Jump to content

petzl

Memberp
  • Content Count

    2,485
  • Joined

  • Last visited

Community Reputation

0 Neutral

2 Followers

About petzl

  • Rank
    Been There

Contact Methods

  • Website URL
    http://tinyurl.com/abba-money-money-money-midi
  • ICQ
    https://youtu.be/vt1Pwfnh5pc

Profile Information

  • Gender
    Male
  • Location
    Sydney Australia
  • Interests
    https://youtu.be/vt1Pwfnh5pc

Recent Profile Visitors

5,252 profile views
  1. petzl

    Three Ways to Report spam

    probem with adding IP's/ providers to a blacklist is it becomes a political "sh*tlist Sometimes this is to me a good thing I would have "Namecheap" OVH China but that is not good thing to everyone!
  2. petzl

    Parsing truncated

    this going through a internal network/intranet? Through email server Ecuador needs password change (no TLS) 190.152.46.226 no abuse address try CERT https://www.first.org/members/teams/#Ecuador From Botnet in India 106.210.0.13 https://www.abuseat.org/lookup.cgi?ip=106.210.0.13
  3. petzl

    OVH.Net spam ?

    51.79.145.214 is where it came from and reported correctly to OVH Add to notes Child porn spammer pictures under 18 or made to look under 18 NO PROOF OF AGE available! SENT TO MINORS
  4. petzl

    Russian spam can't be reported

    2a01:111:e400:7ebd:0:0:0:51 abuse[AT]microsoft[dot]com If your email is going through a internal network it's hard to report?
  5. petzl

    Exploring other avenues for reporting spam

    Each country has a "Computer emergency response team" (CERT) which can override abuse desks. They often give a ISP a "hurry-up" order to get things fixed https://www.first.org/members/teams/ The problem is a lot of these addresses are run by companies just for their company, This creates confusion because many are not English and hard to differentiate between business and Government!
  6. Probably email is too large, learn to truncate below the spam headers look at the bottom of spam shown in link below for word "Truncated" https://www.spamcop.net/sc?id=z6643015246zbc86c5610081722fba5bae72dba9b145z;action=display
  7. Well I don't see the "received by" line Which should be followed with the "Received: from" vedicisland.com (vedicisland.com. [77.32.212.194]) As with this example (Gmail) https://www.spamcop.net/sc?id=z6643015246zbc86c5610081722fba5bae72dba9b145z
  8. look at the abuse address Windows Freeware Whois program below, http://www.nirsoft.net/utils/ipnetinfo.html
  9. thats normal you need to contact your ISP to get it to stamp it's own IP "received: by"? example belowhttps://www.spamcop.net/sc?id=z6643015246zbc86c5610081722fba5bae72dba9b145z Delivered-To: x Received: by 2002:a0c:9b89:0:0:0:0:0 with SMTP id o9csp1186644qve;
  10. SpamCop has them ALL whitelisted/won't report them. So your mailhosts seem ok. Assuming you clicked add new hosts and received a email, to which you clicked the embedded link? https://www.spamcop.net/sc?id=z6642947923z6d9895034f835eced8ac22b50e215d41z Your ISP has not stamped it's own IP "received: by"? example below https://www.spamcop.net/sc?id=z6643015246zbc86c5610081722fba5bae72dba9b145z
  11. Don't do them all just a few to website the rest via SpamCop handling abuse try their website https://www.ovh.com/world/abuse/ put in notes something like Criminal phishing, bogus reply address, bogus unsubscribe (NEVER subscribed), DDoS In windows to find registar of websiteI use this freeware program http://www.gena01.com/win32whois/ http://www.uhcphysicianfinder.com/main.html/z9zIiTTp 65.181.123.252 support[AT]dedicatednow[DOT]com Registrar Abuse Contact Email: mailto:abuse[AT]nameking[DOT]com
  12. Came from 94.100.177.110 abuse[AT]corp.mail[DOT]ru Not seeing your received IP your receiving email server? Add/edit your mailhost configuration log in to SpamCop click TAB Mailhosts Before you Submit a spam Top of page is tracking URL - example https://www.spamcop.net/sc?id=z6642853265z193d6fb05ee9b701404ec2d508af48b0z
  13. Not disagreeing However the worst I get is being listwashed
  14. Initially I would try to get OVH to act could be spam blackmailing innocent websites? They did have a Paypal link which seemed legit
  15. Looks like OVH are dead at the wheel in handling abuse. might try their website https://www.ovh.com/world/abuse/ put in notes something like Criminal phishing, bogus reply address, bogus unsubscribe (NEVER subscribed), DDoS The site I was redirected to is listed a malicious https://www.virustotal.com/gui/url/2bbb53811e2da7a35cd8dc638edd7e454176d41684005599247f4459df39a497/detection
×