Based on research, analysis of network data, our ‘snowshoe’ spam detection systems, intelligence sources and our experience, Spamhaus believes that this IP address range is being used or is about to be used for the purpose of high volume ‘snowshoe’ spam emission. As a precaution therefore we are listing this IP range in an SBL… Читать далее Suspected Snowshoe Spam IP Range
Рубрика: ovh.net
Suspected Snowshoe Spam IP Range
Based on research, analysis of network data, our ‘snowshoe’ spam detection systems, intelligence sources and our experience, Spamhaus believes that this IP address range is being used or is about to be used for the purpose of high volume ‘snowshoe’ spam emission. As a precaution therefore we are listing this IP range in an SBL… Читать далее Suspected Snowshoe Spam IP Range
Predatory publisher/spammer: Peertechz Open Access
Received: from smtp33.ptzinfomed.org (smtp.ptzinfomed.org [147.135.37.124]) $ host -t txt ptzinfomed.org ptzinfomed.org descriptive text «v=spf1 a mx a:ptzinfomed.org ip4:147.135.37.124 ip4:51.81.251.131 ip4:51.81.253.224/27 ip4:147.135.107.128/27 ip4:147.135.49.56/29 ip4:147.135.51.112/29 ip4:147.135.51.120/29 ip4:147.135.49.144/29 ip4:51.81.218.96/27 ip6:2604:2dc0:0200:017c::/64 include:m» «ailgun.org ~all» OVH, any of the above that are in your network belong to the same customer. It is a spammer you have chased around your network… Читать далее Predatory publisher/spammer: Peertechz Open Access
Suspected Snowshoe Spam IP Range
Based on research, analysis of network data, our ‘snowshoe’ spam detection systems, intelligence sources and our experience, Spamhaus believes that this IP address range is being used or is about to be used for the purpose of high volume ‘snowshoe’ spam emission. As a precaution therefore we are listing this IP range in an SBL… Читать далее Suspected Snowshoe Spam IP Range
Suspected Snowshoe Spam IP Range
Based on research, analysis of network data, our ‘snowshoe’ spam detection systems, intelligence sources and our experience, Spamhaus believes that this IP address range is being used or is about to be used for the purpose of high volume ‘snowshoe’ spam emission. As a precaution therefore we are listing this IP range in an SBL… Читать далее Suspected Snowshoe Spam IP Range
spam emitter @54.36.63.68
Received: from s3.tangkoko.cognix-systems.net (s3.tangkoko.cognix-systems.net [54.36.63.68]) by Subject: Merci de nous avoir contactés Date: Tue, 16 Nov 2021 15:2x:xx +0000 From: Le Damier de l’Opéra <contact@damieropera.com> X-Mailer: WPMailSMTP/Mailer/mail 3.2.0 Bonjour . Merci pour votre mail. Nous vous répondrons dans les plus brefs délais! Voici un résumé de votre message : ———————— Nom PhillipsarAV E-mail [] Message… Читать далее spam emitter @54.36.63.68
Suspected Snowshoe Spam IP Range
Based on research, analysis of network data, our ‘snowshoe’ spam detection systems, intelligence sources and our experience, Spamhaus believes that this IP address range is being used or is about to be used for the purpose of high volume ‘snowshoe’ spam emission. As a precaution therefore we are listing this IP range in an SBL… Читать далее Suspected Snowshoe Spam IP Range
Suspected Snowshoe Spam IP Range
Based on research, analysis of network data, our ‘snowshoe’ spam detection systems, intelligence sources and our experience, Spamhaus believes that this IP address range is being used or is about to be used for the purpose of high volume ‘snowshoe’ spam emission. As a precaution therefore we are listing this IP range in an SBL… Читать далее Suspected Snowshoe Spam IP Range
New Emotet malware dropper
hxxp://141.94.176.124/Loader_90563_1.dll See: https://cyber.wtf/2021/11/15/guess-whos-back/
spam source and site — sobilan.icu
54.39.39.140 eei.soauto.icu 54.39.39.141 eei.soax.icu 54.39.39.142 eei.sobilan.icu sobilan.icu. 3600 IN NS ns1.sobilan.icu. sobilan.icu. 3600 IN NS ns2.sobilan.icu. ns1.sobilan.icu. 3600 IN A 54.39.39.142 ns2.sobilan.icu. 3600 IN A 54.39.39.140 ======================================================================= Return-Path: <x@eei.sobilan.icu> Received: from eei.sobilan.icu (eei.sobilan.icu [54.39.39.142]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by x (Postfix) with ESMTPS id x for <x>; Sat,… Читать далее spam source and site — sobilan.icu