Thank you for your actions.
This request matched a pattern normally associated with scanning, abuse, or attempted exploitation. The event has been logged for security review.
Why you are seeing this page
The request you just made looked, to our security layer, rather more like a probe than a polite visit. That is not a personal judgement; it is a pattern match. Patterns can be wrong, and patterns can change.
If you are a real human who clicked an odd link, breathe out. The grass is, occasionally, greener on the other side — and the other side is just normal navigation.
What was logged
The request has been logged for security review. That log may include the operational metadata required to protect the service:
- Time of the request
- Requested host and path
- HTTP method and response classification
- IP address supplied by the network layer
- User agent string
- Referrer where supplied
- PROXY protocol source address where supplied by trusted infrastructure
- Security classification or reason where available
If this was a mistake
No drama. Return to the original website and use normal navigation. Errors can be corrected. Patterns can change. Logs help protect real users.
If this was automated probing, scraping, injection testing, or exploit scanning, please stop. This service is monitored to protect real users, customer systems, and mail infrastructure.
Repeated hostile activity may be shared with hosting providers, network operators, or other lawful recipients where appropriate.
Privacy-first security logging
Security events here are handled with UK GDPR principles in mind. Logs are operational records used to protect systems and users. They are not a marketing database, they are not sold, and they are not used for behavioural advertising.
For the full position, see the privacy notice and the UK GDPR page.