We have indications that there was an attack from your server.
Please take all necessary measures to avoid this in the future and to solve the issue.

We also request that you send a short response to us. This response should contain information about how this could have happened and what you intend to do about it.
In the event that the following steps are not completed successfully, your server can be blocked at any time after the 2017-11-02 12:47:06 +0100.

How to proceed:
- Solve the issue
- Test if the issue still exists by using the following link: http://abuse.hetzner.de/retries/?tok...22c9d097050ef9
- After successfully testing that the issue is resolved, send us a statement by using the following link: http://abuse.hetzner.de/statements/?...22c9d097050ef9

Important note:
When replying to us, please leave the abuse ID [AbuseID:431497:22] unchanged in the subject line. Manual replies will only be handled in the event of a lock down. Should you have any questions relating to this, please contact our support staff at support@hetzner.de.
Please note that we do not provide telephone support in our department.
If you have any questions, please send them to us by responding to this email.

Kind regards

Network department

Hetzner Online GmbH
Industriestr. 25
91710 Gunzenhausen / Germany
Tel: +49 9831 505-0
Fax: +49 9831 505-3
abuse@hetzner.de
www.hetzner.com

Register Court: Registergericht Ansbach, HRB 6089
CEO: Martin Hetzner

On 31 Oct 21:45, root@monitoring2.rz1.hetzner.de wrote:
> ##########################################################################
> # Netscan detected from host 88.99.40.228 #
> ##########################################################################
>
> time protocol src_ip src_port dest_ip dest_port
> ---------------------------------------------------------------------------
> Tue Oct 31 21:45:08 2017 TCP 88.99.40.228 49187 => 3.21.58.174 445
> Tue Oct 31 21:45:41 2017 TCP 88.99.40.228 49496 => 3.46.69.226 445
> Tue Oct 31 21:45:48 2017 TCP 88.99.40.228 49609 => 3.48.175.127 445
> Tue Oct 31 21:45:42 2017 TCP 88.99.40.228 49504 => 3.163.134.88 445
> Tue Oct 31 21:45:35 2017 TCP 88.99.40.228 49402 => 3.219.66.23 445
> Tue Oct 31 21:45:41 2017 TCP 88.99.40.228 49483 => 3.225.238.225 445
> Tue Oct 31 21:45:13 2017 TCP 88.99.40.228 49211 => 6.7.183.136 445
> Tue Oct 31 21:45:23 2017 TCP 88.99.40.228 49270 => 7.107.253.209 445
> Tue Oct 31 21:45:40 2017 TCP 88.99.40.228 49469 => 7.209.12.250 445
> Tue Oct 31 21:45:33 2017 TCP 88.99.40.228 49380 => 7.242.106.112 445
> Tue Oct 31 21:45:46 2017 TCP 88.99.40.228 49579 => 9.7.12.209 445