First of all, let me start by saying that I'm sorry that you had a bad experience with us. I'd like to explain our process and the series of events so that everyone understands what happened.
When an order is flagged by MaxMind, the order is automatically cancelled by the MaxMind plug-in in WHMCS, and a message is displayed on the screen advising the customer to contact us for more information. The customer noted that they saw this message in one of their posts. I'm sorry if the message wasn't clear enough, but it said in the message to contact us for more information.
When the customer contacted us, we notified him that based on the warning characteristics of the order, we did not wish to continue. When orders have a number of warning characteristics, even if we spend the time to work with the customer to address all of the concerns, we aren't likely to ever going to feel confident in our decision to allow the order to proceed.
We don't like revealing to high risk orders why their order was flagged, as it gives them a roadmap on how to either attempt to defraud us or others in the future. I am not saying that was this customer's intent here, just speaking in general terms. That is why our first e-mail did not reveal any of the reasons why the order was rejected.
Here are the reasons why the customer's order was rejected.
1) MaxMind flagged his IP address as high risk.
2) The name on the customer's account did not match the name he used in a previous sales request, nor in his e-mails to us.
3) The customer utilized a VPN to submit his order. (NOTE: At the time we did not realize it was the IP address of a competitor's network, so this didn't play into the decision.)
4) The address the customer provided was in Atlanta, but the residential IP address was that of Northland Cable in Greenwood, South Carolina (after he disabled his VPN).
5) The name, address, e-mail address and phone number on the whois of the domain name provided did not match the information provided on the order form. This by itself is not a warning characteristic, but when combined with other warning characteristics, this escalates our level of concern.
6) The customer signed up for more than one month in advance. We often find that fraudulent orders are placed for multiple months in advance to "test" the credit card. This by itself is not a warning characteristic, but when combined with other warning characteristics, this escalates our level of concern.
Based on these issues, we did not want to proceed.
When the customer e-mailed us a second time, the customer's tone started becoming aggressive. We did not immediately respond (as we were working with another customer to resolve an issue which took priority over a billing request on a Saturday). He sent another e-mail just under an hour later with links to three industry sites at the top of the e-mail, which we took as a threat to allow the order to go through or else he would post negative reviews. We don't take threats lightly and this was the end of the conversation for us. In our final message, we advised him of the VPN issue as one of the reasons why we did not want to proceed and wished him well in his search for another provider.
Later, after he posted on WHT and VPSBoard and made a number of accusations about QuickPacket being a malware host, that we were trying to defraud our customers, and whatever else he has claimed, we looked a little deeper into his order and discovered that his IP address belongs to a competitor. The customer has stated that the IP address he ordered from was his work VPN IP address, so this leads me to wonder if his attempts to bash us are at least partially motivated by his employment by a competitor. Whether or not he works for a competitor really doesn't matter to me. I only mention it because he said he works for the company he VPN'ed in from or something to that effect.
I'm surprised that the VPSBoard staff has allowed the IP address information I shared in confidence with them to end up in jarland's hands. After assuring me that the info would not leak out, they did it anyway.
Let me also clear up two false things that this customer has claimed.
- At no time have we attempted to defraud anyone. The plans on our website are accurate. If we catch a typo, we correct it.
- We do not tolerate malware being hosted on our network. We investigate and address all abuse complaints. Our reaction to the abuse complaint depends on the situation.
That's pretty much all I have to say about this matter. I hope this clears things up for everyone.
When an order is flagged by MaxMind, the order is automatically cancelled by the MaxMind plug-in in WHMCS, and a message is displayed on the screen advising the customer to contact us for more information. The customer noted that they saw this message in one of their posts. I'm sorry if the message wasn't clear enough, but it said in the message to contact us for more information.
When the customer contacted us, we notified him that based on the warning characteristics of the order, we did not wish to continue. When orders have a number of warning characteristics, even if we spend the time to work with the customer to address all of the concerns, we aren't likely to ever going to feel confident in our decision to allow the order to proceed.
We don't like revealing to high risk orders why their order was flagged, as it gives them a roadmap on how to either attempt to defraud us or others in the future. I am not saying that was this customer's intent here, just speaking in general terms. That is why our first e-mail did not reveal any of the reasons why the order was rejected.
Here are the reasons why the customer's order was rejected.
1) MaxMind flagged his IP address as high risk.
2) The name on the customer's account did not match the name he used in a previous sales request, nor in his e-mails to us.
3) The customer utilized a VPN to submit his order. (NOTE: At the time we did not realize it was the IP address of a competitor's network, so this didn't play into the decision.)
4) The address the customer provided was in Atlanta, but the residential IP address was that of Northland Cable in Greenwood, South Carolina (after he disabled his VPN).
5) The name, address, e-mail address and phone number on the whois of the domain name provided did not match the information provided on the order form. This by itself is not a warning characteristic, but when combined with other warning characteristics, this escalates our level of concern.
6) The customer signed up for more than one month in advance. We often find that fraudulent orders are placed for multiple months in advance to "test" the credit card. This by itself is not a warning characteristic, but when combined with other warning characteristics, this escalates our level of concern.
Based on these issues, we did not want to proceed.
When the customer e-mailed us a second time, the customer's tone started becoming aggressive. We did not immediately respond (as we were working with another customer to resolve an issue which took priority over a billing request on a Saturday). He sent another e-mail just under an hour later with links to three industry sites at the top of the e-mail, which we took as a threat to allow the order to go through or else he would post negative reviews. We don't take threats lightly and this was the end of the conversation for us. In our final message, we advised him of the VPN issue as one of the reasons why we did not want to proceed and wished him well in his search for another provider.
Later, after he posted on WHT and VPSBoard and made a number of accusations about QuickPacket being a malware host, that we were trying to defraud our customers, and whatever else he has claimed, we looked a little deeper into his order and discovered that his IP address belongs to a competitor. The customer has stated that the IP address he ordered from was his work VPN IP address, so this leads me to wonder if his attempts to bash us are at least partially motivated by his employment by a competitor. Whether or not he works for a competitor really doesn't matter to me. I only mention it because he said he works for the company he VPN'ed in from or something to that effect.
I'm surprised that the VPSBoard staff has allowed the IP address information I shared in confidence with them to end up in jarland's hands. After assuring me that the info would not leak out, they did it anyway.
Let me also clear up two false things that this customer has claimed.
- At no time have we attempted to defraud anyone. The plans on our website are accurate. If we catch a typo, we correct it.
- We do not tolerate malware being hosted on our network. We investigate and address all abuse complaints. Our reaction to the abuse complaint depends on the situation.
That's pretty much all I have to say about this matter. I hope this clears things up for everyone.
Last edited by a moderator: