Jump to content

petzl

Memberp
  • Content Count

    2,270
  • Joined

  • Last visited

Everything posted by petzl

  1. petzl

    CloudFare Problems

    Still looking https://blog.cloudflare.com/project-galileo-fifth-anniversary/
  2. petzl

    CloudFare Problems

    For websites a different problem Cloudfare are "presently" selling "cheap" cloud storing space A lot of naive clients are not using secure passwords Cloudfare need to insist and check password compliance state the maximum characters their password can handle, with a minimum of 9 characters ideally need to have at least one .Lowercase, uppercase,a numeral and a special symbol like, ( ) - = @ $ ^ & ? etc, Perhaps generate a unique one randomly between 20 and 32 characters for every customer Then insist that a malware/virus scanner is being run (like Windows defender) They are not doing this
  3. petzl

    CloudFare Problems

    Can't find anything linking Cloudflare corporate to digitalocean? this is a digitalocean link? https://www.spamcop.net/sc?id=z6551228113zce6952908972d8430eb3d88f55842047z
  4. petzl

    CloudFare Problems

    Would like 1 only recent tracking URL, SpamCop works I don't get much from Cloud Flare? Seems something is up with them though? https://news.netcraft.com/archives/2015/10/12/certificate-authorities-issue-hundreds-of-deceptive-ssl-certificates-to-fraudsters.html
  5. found it but it's still spam using a email account a8-31.smtp-out.amazonses.com
  6. Doesn't pass the test as a mail server and history of IP shows two reported fake bounces and a fair bit of spam over 90 days
  7. fake bounce to you spammer has you as return address?
  8. Just botnet DDoS attacks, although using Chinese botnets I believe the insertion of Chinese writing in spam body may of been added as a red herring. Same for the fake drug spams which seemed to be coordinated with the Chinese botnet blitz, I found reporting https://12321.cn did shut the botnet down, they insist abuse reports be sent as attachment Can't guarantee that botnet attack won't start again? What I typically included in report botnet source - ddos 111.76.169.40 anti-spamxns.chinanet.cn.net see http://www.abuseat.org/lookup.cgi?ip=111.76.169.40 email server - reset password 219.235.112.153 ipasxcnnic.cn, Warning - Does not support TLS. offending email forwarded also, can be read as text attachment with a text/ASCII editor like notepad or eml text reader
  9. mine was through my SpamCop email account over 100 a day (reported everyone), mainly through Chinese Botnet, with Chinese writing, along with worldwide botnet fake drug etc, but stopped around a month ago now nothing I suspect the spam content was "red hearing" e.g. putting Chinese in spam body and using Chinese botnet? Typical report below botnet source - ddos 111.76.169.40 anti-spamxns.chinanet.cn.net see http://www.abuseat.org/lookup.cgi?ip=111.76.169.40 email server - reset password 219.235.112.153 ipasxcnnic.cn, Warning - Does not support TLS. offending email forwarded also, can be read as text attachment with a text/ASCII editor like notepad or eml text reader
  10. SpamCop now tries to cache "look-ups" but would need permission to be allowed to use RIPE At present SpamCop looks-up 9 spams a second
  11. Who is "One" Petzl? One in this case is SpamCop's owners If to many requests and SpamCop makes a lot and are like a DoS attack
  12. Used to be RIPE objected to SpamCop links of any sort. So one needs to check with RIPE to see if it is now acceptable?
  13. I are not getting any spam. I miss it? I enjoy burning wings off spammers
  14. This is normal to everyone. You are not alone. Your mailhost was not working even though you had it entered correctly. Makes everyone look foolish
  15. Don't know went to hanks group and clicked a link which went to another link etc until it showed a user track EOM
  16. SpamCop always does a fresh parse on every lookup. So yes it dissapears on new info has always done this even in the last millennium
  17. look OK to me to? https://www.spamcop.net/sc?id=z6550829312z28b288e7765aed3250e66e22677929e8z source 109.236.94.178 worldstream[x]nl
  18. I found it by clicking through the links SpamCop reparses every time you call it up once fixed problem won't reappear For instance if you update abuse address cache and it changes it will then show new abuse address
  19. look OK to me to? https://www.spamcop.net/sc?id=z6550829312z28b288e7765aed3250e66e22677929e8z source 109.236.94.178 worldstream[x]nl
  20. petzl

    Any point in reporting spam from AMAZONAWS?

    So what did the leak check tell you? Also right click with mouse your WiFi and select properties that is where IPv6 is turned on or off
  21. petzl

    Any point in reporting spam from AMAZONAWS?

    My computer all 3 are Win10 mine came up with IPV6 when enabled 2001:8003:c109:ee01:d058:e4d1:68c0:316c
  22. petzl

    Any point in reporting spam from AMAZONAWS?

    To disable or enable IPV6 just requires checking or un-checking a box just enabled it now and my Ipv6 stands out clear sisabled it again, I use PIA
  23. petzl

    Any point in reporting spam from AMAZONAWS?

    Would take a minute to enable
×