The Community Forums

Interact with an entire community of cPanel & WHM users!
  1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Advice:

Discussion in 'General Discussion' started by hostmedic, Apr 19, 2006.

  1. hostmedic

    hostmedic Well-Known Member

    Joined:
    Apr 30, 2003
    Messages:
    559
    Likes Received:
    0
    Trophy Points:
    16
    Location:
    Washington Court House, Ohio, United States
    cPanel Access Level:
    DataCenter Provider
    We have a client who is not from the U.S.
    They paid via Paypal some time ago - roughly 8 1/2 months for an entire year for a dedi server.

    In the past week we have seen a great # of spam reports and complaints against their server as well as a huge increase in bandwidth consumption. The previous week - a ton of traffic creating a Ddos

    We have tried unsuccessfully to contact them via email, Instant Messanger as well as adding a header and footer to their person cPanel site as well as their whm system and the MOTD via login.

    We dont want to turn this client off - but a search on their server found numerous scripts such as udp.pl and others... We cleaned off - and they are now back.

    Any suggestions here? or after 2 weeks is it worth just turning them off...
    They have roughly 15 or so clients on the server - and have broken our AUP and TOS in a major way...

    We dont want to have them suffer - but want to be good netcitizens as well....
     
  2. PWSowner

    PWSowner Well-Known Member

    Joined:
    Nov 10, 2001
    Messages:
    2,948
    Likes Received:
    3
    Trophy Points:
    38
    Location:
    ON, Canada
    After 2 weeks of trying to contact them through each method possible, I would say that's enough warning. If you have a phone number from when they signed up, try that too, but otherwise, it's time to do something.

    If they have customers who aren't doing anything wrong, I'd suggest suspending their site, leave the customers up, and change the server password. Then give them another period of time, maybe 2 weeks, to do something before the server (and the customer sites) gets shut down.
     
  3. hostmedic

    hostmedic Well-Known Member

    Joined:
    Apr 30, 2003
    Messages:
    559
    Likes Received:
    0
    Trophy Points:
    16
    Location:
    Washington Court House, Ohio, United States
    cPanel Access Level:
    DataCenter Provider
    thanks

    Thanks Mike

    One last addition - I even tried to PM them via these boards...
    just hate to kill the clients under them...

    btw - great scripts I literally just signed up...
    you dont have all 50 online though...?
     
  4. PWSowner

    PWSowner Well-Known Member

    Joined:
    Nov 10, 2001
    Messages:
    2,948
    Likes Received:
    3
    Trophy Points:
    38
    Location:
    ON, Canada
    That's why I suggested just suspending his account for now.

    I know. You probably got my email by now.

    50?
    Might have that many one of these days.
     
  5. hostmedic

    hostmedic Well-Known Member

    Joined:
    Apr 30, 2003
    Messages:
    559
    Likes Received:
    0
    Trophy Points:
    16
    Location:
    Washington Court House, Ohio, United States
    cPanel Access Level:
    DataCenter Provider
    suspended already...

    thanks - did his account - but the udp.pl was under tmp and not sure which account it came into...

    for the scripts I got the # 50 from here ....

    (being silly I read to fast -- it says --- over 50 members... - I thought it was "over 50 scripts.... toss that one into the bag of --- you know you need sleep when . . . LOL )


    http://forums.cpanel.net/showthread.php?t=51906
     
  6. PWSowner

    PWSowner Well-Known Member

    Joined:
    Nov 10, 2001
    Messages:
    2,948
    Likes Received:
    3
    Trophy Points:
    38
    Location:
    ON, Canada
    Oh yeah, that's where I used the number 50.

    I know all about needing sleep. Most business owners do at one time or another. :D
     
Loading...

Share This Page