Frënn vun der Ënn A.S.B.L.

Luxembourg based non-profit organization defending civil rights on the internet.

User Tools

Site Tools


Sidebar

abuse_handling

Handling abuse mails can be boring because you will be flooded by DMCA complaints.
Good news is, that you can totaly ignore those. They are automaticaly generated and no one will ever respond to your replys.

Every other abuse mail should be answered!

Templates

Standard

Hi

The IP address in question is a Tor exit node.
https://www.torproject.org/overview.html

There is little we can do to trace this matter further. As can be seen
from the overview page, the Tor network is designed to make tracing of
users impossible. The Tor network is run by some 5000 volunteers who
use the free software provided by the Tor Project to run Tor routers.
Client connections are routed through multiple relays, and are
multiplexed together on the connections between relays. The system
does not record logs of client connections or previous hops.

This is because the Tor network is a censorship resistance, privacy,
and anonymity system used by whistle blowers, journalists, Chinese
dissidents skirting the Great Firewall, abuse victims, stalker
targets, the US military, and law enforcement, just to name a few.
See https://www.torproject.org/about/torusers.html.en for more info.

Unfortunately, some people misuse the network.

Standard - Destination IP

Hi

The IP address in question is a Tor exit node.
https://www.torproject.org/overview.html

There is little we can do to trace this matter further. As can be seen
from the overview page, the Tor network is designed to make tracing of
users impossible. The Tor network is run by some 5000 volunteers who
use the free software provided by the Tor Project to run Tor routers.
Client connections are routed through multiple relays, and are
multiplexed together on the connections between relays. The system
does not record logs of client connections or previous hops.

This is because the Tor network is a censorship resistance, privacy,
and anonymity system used by whistle blowers, journalists, Chinese
dissidents skirting the Great Firewall, abuse victims, stalker
targets, the US military, and law enforcement, just to name a few.
See https://www.torproject.org/about/torusers.html.en for more info.

Unfortunately, some people misuse the network.

Never the less we can at least block access to the affected server.
This means that we need your IPv4 and/or IPv6 (PUBLIC) address to put
it on our blacklist. This block disables all Tor traffic to your server.
Please note that we do only keep your IP in our blacklist for about
a month as we do not want to block access to your server for all the legitimate Tor users.

Don't hesitate to contact us if you have any questions!

Blocking Requests/Distributing Malware

Hi
We don´t know the real IP behind this attack as Tor is designed to make tracing users impossible.
The only thing we can do is to block the destination IP address.

This block is but temporary as we don't want legitimate Tor users to suffer from this.

Greetings

abuse_handling.txt · Last modified: 2018/05/25 19:40 by virii