Jump to content


  • Content count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About showker

  • Rank
    Advanced Member
  1. showker

    116 Spams over night from Qtum Main Network??

    No, I don't think so. I looked at each one, and reported each one, and the "to" addresses were all over, with me "cc" ... Some were to AOL accounts and many (probably the majority) to Gmail accounts. I discovered SpamCop chokes when there's more than six domains to include. So, I only reported the spams up to the 5th domain so that the key domains would be reported. If people just clicked "report" then they only reported "Administrator of network where email originates" and none of the spamvertised domains. They also know Spamcop's routines very well, as they included links to Amazon, and Google ... but github.com is the main culprit. Sending IPs (if not VPS) range all over the place from to That's one of the real problems with the "new" internet masking craze : VPS, cyber crime's best new friend! :-) I'm so tied up with hurricane Irma, spam is the last thing on my plate.
  2. What's the deal with all this barrage of spam subject: Qtum Main Network Launches September ... or similar????
  3. We were fairly free of spam from a set of domains for quite a while, but now they seem to be back with a vengeance. Anybody else notice? anti-spam (@) ns (dot) chinanet (dot) cn (dot) net spam (@) jsinfo (dot) net abuse (@) 12321 (dot) cn postmaster (@) jsinfo (dot) net abuse (@) jsinfo (dot) net spam (@) ccert (dot) edu.cn
  4. showker

    CloudFare Problems

    Is this thread still active? I've been building a case for months. now you guys seem to have gone cold on going after Cloudflare. Let's go after them as a Class Action and at least get monetary compensation for our trouble.
  5. showker

    Reporting doesn't identify source IP

    Report the spamvertised address. Turn off Apple and YOUR report items, but do report the spamvertiser -- the entity intending to gain by sending the spam.
  6. showker

    CloudFare Problems

    Hey guys . . . When I am targeting a specific spammer, I copy all the text from "Here is your. . . " and save with reference. Actually it's real easy, just drag the last reference, then shift/click at "Here is your" and you select it all, then drag and drop into a text editor. (I use BBEdit) Not only does it keep that in a searchable form, if you use the Cloudflare reporting page, https://www.cloudflare.com/abuse/form They then accept it as "legal" .... I've done about 60 or so in the past several weeks. If there's anyone else out there interested in going after Cloudflare, please let me know. :-)
  7. Over the past six months I've seen an alarming rise in spam -- particularly body enhancement and health or weight loss -- with host listed as Cloudflare.com ... I've reported several hundred. Then I learn they ignore Spamcop and have their own reporting "form" ... Who else has Cloudflare.com spam reports? Would you be willing to hold them? Or, are you just not reporting them? What makes me very mad is they openly admit they let all the cybercrime through, and have no responsibility for who uses their VPN and IP Address masking. All their web site and so forth are completely automated and buffered from any contact. For all I know, it's actually a middle Eastern terrorist cell running it. Their income is in the millions. So today, if you want to send millions of spams, just put in two redirects, and host them at Cloudflare.com I've reported 60 or so through their form, which is a five-step form that only accepts one domain at a time. I pressed them on the point that after I've reported the attack, they can no longer claim not to know who is sending or what the nature of it is. So they're obviously covering up the fact of how rich they're getting off of shielding the cybercrime industry. I do not think SpamCop is adding them to the black lists since they haven't shown up anywhere. It should be illegal. :-(
  8. I had to shut down my spamcop address because of a "Joe Job" spam attack ... now it's over and I cannot find the original place to get the spamcop mail hooked back up. I re-read the instructions but the form returns a 404. :-( Any help?
  9. there have been a rash of attachment spams lately -- does anyone know if these are malwre? We got 8 this morning -- all said "Photos" like someone was sending me a photo . . . this one is an "invoice" ... we've gotten a rash of those too. Spamcop never finds the sender, and reporting is basically worthless. The IP resolves to somewhere in Iran ... are these ISIS terrorists trying to break in? In my email it looks sort of like this screen capture :
  10. Using this "User Notification" and "Additional Notes" fields, can the REAL ISP of the offending cybercrime site be notified? Is this right?
  11. showker


    They're okay. Check KNUJON on LinkedIN . It's just a major HUGE operation, and they're dreadfully underpaid and understaffed. But keep sending those reports. I got my updated report just the other day. :-)
  12. showker

    Are we losing the battle?

    > Are we losing the battle ? Yes > Would help if you showed a Tracking Url Since Spamcop stopped doing email services we no longer get the bulk reports of spam reported with tracking URLs. Now we must manually save them -- a huge problem if you're reporting hundreds of spams a day. But soon you can just give up. There will be no use trying to fight the deluge of cybercrime. Obama is giving the NS system anad DNS to a band of international rogues, mainly Chinese and Russians. At that point, it won't matter. You'll be innundated with spam and nobody cares. At that point, I'm probably throwing in the towell. I have over 9,000 documented spam "Kills" as recorded by Knujon. I've reported over 96,000 spams in the past decade. It's time for me to get off the grid and take my boat to the islands to live out my final days in unconnected bliss. :-)
  13. showker

    Multipart parsing

    You are correct. We've seen the same problem -- where "spamvertised" sites have been included in the reporting for over a decade, Spamcop has stopped recognizing the links. I believe it's a glitch, or bug in the parser. They couldn't have done it intentionally because they know it's just useless to report only the sending emailer. If they did, in fact, do it intentionally it's probably some political pressure because some of the "big boys" are annoyed by getting so many reports. Enom is a ring leader. Now that AMAZON is implicated in so much cyber crime activities, perhaps they brought their huge hammer down on Spamcop. We just don't know. But you can bet, both Google and Amazon are making a pile of money off the spam, cybercrime and cyber terrorism industry they don't dare hinder it. Now Microsoft is in the stew, and a percentage of the spammers are using the Microsoft Cloud. It's a hit for cyber criminals because Spamcop and similar automated reporting services recognize the 'cloud' as "No Master" ... so there's nobody to report to. If you Manually dissect the headers and links you'll find out exactly where it's coming from, right down to the machine IP address. Unfortunately, the "cloud" just renders "No Master" or large spam-friendly hosts like www.softlayer.com or true cybercrime cartels like Enom. You should go and check in to www.Knujon.com and begin reporting spam to them. They will accept a mailbox text file upload, so it's not a matter of reporting each spam. They parse and database "bad" web sites, hosts and registrars, and then petition through ICANN by identifying rogue registrars and criminal cartels. This is not necessarily shutting down spammers in the trenches -- but in the bigger picture, they're getting the huge cartels identified and squashed. . . . . that's http://www.Knujon.com/ thanks for reading. Fred
  14. Two or three fields should be added to the form that would include the "Spamvertised" site links. Since Spamcop form is broken and no longer 'finds' links in the spam, the reporting is sort of useless. The sender of the email is not helping curb the spam. Follow the money trail to the actual cyber criminals involved. Serious spam reporters can follow redirects and get the actual sites responsible for the spam. THOSE are the links / URLs / hosts that need to go into the black hole. To avoid abuse of those fields, perhaps a second level of reporting volunteers who will utilize the "executive" form correctly. I know you're very paranoid about false positives, but in that effort, you're missing the real culprits.
  15. Yesterday, Spamcop stopped including spamvertised web links in the reports. Generally it does no good what so ever to report the spam to the email provider of the sender. These are all throw-away email addresses which have no consequense on the spam sent or the cyber gang profiting from the spam. The entity advertised in the spam is the cyber criminal that should be reported. In many cases, the links are redirects or "single hop" links that get reported. These are of no consequence either because the spam uses them to bounce the victim to the actual spamvertised site. Most recently, these redirect links are at "No Master" hosts, and don't get reported anyway. This is the classic scenario of the porn, and pharma industries. We have been manually getting the target site link and manually reporting those to the admins responsible. We know this technique works because the sites are shut down and the spammer has to set up shop elsewhere. Which we then report. This is tedius and time consuming work. Spamcop should put a few fields in the REPORT form for the purpose of actually going after the creators of the spam. . . . two or three fields for "Spamvertised Web Links" . . . that way, the actual firm hosting the cyber criminals can be alerted. http://www.graphic-design.com/60-seconds/328_spam_we_can_do_without