-
Posts
2,994 -
Joined
-
Last visited
Content Type
Profiles
Forums
Events
Everything posted by petzl
-
found it but it's still spam using a email account a8-31.smtp-out.amazonses.com
-
Doesn't pass the test as a mail server and history of IP shows two reported fake bounces and a fair bit of spam over 90 days
-
fake bounce to you spammer has you as return address?
-
Just botnet DDoS attacks, although using Chinese botnets I believe the insertion of Chinese writing in spam body may of been added as a red herring. Same for the fake drug spams which seemed to be coordinated with the Chinese botnet blitz, I found reporting https://12321.cn did shut the botnet down, they insist abuse reports be sent as attachment Can't guarantee that botnet attack won't start again? What I typically included in report botnet source - ddos 111.76.169.40 anti-spamxns.chinanet.cn.net see http://www.abuseat.org/lookup.cgi?ip=111.76.169.40 email server - reset password 219.235.112.153 ipasxcnnic.cn, Warning - Does not support TLS. offending email forwarded also, can be read as text attachment with a text/ASCII editor like notepad or eml text reader
-
Routing details for 2402:bc00:0:a216:0:0:19:124 invalid ?
petzl replied to HeatherReid43's topic in SpamCop Reporting Help
mine was through my SpamCop email account over 100 a day (reported everyone), mainly through Chinese Botnet, with Chinese writing, along with worldwide botnet fake drug etc, but stopped around a month ago now nothing I suspect the spam content was "red hearing" e.g. putting Chinese in spam body and using Chinese botnet? Typical report below botnet source - ddos 111.76.169.40 anti-spamxns.chinanet.cn.net see http://www.abuseat.org/lookup.cgi?ip=111.76.169.40 email server - reset password 219.235.112.153 ipasxcnnic.cn, Warning - Does not support TLS. offending email forwarded also, can be read as text attachment with a text/ASCII editor like notepad or eml text reader -
Routing details for 2402:bc00:0:a216:0:0:19:124 invalid ?
petzl replied to HeatherReid43's topic in SpamCop Reporting Help
I are not getting any spam. I miss it? I enjoy burning wings off spammers -
So what did the leak check tell you? Also right click with mouse your WiFi and select properties that is where IPv6 is turned on or off
-
My computer all 3 are Win10 mine came up with IPV6 when enabled 2001:8003:c109:ee01:d058:e4d1:68c0:316c
-
To disable or enable IPV6 just requires checking or un-checking a box just enabled it now and my Ipv6 stands out clear sisabled it again, I use PIA
-
Would take a minute to enable
-
1. Everybody shows what those that look at connected IP's can see 2 WIN10 64 bit had it disabled for years so far no issues
-
Just check how much info it leaks https://ipleak.net also advise disabling IPv6
-
Mine only stopped just after dobbing DC2 into their sales online shopping department telling them there abuse department needed a shake-up. This was going on for years and being ignored it doesn't help they refuse spamcop reports they need security to pick them up and escort the abuse them from the building, I suspect it was a inside job as to many reports were just being ignored for years.
-
Then I would be extradited to the USA Actually just by finding the Chinese abuse desk that did something 'abuse[AT]12321[DOT]cn' for ALL Chinese spam but must be sent from email account as attachment in body name the IP source botnet source - ddos 111.76.169.40 anti-spam[x]ns.chinanet[x]cn[x]net see http://www.abuseat.org/lookup.cgi?ip=111.76.169.40