP SYN 60 ATTACK:TCP_SYN
2015.09.22 05:25:10 CEST 91.121.178.48:33467 162.159.211.65:80 TCP SYN 60 ATTACK:TCP_SYN
2015.09.22 05:25:10 CEST 91.121.178.48:57177 162.159.210.65:80 TCP SYN 60 ATTACK:TCP_SYN
2015.09.22 05:25:10 CEST 91.121.178.48:33449 162.159.211.65:80 TCP SYN 60 ATTACK:TCP_SYN
2015.09.22 05:25:10 CEST 91.121.178.48:33450 162.159.211.65:80 TCP SYN 60 ATTACK:TCP_SYN
2015.09.22 05:25:10 CEST 91.121.178.48:33453 162.159.211.65:80 TCP SYN 60 ATTACK:TCP_SYN
2015.09.22 05:25:10 CEST 91.121.178.48:57205 162.159.210.65:80 TCP SYN 60 ATTACK:TCP_SYN
2015.09.22 05:25:10 CEST 91.121.178.48:57204 162.159.210.65:80 TCP SYN 60 ATTACK:TCP_SYN
2015.09.22 05:25:10 CEST 91.121.178.48:33464 162.159.211.65:80 TCP SYN 60 ATTACK:TCP_SYN
2015.09.22 05:25:10 CEST 91.121.178.48:57218 162.159.210.65:80 TCP SYN 60 ATTACK:TCP_SYN
2015.09.22 05:25:10 CEST 91.121.178.48:33484 162.159.211.65:80 TCP SYN 60 ATTACK:TCP_SYN
2015.09.22 05:25:10 CEST 91.121.178.48:57228 162.159.210.65:80 TCP SYN 60 ATTACK:TCP_SYN
2015.09.22 05:25:10 CEST 91.121.178.48:57230 162.159.210.65:80 TCP SYN 60 ATTACK:TCP_SYN
- END OF ADDITIONAL INFORMATION -
Kind regards,
OVH Customer Support
Best regards,
Customer service Kimsufi.com
Contact: http://forum.kimsufi.com
From Monday to Friday: 9h00 - 20h00
欢迎光临 全球主机交流论坛 (https://fd.vvwvv.eu.org/) | Powered by Discuz! X3.4 |