Received: from outbound1.distribution-ldc.com (outbound1.distribution-ldc.com [185.196.21.11]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client did not present a certificate) by X (Postfix) with ESMTPS id X for <X>; Wed, 23 Mar 2022 X Message-ID: <X@distribution-ldc.com> Date: Wed, 23 Mar 2022 X Subject: =?utf-8?Q?R=C3=A9f=C3=A9rencement?= Nouveaux Fournisseurs / Referencing New Suppliers From: LOUIS DREYFUS COMPANY DISTRIBUTION <achats@ld-distribution.com> Reply-To:… Читать далее Spam source @185.196.21.11
Cybercrime site/forum: infodig.ch / infodig.domains / infodig.sx
Stolen credit card data websites: https://ascarding.com/ >>> https://infodig.is/ infodig.ch. 600 IN A 185.251.89.200 infodig.domains. 600 IN A 185.251.89.200 infodig.sx. 600 IN A 185.251.89.200 ________________ Was: infodig.ch. 600 IN A 45.8.127.6 infodig.domains. 600 IN A 45.8.127.6 infodig.sx. 600 IN A 45.8.127.6 ________________ Was: infodig.ch. 600 IN A 45.141.101.93 infodig.domains. 600 IN A 45.141.101.93 infodig.sx. 600 IN… Читать далее Cybercrime site/forum: infodig.ch / infodig.domains / infodig.sx
spam emitter @163.172.182.27
Received: from battleaxtheater.com ([163.172.182.27]) From: Théo, Investment Manager <info@battleaxtheater.com> Subject: Laat me weten wat je van dit investeringsplan vindt, [] Date: Tue, 22 Mar 2022 16:5x:xx +0000
spam emitter @159.223.186.101
Received: from mail.zoreceon.com ([159.223.186.101]) From: «Bendt, Investeringsmanager» <contact@zoreceon.com> Subject: 👉 De gemakkelijkste manier om een inkomen van 7 cijfers [] Date: Wed, 23 Mar 2022 07:0x:xx +0000
spam emitter @137.184.130.184
Received: from mail.leereer.com ([137.184.130.184]) From: «Jennings, Investeringsmanager» <contact@leereer.com> Subject: 🚀 Bedankt voor uw interesse [] Date: Wed, 23 Mar 2022 08:3x:xx +0000
Spamvertised website
2022-03-23 honorways.com. 1 IN A 185.225.232.205 2022-03-21 honorways.com. 1 IN A 95.179.176.51 2022-03-04 honorways.com. 60 IN A 66.135.5.40 Received: from o4vo.hothothouse.info (o4vo.hothothouse.info. [45.145.4.145]) From: «Costco» <[]@[].o4vo.hothothouse.info> Subject: New Post: $100 Offer here Date: Wed, 02 Mar 2022 21:2x:xx +0100 https://s3-us-west-2.amazonaws.com/dqan3ch6q/[] 52.218.200.224 http://ringleros.info//cl/4410_md/[] 135.148.12.1 https://cemtasm.com/[] 23.229.68.8 https://honorways.com/r2/7[] 190.124.47.122 http://accesstart.com/aff_c?offer_id=437&aff_id=1193&source=nd&aff_sub=costco&aff_sub2=[]&aff_sub3=1SG&aff_sub4=473816 104.21.6.239 https://targetsoul.ru/[] 172.67.177.195 https://grnep.com/[]?c=%7C437&k=&v=&s=1193&t=&cr=&src=nd&lp=&id=[] 172.67.204.141 https://promo.topdashdeals.com/nc-t2-c2/checkout/?affid=&cid=[]&reqid=&tid=[] 167.172.19.255
spam emitter @54.240.8.61
Received: from a8-61.smtp-out.amazonses.com ([54.240.8.61]) From: «Walmart Support» <wiliamken857@gmail.com> Subject: Last day to use your points [] Date: Wed, 23 Mar 2022 05:3x:xx +0000 https://getthepoint.page.link/Tbeh
phishing server
securedwellsfargo.com has address 54.82.106.66 secure03b-chase.com has address 54.82.106.66
Malware botnet controller @95.213.216.140
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 95.213.216.140 port 443: $ telnet 95.213.216.140 443 Trying 95.213.216.140… Connected to 95.213.216.140. Escape character is ‘^]’… Читать далее Malware botnet controller @95.213.216.140
Malware / Botnet / Phishing hosting server @45.8.124.78
According to our telemetry and our own intelligence, the host at this IP address has been setup by cyber criminals for the exclusive purpose of hosting phishing sites, malware distribution sites and/or botnet controllers. We therefore advise our users to block any traffic from/to this IP address. The host at this IP address is running… Читать далее Malware / Botnet / Phishing hosting server @45.8.124.78