Jump to content

petzl

Memberp
  • Content Count

    2,275
  • Joined

  • Last visited

Community Reputation

0 Neutral

2 Followers

About petzl

  • Rank
    Been There

Contact Methods

  • Website URL
    http://tinyurl.com/abba-money-money-money-midi
  • ICQ
    https://youtu.be/vt1Pwfnh5pc

Profile Information

  • Gender
    Male
  • Location
    Sydney Australia
  • Interests
    https://youtu.be/vt1Pwfnh5pc

Recent Profile Visitors

3,879 profile views
  1. petzl

    spam via VPN

    By not running a Virus/Malware program there is no way of knowing when/if your computer has been compromised This is also now "smart TV", "smart phone". smart fridge and so-on
  2. petzl

    spam via VPN

    A lot of VPN problems are due to compromised accounts. Seems there are a lot who won't run a Virus/Malware program I use two, Windows defender and SpyHunter Both can be a pain to set-up properly and they are always "updating", requiring watching!
  3. Email server website hyamer.com 220 states.hyamer.com ESMTP Postfix Test Result SMTP TLS Warning - Does not support TLS. SMTP Reverse DNS Mismatch OK - 171.22.120.197 resolves to states.hyamer.com
  4. petzl

    SC parse incomplete

    looks like a network receiving email 95.213.181.165 abusexselectel.ru
  5. petzl

    CloudFare Problems

    Still looking https://blog.cloudflare.com/project-galileo-fifth-anniversary/
  6. petzl

    CloudFare Problems

    For websites a different problem Cloudfare are "presently" selling "cheap" cloud storing space A lot of naive clients are not using secure passwords Cloudfare need to insist and check password compliance state the maximum characters their password can handle, with a minimum of 9 characters ideally need to have at least one .Lowercase, uppercase,a numeral and a special symbol like, ( ) - = @ $ ^ & ? etc, Perhaps generate a unique one randomly between 20 and 32 characters for every customer Then insist that a malware/virus scanner is being run (like Windows defender) They are not doing this
  7. petzl

    CloudFare Problems

    Can't find anything linking Cloudflare corporate to digitalocean? this is a digitalocean link? https://www.spamcop.net/sc?id=z6551228113zce6952908972d8430eb3d88f55842047z
  8. petzl

    CloudFare Problems

    Would like 1 only recent tracking URL, SpamCop works I don't get much from Cloud Flare? Seems something is up with them though? https://news.netcraft.com/archives/2015/10/12/certificate-authorities-issue-hundreds-of-deceptive-ssl-certificates-to-fraudsters.html
  9. found it but it's still spam using a email account a8-31.smtp-out.amazonses.com
  10. Doesn't pass the test as a mail server and history of IP shows two reported fake bounces and a fair bit of spam over 90 days
  11. fake bounce to you spammer has you as return address?
  12. Just botnet DDoS attacks, although using Chinese botnets I believe the insertion of Chinese writing in spam body may of been added as a red herring. Same for the fake drug spams which seemed to be coordinated with the Chinese botnet blitz, I found reporting https://12321.cn did shut the botnet down, they insist abuse reports be sent as attachment Can't guarantee that botnet attack won't start again? What I typically included in report botnet source - ddos 111.76.169.40 anti-spamxns.chinanet.cn.net see http://www.abuseat.org/lookup.cgi?ip=111.76.169.40 email server - reset password 219.235.112.153 ipasxcnnic.cn, Warning - Does not support TLS. offending email forwarded also, can be read as text attachment with a text/ASCII editor like notepad or eml text reader
  13. mine was through my SpamCop email account over 100 a day (reported everyone), mainly through Chinese Botnet, with Chinese writing, along with worldwide botnet fake drug etc, but stopped around a month ago now nothing I suspect the spam content was "red hearing" e.g. putting Chinese in spam body and using Chinese botnet? Typical report below botnet source - ddos 111.76.169.40 anti-spamxns.chinanet.cn.net see http://www.abuseat.org/lookup.cgi?ip=111.76.169.40 email server - reset password 219.235.112.153 ipasxcnnic.cn, Warning - Does not support TLS. offending email forwarded also, can be read as text attachment with a text/ASCII editor like notepad or eml text reader
  14. SpamCop now tries to cache "look-ups" but would need permission to be allowed to use RIPE At present SpamCop looks-up 9 spams a second
×