• Content count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About cwg

  • Rank
    Advanced Member

Contact Methods

  • ICQ
  1. Dunno, now its wokking just fine, ...
  2. So I submitted: After about 10 or 15 minutes of "connecting".
  3. Mailchimp (and a few other mass emailers) take abuse of their services very serious.
  4. But spamcop reports to ? So computers which use a DOD IP address are immune to being hacked? I gotta get one. (Above is tongue in cheek.)
  5. It was a manual add to a report on a phishing scam using their name and logo so there was no detailing as to the why the address was[at]
  6. If you go to their front page, go to the Contact Us page, on the page it says: "Report Suspicious Emails Help us combat fraud... report it to abuse[at]"
  7. Great Gasby's, the darn message tells you what to do, can't the parser be taught to change where it's supposed to search?
  8. That one is a bad example, NOW, in regards to parsing lookup. Domain was valid when the messages was submitted. Whether or not the link is valid, parser ought to be detecting the link, then attempting to resolve it, with the report stating it's invalid if it don't get a valid IP from the lookup. It's not doing that.
  10. I know this is an slightly old post, but you can restrict / cap usage of a DNS server by requester IP address.
  11. It's just yahoo originating email, any email message for the past few weeks that comes from a yahoo server is not link parsing. Does not matter whether I use the "outlook/eudora workaround form" or the "all in one", links are not parsing.
  12. The most perculiar the last few times I've submitted spam from a yahoo account, the system will NOT detect ANY links that are visible in the message, what's up with that?
  13. Posted a phishing email using their site as the phishing point at 12:38 CST, got an email from them not even an hour later: >--- Handled. Thanks! Regards, Ross Pike Customer Support Technician Bravenet Web Services Inc. http://www,bravenet,com ---< Nice.
  14. Semi rant, semi jest, if you look up the IP via other tools, eg ARIN, you get: NetRange: - CIDR: NetName: DNIC-RNET-029-000 NetHandle: NET-29-0-0-0-1 Parent: () NetType: Direct Allocation OriginAS: Organization: DoD Network Information Center (DNIC) RegDate: 1991-07-01 Updated: 2012-11-08 Ref: So, let me guess, machines which operate from a military IP address don't get infected or comprimised? I want one of these IP's. :rotfl: