Jump to content

petzl

Memberp
  • Content Count

    2,276
  • Joined

  • Last visited

Everything posted by petzl

  1. petzl

    no reporting for IP 109.94.2.125

    get a windows computer program http://www.nirsoft.net/utils/ipnetinfo.html or use a web whois search https://dnslytics.com/whois-lookup Then you can also send to a Countries Community Emergency Response Team (CERT) https://www.first.org/members/teams/
  2. petzl

    spam via VPN

    By not running a Virus/Malware program there is no way of knowing when/if your computer has been compromised This is also now "smart TV", "smart phone". smart fridge and so-on
  3. petzl

    spam via VPN

    A lot of VPN problems are due to compromised accounts. Seems there are a lot who won't run a Virus/Malware program I use two, Windows defender and SpyHunter Both can be a pain to set-up properly and they are always "updating", requiring watching!
  4. Email server website hyamer.com 220 states.hyamer.com ESMTP Postfix Test Result SMTP TLS Warning - Does not support TLS. SMTP Reverse DNS Mismatch OK - 171.22.120.197 resolves to states.hyamer.com
  5. petzl

    SC parse incomplete

    looks like a network receiving email 95.213.181.165 abusexselectel.ru
  6. petzl

    CloudFare Problems

    Still looking https://blog.cloudflare.com/project-galileo-fifth-anniversary/
  7. petzl

    CloudFare Problems

    For websites a different problem Cloudfare are "presently" selling "cheap" cloud storing space A lot of naive clients are not using secure passwords Cloudfare need to insist and check password compliance state the maximum characters their password can handle, with a minimum of 9 characters ideally need to have at least one .Lowercase, uppercase,a numeral and a special symbol like, ( ) - = @ $ ^ & ? etc, Perhaps generate a unique one randomly between 20 and 32 characters for every customer Then insist that a malware/virus scanner is being run (like Windows defender) They are not doing this
  8. petzl

    CloudFare Problems

    Can't find anything linking Cloudflare corporate to digitalocean? this is a digitalocean link? https://www.spamcop.net/sc?id=z6551228113zce6952908972d8430eb3d88f55842047z
  9. petzl

    CloudFare Problems

    Would like 1 only recent tracking URL, SpamCop works I don't get much from Cloud Flare? Seems something is up with them though? https://news.netcraft.com/archives/2015/10/12/certificate-authorities-issue-hundreds-of-deceptive-ssl-certificates-to-fraudsters.html
  10. found it but it's still spam using a email account a8-31.smtp-out.amazonses.com
  11. Doesn't pass the test as a mail server and history of IP shows two reported fake bounces and a fair bit of spam over 90 days
  12. fake bounce to you spammer has you as return address?
  13. Just botnet DDoS attacks, although using Chinese botnets I believe the insertion of Chinese writing in spam body may of been added as a red herring. Same for the fake drug spams which seemed to be coordinated with the Chinese botnet blitz, I found reporting https://12321.cn did shut the botnet down, they insist abuse reports be sent as attachment Can't guarantee that botnet attack won't start again? What I typically included in report botnet source - ddos 111.76.169.40 anti-spamxns.chinanet.cn.net see http://www.abuseat.org/lookup.cgi?ip=111.76.169.40 email server - reset password 219.235.112.153 ipasxcnnic.cn, Warning - Does not support TLS. offending email forwarded also, can be read as text attachment with a text/ASCII editor like notepad or eml text reader
  14. mine was through my SpamCop email account over 100 a day (reported everyone), mainly through Chinese Botnet, with Chinese writing, along with worldwide botnet fake drug etc, but stopped around a month ago now nothing I suspect the spam content was "red hearing" e.g. putting Chinese in spam body and using Chinese botnet? Typical report below botnet source - ddos 111.76.169.40 anti-spamxns.chinanet.cn.net see http://www.abuseat.org/lookup.cgi?ip=111.76.169.40 email server - reset password 219.235.112.153 ipasxcnnic.cn, Warning - Does not support TLS. offending email forwarded also, can be read as text attachment with a text/ASCII editor like notepad or eml text reader
  15. SpamCop now tries to cache "look-ups" but would need permission to be allowed to use RIPE At present SpamCop looks-up 9 spams a second
  16. Who is "One" Petzl? One in this case is SpamCop's owners If to many requests and SpamCop makes a lot and are like a DoS attack
  17. Used to be RIPE objected to SpamCop links of any sort. So one needs to check with RIPE to see if it is now acceptable?
  18. I are not getting any spam. I miss it? I enjoy burning wings off spammers
  19. This is normal to everyone. You are not alone. Your mailhost was not working even though you had it entered correctly. Makes everyone look foolish
  20. Don't know went to hanks group and clicked a link which went to another link etc until it showed a user track EOM
  21. SpamCop always does a fresh parse on every lookup. So yes it dissapears on new info has always done this even in the last millennium
  22. look OK to me to? https://www.spamcop.net/sc?id=z6550829312z28b288e7765aed3250e66e22677929e8z source 109.236.94.178 worldstream[x]nl
×