Well, I am self-hosted, and hackers using clouds for hacks/scans (and the so-called "scanners-for-your-own-security-we-swear-we-don't-sell-the-scan-data-to-the-bad-ppl") are really a pain. OVH is not safe (and their scanner/hacking bot onyphe is a pain). But lately the "top" is ucloud.cn and everything hosted on digital ocean. Actually very few front IPs from russia or iran.
I wonder if there are EU clouds doing that properly, namely with its own internal "security" cleanup crew and getting rid of those hackers and scanners.
Well, I once got a notice from Hetzner, that I needed to either stop running or harden some random open service I wasn't aware of running on my dedi box (I may have forgotten to install a firewall...). If i recall correctly, they were bound by German law, to monitor their network for suspecious activity, and if the customers didn't comply, they could close down your box. Now, it was a while back, my memory is a bit fuzzy and I don't have the time to look through old emails. Consider this anecdata.
"Monitoring their network for suspicious activity" does not mean to scan ports.
It means they have to monitor if one of their hosted "boxes" is actually generating nasty traffic. Once detected, they have to inform the owner of the "box" that they have been pown, well, careful if the owner of the "box" is actually the mob...
And I can tell you, I get attacks/scans mostly from those "clouds", like I start to wonder if they are not "closing their eyes" on purpose because with their huge network resources it is wrecking "small hosting", or more "business" for them.
I wonder if there are EU clouds doing that properly, namely with its own internal "security" cleanup crew and getting rid of those hackers and scanners.