Jump to content

All Activity

This stream auto-updates     

  1. Past hour
  2. http://www.ketodietwalmart.com/source-organics-keto/ Source Organics Keto Make peace by using your body. Don't think of dieting as an "assault" all over your fat or simply a way repair aspects of the figure a person simply don't for instance. Think of dieting as nurturance and fix accepting yourself, even in case you are not yet satisfied employing your health. Source Organics Keto Reviews Weight Loss Complete Best Products Official Price & Buy https://source-organics-keto-12.webself.net/
  3. Essential CBD Extract is the principle unfastened preliminary model on hand these days that is one hundred% blanketed and first-rate to use for splendid coexistence and joy. No compelling purpose to make any great convention with the health practitioner regarding the utilization of this enhancement. For ideal consequences, it's far encouraged to take one field one hour before going to bed. Try not to avoid as some distance as feasible and in no way go past the point of confinement on account that that could make bothering the well being. http://www.supplementpriority.com/essential-cbd-extract/
  4. Today
  5. Yesterday
  6. petzl

    Massive spam Attack - Looking For Input

    Seems to me Namecheap are "shining" on you Spamhaus does list domains surprised namecheap are not on it? Namecheap don't like negative publicity Bodgie, worthless , inferior; false. name address? probably email as well, try forward as attachment spammers spam to "green1.dakotaATgmail.com", if proven fake (bounces) you can try ICANN to deregister Namecheap for non-compliance.. Registrars are supposed to confirm accuracy? All domain sites contact information has to be true and accurate. SpamCop was once deregistered when it changed its fax number and neglected to update this. Joker.com did not support spammers This was during the "spam wars" where $$new blocklist opportunists$$ attacked SpamCop because of it's success and were dobbed in by competitor/s ASAP fax number was noticed changed. Namecheap seems to have security issues this is a reply in comments from article about Namecheap. Credit Card info stolen (last purchase: Namecheap)My last purchase was a DNS certificate through NameCheap. 24 hours later: $1,000 of fraud coming through on that card. Anyone else here having any issues?
  7. nhraj700

    Massive spam Attack - Looking For Input

    NameCheap won't do anything until Spamhaus does. Wished the average user could contact Spamhaus as whatever methods they use don't pick up on this attack. Is Dakota Green the spammer? https://whois.domaintools.com/redipping.com
  8. Last week
  9. petzl

    Massive spam Attack - Looking For Input

    is out of action I checked, possible for servers to scan outgoing email? Also in Gmails webmail click spam for "report phishing" in options after opening email. Gmail will block from domains as opposed to blocking IP's if enough phishing hits just checked again, Thursday 22/08, it's back-up! http://67.229.173.51 Registrar Abuse Contact Email: mailto:abuse@namecheap.com
  10. nhraj700

    Massive spam Attack - Looking For Input

    I just did an experiment. I just happened to send in a report to US Cert, Spamcop, US Phishing and Anti-phishing org and the report came back from Spamcop stating that... Routing details for 67 229 173 51[refresh/show] Cached whois for 67 229 173 51 : abuse vpls comUsing abuse net on abuse vpls comNo abuse net record for vpls comUsing best contacts abuse vpls com ISP has indicated spam will cease; ISP resolved this issue sometime after 8/19/2019, 5:25:56 PM -0700 Message is 1 hours old What's weird is how did I get a fresh spam if VPLS fixed it? Anyhow, so I sent that particular spamcop report link and the offending domain name (redipping com) and IP to NameCheap and again created another ticket. I said to them look, VPLS admits this is spam so why don't you take care of this registrant. Maybe they'll move on it without having this domain on a SpamHaus blocking list. Fun Times!!
  11. petzl

    Massive spam Attack - Looking For Input

    You lost me on this one. Send to who, the Registrar, Host or Cert? And for DDOS attack? Is this what I am getting with a spambot. Or is that more of a server that's getting it not my home network? What addresses are you putting in the TO field. Domain Addresses or Host IP's? look at a SpamCop report, it will list what IP address it came from and a "key word" to look for, I use Opera web browser and "Ctrl + F" put a search bar on top, put/paste this keyword into it and you should easily see the offending IP, more importantly the server name picking it up. KEYWORD to use in future searches. "win32whois" will give the abuse addresses to post to. include the US cert and who ever. "" Best to do this from your Gmail web page, after opening email, click options "3 vertical dots" (top right) then select "Show original" a new page/tab will open showing you the IP "SPF: PASS with IP 111.111.111.111 Learn more" under that it will give the domain name "DKIM: 'PASS' with domain emails.XXXXXXX Learn more" Depending on spam you "forward as attachment" to (Always in the "To" field) abuse desks government agencies. this means you are telling recipients who is getting reports maybe raising your priority. put these abuse contacts in your address book or on notepad to copy/paste later, "phishing-report at us-cert gov" sounds good but most if not all Gov agencies sit on their elbows because they can't find their ass's, but looks threatening to abuse desks and you may get lucky and them VERY unlucky Seems to me Namecheap are saying they are bring domains down, don't forget to check though. http://67.229.79.114 is still up?
  12. nhraj700

    Massive spam Attack - Looking For Input

    I was able to have NameCheap shutdown 4 of the domains. Small win I guess especially in looking at the article link you supplied. 4 shutdown of the 11K domains used to run spam bots on NameCheap. Damn not a very good winning percentage. The big problem is what you alluded to. They keep changing the IP's and so therefore avoiding any kind of blacklisting. NameCheap won't act on it unless Spamhaus has them listed. I guess I am the only person in the world reporting these guys. In looking at AbuseAT they are squeaky clean. I can't believe when looking up these domain names, domain IP's and hosting Ip's on the Talos Reputation page there appears to be no trouble for them. Too weird. Since 90% of the IP's identified by reporting to SpamCop are US based providers, I am also sending to phishing-report at us-cert gov. Not sure if I need others? In looking at the First List how do you know who to send to in other countries and are there any addresses to forward to? I don't see any abuse addresses only team contacts. Probably not looking in the right spot. You lost me on this one. Send to who, the Registrar, Host or Cert? And for DDOS attack? Is this what I am getting with a spambot. Or is that more of a server that's getting it not my home network? What addresses are you putting in the TO field. Domain Addresses or Host IP's? NameCheap actually looked at all my SpamCop reports and converted the IP's to Domain names. So they appear to be playing nice.
  13. So, is it a problem that Spamcop send reports to vvsg180@gmail.com, is it legit or not?
  14. petzl

    Massive spam Attack - Looking For Input

    Namecheap are the registrar all they have to do is change password access, seem spammer is using compromised accounts? so would think they can disown them, Spamhaus is also evidence in reports. NameCheap are the most abused by botnet spammers http://domainincite.com/22472-spamhaus-ranks-most-botted-tlds-and-registrars Not good publicity for NameCheap so they may look into it? Also report the host IP abuse (a few do something also use/report to the country CERT ) Also there is no need to use up SpamCop data just send as attachment from your email/Gmail account (mark as phishing) as attachment, much cheaper. for DDoS attack. put all addresses in the TO field. example of what I put in email body to give you a heads-up show spamhaus link in your case (if one is given) Namecheap are playing the fool noway they can't get a domain name from a IP address Traceroute will/should do this 67.229.79.114 = http://palterer.org abuse[AT]namecheap.com 89.163.243.41 = new.bedlamized.com abuse[AT]namecheap.com 62.210.76.243 agmaa.net abuse[AT]namecheap.com botnet source - ddos 36.27.123.65 antispamXzjnoc.hz.zj.cn see http://www.abuseat.org/lookup.cgi?ip=36.27.123.65 offending email forwarded also, can be read as text attachment with a text/ASCII editor like notepad or eml text reader
  15. nhraj700

    Massive spam Attack - Looking For Input

    Petzl, Thank you for your input and recommended WIN program. NameCheap has indicated to me that while they don't host the data for these domains and can't check the server logs for spam abuse from the 30 or so I sent them through Spamcop reports, they however have opened up a case with Spamhaus. Is that a good thing and have you seen positive results from that or is this a "pass the buck" kind of move? They told me to report directly to the hosts, but I am assuming that isn't working as Spamcop is doing that through the reporting process. Out of the 30 I sent, only 5 domains showed up on the Spamhaus DBL list and according to NameCheap, that's what prompted them to open a case.
  16. Interesting that the cached whois says it is from the mirror and the format of it is slightly different. Also interesting that APNIC and RIPE seem to have abandoned the separate abuse handle in favor of the following line: % Abuse contact for '203.188.252.0 - 203.188.252.255' is 'nayon.isn@bangla.net.bd' If I recall correctly, everyone used to use something similar to the following: OrgAbuseEmail: abuse@example.com
  17. Thats good to know. The site where link goes, have again the same russian owner.
  18. nayon.isnpAT[bangla.net.bd seems is the correct address
  19. petzl

    Massive spam Attack - Looking For Input

    https://www.spamcop.net/sc?id=z6566520311z41fa0c960e85e844a30002d278ed6f9az https://www.spamcop.net/sc?id=z6566520312z6ce0103f34a127b8f20ded2333c8d06az https://www.spamcop.net/sc?id=z6566520330z977931b5a816ec376b8d9d8e3faee0b6z looked at 3 all seem to be free webhosting sites worldwide 67.229.79.114 abusexvpls.com 1st reported on Submitted: 8/7/201 Registrar Abuse Contact Email: mailto:abuse[AT]namecheap.com http://67.229.79.114 89.163.243.41 abusexmyloc.de 1st reported Submitted: 8/7/2019 Registrar Abuse Contact Email: mailto:abuse[AT]namecheap.com http://89.163.243.41 62.210.76.243 abusexonline.net 1st reported Submitted: 8/18/2019 Registrar Abuse Contact Email: mailto:abuse[AT]namecheap.com http://62.210.76.243 "Please enter your email address below to unsbscribe from future mailings." put in the appropriate abuse address, not yours if you must. this is a whack a mole reporting By using different IP addresses the spammer is avoiding blacklisting, seems that spammer is flooding you from all their free sites A good Website/registrar WhoIs ror windows http://www.gena01.com/win32whois/ NameCheap are US based so come under US law. Should have credit card details of criminal. “Book 'em, Danno. Murder One.”
  20. What constitutes a "bounce" in this context isn't always apparent to a volunteer such as myself. It could be anything, such as a dead email address, a full inbox or auto replies that have, for some reason, been counted as a bounce. As for why the reporting address didn't update, it's likely that whoever is responsible for updating reporting addresses in the database(s) Spamcop consults hasn't made any changes for a while.
  21. Hey all, Looking for some input on what "you" would do in addition to what I am already doing. I am at wit's end and considering giving up on this one. I seem to have landed on some spambot or persistent POS spammer's list on an email address that typically has had no spam sent to it or was successfully filtered by the provider. Unfortunately this ordeal has burned up all of my Spamcop fuel. I am reporting every spam email to Spamcop, UCE, ORA.FDA, ACMA, Phishing at US CERT, Phishing at Antiphishing org. This attack is repetitive in content and seems to be repetitive in sources. What bothers me is sometimes I get auto-response from Spamcop stating ISP has taken care of the address but what is weird is it is usually dated the day or two before and I am reporting within seconds of getting it. Is the spammer sending some sort of auto-response to Spamcop to trick it? Below is hopefully enough of a list of tracking url's that might give someone with better experience to ascertain what steps I might take and see a pattern. [Edited to add offenders at a glance] These seem to be the major offenders over and over. proxad[dot]net cv[dot]net nl[dot]leaseweb[dot]com pratiksunucum[dot]com primary[dot]net dedibox[dot]fronline[dot]net hostnit[dot]com quadranet[dot]com vpls[dot]comus[dot]leaseweb[dot]com leaseweb[dot]de multacom[dot]com velia[dot]net netmyne[dot]com stackip[dot]net he[dot]net netbudur[dot]com ikoula[dot]com dacentec[dot]com heg-us[dot]com colocrossing[dot]com psychz[dot]net aknietteteeva[dot]gmail[dot]com [End Edit] Thanks in advance. https://www.spamcop.net/sc?id=z6566520311z41fa0c960e85e844a30002d278ed6f9az https://www.spamcop.net/sc?id=z6566520312z6ce0103f34a127b8f20ded2333c8d06az https://www.spamcop.net/sc?id=z6566520313z8a760a7cd8dfb78366d954b0e4460973z https://www.spamcop.net/sc?id=z6566520314z66c0ec5b5300a4a5734ad34540c62f58z https://www.spamcop.net/sc?id=z6566520315zf3db2a8604dcf93f6007a32efad861b7z https://www.spamcop.net/sc?id=z6566520316zdbd95a02f7dfb85453517bbbe5c1e117z https://www.spamcop.net/sc?id=z6566520317z41c2e155668cb8b886f066a4874c6d00z https://www.spamcop.net/sc?id=z6566520318z253fb3c16c5537e73d18db3203070de1z https://www.spamcop.net/sc?id=z6566520319z1164ef6a60b17d090a142ccff880defaz https://www.spamcop.net/sc?id=z6566520320z18000c74cc774082bb65d03342691fe8z https://www.spamcop.net/sc?id=z6566520321z2e7fa652d590841ded710d39b824bd9az https://www.spamcop.net/sc?id=z6566520322zb0a2689b23f9d3c7384e782de1208e93z https://www.spamcop.net/sc?id=z6566520323z1c9c291593ff190f20a0b056f59a85faz https://www.spamcop.net/sc?id=z6566520324z8a09b1f06b53160183624992abb3110cz https://www.spamcop.net/sc?id=z6566520325z04094c2130063750649dd06968ce07ccz https://www.spamcop.net/sc?id=z6566520326z5b3541758582127ae705892424c27e9bz https://www.spamcop.net/sc?id=z6566520327zb78c4a1273c690a265e02f49d1426372z https://www.spamcop.net/sc?id=z6566520328z2bb0a9838d540a0df0ebd1b5a7fa5b39z https://www.spamcop.net/sc?id=z6566520329z6166255f0056dd0c0183cddcb85d5c08z https://www.spamcop.net/sc?id=z6566520330z977931b5a816ec376b8d9d8e3faee0b6z
  22. The link still forwards. Apparently, the link is a search where it clicks the "I feel lucky button" and forwards directly to the first returned google search result. The "I feel lucky" button as being part of the URL: btnI=bQm4
  23. Earlier
  24. Google seem to of taken link down?
  25. https://www.spamcop.net/sc?id=z6566177613zbe9f03927879099214d104a432d8c2c0z But wait... Tracking message source: 203.188.252.24: Routing details for 203.188.252.24[refresh/show] Cached whois for 203.188.252.24 : faruque@bangla.netinfo@bangla.net bounces (10 sent : 6 bounces)Using best contacts I even tried refreshing but will it will not update. Steve
  26. This is same spam i get almost every day, but this one use google link instead of that russian site. I dont know what that link does, but it is to google.com https://www.spamcop.net/sc?id=z6566161130zd34619e4d85c8adc3716c597c9f69569z
  27. petzl

    AWS spam source

    AWS has a crime problem starting at it's abuse address, they seem in on it! try here for latest abuse address https://aws.amazon.com/security/report-suspicious-emails/
  28. Sorry for the late reply. Seemed that these messages arrived in the gmail spambox and I just moved to gmail and I don't use imap. So I did not see the spam folder. I will try next time if this happens to pass this report. I just use the headers from Outlook 2013 and paste them in the box. This was the only time I had issues with reporting spam, and only with this message. Thank you both for your help and again sorry that I checked the spambox so late.
  29. I've seen some with apparent connections to Russia. Thankfully my provider filters them out before they make it to my inbox or junk/spam folder.
  1. Load more activity
×