Your E-mail/Mobile Number has won £2,000,000 GBP in the Coca-Cola Promo,
To claim go to www.moboccolagify.com , click CLAIM enter Ref#: CC74117Q
Email analysis :
NOTE : ash0611jnag@gmail.com
NOTE : Received : from User (unknown [109.236.88.198])
NOTE : (Authenticated sender: admin@demo.pop-it.fr)
NOTE : by mail1.demo.pop-it.fr
Scam analysis :
CLICK : http://www.moboccolagify.com/
REDIRECTED : http://www.moboccolagify.com/cgi-sys/suspendedpage.cgi
RESULT : The scam was removed.
www.moboccolagify.com analysis :
Domain Name: moboccolagify.com
Registry Domain ID: 2099820320_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.namesilo.com
Registrar URL: https://www.namesilo.com/
Updated Date: 2017-05-11
Creation Date: 2017-02-22
Registrar Registration Expiration Date: 2018-02-22
Registrar: NameSilo, LLC
Registrar IANA ID: 1479
Registrar Abuse Contact Email: abuse@namesilo.com
Registrar Abuse Contact Phone: +1.4805240066
Reseller: QHOSTER.COM
Status: clientTransferProhibited
Registrant Name: Catherine Wosoh
Registrant Street: Bow Cottage, Robin Hood Ln, Wrightington
Registrant City: Appley Bridge
Registrant State/Province: Wigan
Registrant Postal Code: WN6 9QG
Registrant Country: GB
Registrant Phone: +44.02033897270
Registrant Email: xavierjapa147@gmail.com
Admin Name: Catherine Wosoh
Admin Street: Bow Cottage, Robin Hood Ln, Wrightington
Admin City: Appley Bridge
Admin State/Province: Wigan
Admin Postal Code: WN6 9QG
Admin Country: GB
Admin Phone: +44.02033897270
Admin Email: xavierjapa147@gmail.com
Registry Tech ID:
Tech Name: Catherine Wosoh
Tech Organization:
Tech Street: Bow Cottage, Robin Hood Ln, Wrightington
Tech City: Appley Bridge
Tech State/Province: Wigan
Tech Postal Code: WN6 9QG
Tech Country: GB
Tech Phone: +44.02033897270
Tech Email: xavierjapa147@gmail.com
Name Server: NS1.QHOSTER.NET
Name Server: NS2.QHOSTER.NET
Name Server: NS3.QHOSTER.NET
Name Server: NS4.QHOSTER.NET
xavierjapa147@gmail.com analysis :
xavierjapa147@gmail.com
Name Marianne Dillon
Address 4988 WORTH ST
City MILLINGTON
State MICHIGAN
Country US United States
Phone +1.9893251951
Fax +1.8017659400
List of domains registred by xavierjapa147@gmail.com :
newteamonli.com :
Registrant Name: MARIANNE DILLON
Registrant Organization:
Registrant Street: 4988 WORTH ST
Registrant City: MILLINGTON
Registrant State/Province: MICHIGAN
Registrant Postal Code: 48746
Registrant Country: US
Registrant Phone: +1.9893251951
Registrant Email: XAVIERJAPA147@GMAIL.COM
moboccolaltd.com :
Out
leekansoliccitor.com
Name: samuel buchman
Organization: buchman Inc
Mailing Address: 12927 288th St, Lindstrom 55045 US
Phone: +1.9706730990
Email:xavierjapa147@Gmail.com
Conclusion : Too much leakage to send a scam with no content...
Thursday, May 18, 2017
lovelykumah
Hello Dear am well pleased to contact you here, i am female, please i will like you to mail me back so that i will send you my pictures and to discuss the confidential issue i have to discuss with you. please reply me back for more details,miss lovely my email(lovelykumah11@hotmail.com)
Email analysis :
NOTE : lovelykumah11@hotmail.com
NOTE : Received : from sonic.gate.mail.ne1.yahoo.com
NOTE : by sonic325.consmr.mail.gq1.yahoo.com
NOTE : client-ip=98.137.67.179;
Please recheck your delivery address USPS parcel 632063287
Hello,
This is to confirm that your item has been shipped at Tue, 16 May 2017 10:49:00 -0700.
You can print the shipment label by clicking on the link.
information.doc
With sincere thanks.
Shanae Stovall - USPS Support Clerk.
Email analysis :
NOTE : fisou75@viajeseci.es
NOTE : Received : from viajeseci.es (unknown [222.222.219.154])
Phishing analysis :
CLICK : information.doc
OPEN : http://be-tiger.com/wp-content/sg.php
RESULT : Phishing was removed
This is to confirm that your item has been shipped at Tue, 16 May 2017 10:49:00 -0700.
You can print the shipment label by clicking on the link.
information.doc
With sincere thanks.
Shanae Stovall - USPS Support Clerk.
Email analysis :
NOTE : fisou75@viajeseci.es
NOTE : Received : from viajeseci.es (unknown [222.222.219.154])
Phishing analysis :
CLICK : information.doc
OPEN : http://be-tiger.com/wp-content/sg.php
RESULT : Phishing was removed
Report-ID: *@* 21/04/2017 (Phishing attempt)
Dear Driver,
This is the automatic statement of the Parking Service.
Road cameras have recorded the limit exceeding of your vehicle. Therefore, you will have to pay the applicable fine.
--------------------------------------------------------------------------- ---
So as to successfully complete the payment, you will have to finalize the invoice on the official website.
Your Fine Invoice ID is VL05U
Please submit it here: pa rking-services.us
--------------------------------------------------------------------------- ---
Then, you will have all essential details to execute the payment.
You have one day to document the fine. Else, significant charges may apply.
Please do not reply to this message.
------
Kindest Regards,
Parking Service
Email analysis :
NOTE : oybi6@wwpinc.com
NOTE : User-Agent : Mozilla/5.0 (Windows; U; Windows NT 5.1;
NOTE : en-GB; rv:1.8.0.14) Gecko/20071210 Thunderbird/1.5.0.14
NOTE : client-ip=202.55.69.138;
Phishing analysis :
CLICK : pa rking-services.us
OPEN : http://www.wik.be/backend/modules/settings/c056bc1304.html
RESULT : Phishing attempt
This is the automatic statement of the Parking Service.
Road cameras have recorded the limit exceeding of your vehicle. Therefore, you will have to pay the applicable fine.
--------------------------------------------------------------------------- ---
So as to successfully complete the payment, you will have to finalize the invoice on the official website.
Your Fine Invoice ID is VL05U
Please submit it here: pa rking-services.us
--------------------------------------------------------------------------- ---
Then, you will have all essential details to execute the payment.
You have one day to document the fine. Else, significant charges may apply.
Please do not reply to this message.
------
Kindest Regards,
Parking Service
Email analysis :
NOTE : oybi6@wwpinc.com
NOTE : User-Agent : Mozilla/5.0 (Windows; U; Windows NT 5.1;
NOTE : en-GB; rv:1.8.0.14) Gecko/20071210 Thunderbird/1.5.0.14
NOTE : client-ip=202.55.69.138;
Phishing analysis :
CLICK : pa rking-services.us
OPEN : http://www.wik.be/backend/modules/settings/c056bc1304.html
RESULT : Phishing attempt
Saturday, May 13, 2017
Notification de la dette (Phishing Banque de France)
Vous avez les dettes.
Vous pouvez télécharger plus d'informations sur ce LIEN
Si vous avez des questions vous pouvez appeler les numéros indiqués sur notre site
Merci d'avance,
Sacha Pierre
Spécialiste responsable de la clientèle
BANQUE DE FRANCE
Tél.: 0 811 901 801
31 rue Croix des Petits-Champs
75049 PARIS cedex 01
Email analysis :
NOTE : banque@banque-france.fr
NOTE : gvbev@fulda170.server4you.de
NOTE : client-ip=62.75.219.171;
NOTE : LINK : http://ascomnotizie.confcommerciocremona.it/edizioni/2013/Settembre/mp3/config/page5.html
NOTE : Download a virus "facture.zip" then redirect to the Banque de France.
NOTE : https://www.banque-france.fr/
The title of the phishing can also be "L\\\'avis de Banque de France sur facturation" with a different content :
Bonjour!
Vous avez reçu une nouvelle facture
La facture à payer peut être consultée sur ce LIEN
Si vous avez des questions vous pouvez nous appeler.
Veuillez d\\\'agréer les salutations distinguées,
Patrice Salmon
Spécialiste responsable de la clientèle
BANQUE DE FRANCE
Tél.: 0 811 901 801
31 rue Croix des Petits-Champs
75049 PARIS cedex 01
Email analysis :
NOTE : infos@banque-france.fr
NOTE : www-data@vs186078.vserver.de
NOTE : Received : from www-data by vs186078.vserver.de
NOTE : LINK : http://deko-studio.ru/templates/jblank/html/com_contact/categories/content2.html
NOTE : Phishing is unresponsive.
The title of the phishing can also be "Notification du paiement" with a different content :
Cher client!
Nous vous informons sur la dette existante
Vous pouvez télécharger plus d'informations sur ce LIEN
Si vous avez des questions vous pouvez nous appeler.
Meilleurs vœux,
Aubin Pascal
Spécialiste responsable de la clientèle
BANQUE DE FRANCE
Email analysis :
NOTE : apache@vps11617909.123-vps.co.uk
NOTE : Received : by vps11617909.123-vps.co.uk
NOTE : LINK : http://rolkatravel.ru/includes/Archive/content2.html
NOTE : Redirect to another phishing then Banque de France
The title of the phishing can also be "Rappel de dette" with a different content :
Vous avez reçu la facture de la société Banque de France
Vous pouvez télécharger plus d'informations sur ce LIEN
Si vous avez des questions vous pouvez nous appeler
Meilleurs vœux!
Samy Bouchet
Spécialiste principal responsable de la clientèle
BANQUE DE FRANCE
Email analysis :
NOTE : commercial@banque-france.fr
NOTE : webmaster@missdress.ru
NOTE : Received : from www-data by webs3.ru
NOTE : LINK : http://купить-дом-в-испании.рф/wp-admin/css/colors/blue/content2.html
NOTE : Phishing was removed.
The title of the phishing can also be "Vous avez les dettes" with a different content :
Vous avez les dettes.
Vous pouvez télécharger plus d'informations sur ce LIEN
Si vous avez des questions vous pouvez appeler les numéros indiqués sur notre site
Merci d'avance!
Salomon Legros
Chef
BANQUE DE FRANCE
Tél.: 0 811 901 801
31 rue Croix des Petits-Champs
75049 PARIS cedex 01
Email analysis :
NOTE : contact@banque-france.fr
NOTE : Received : by vps11617909.123-vps.co.uk
NOTE : LINK : http://smartfitness.com.ua/wp-content/themes/fitnesstheme/fontawesome/css/page6.html
NOTE : Redirect to the Banque de France.
Conclusion
Numerous phishing were removed, but I found one still active and I downloaded a virus called facture.zip
Open facture.zip
AegisLab : Troj.Script.Agent!c
Antiy-AVL : Trojan/Generic.ASVCS3S.3FA
Arcabit : JS:Trojan.Cryxos.725
Avast : Other:Malware-gen [Trj]
AVG : Script/Generic_c.NOE
Avira (no cloud) : HEUR/Suspar.Gen
BitDefender : JS:Trojan.Cryxos.725
Comodo : Heur.Dual.Extensions
Cyren : JS/Nemucod.EB1!Eldorado
DrWeb : Trojan.DownLoader24.57175
Emsisoft : JS:Trojan.Cryxos.725 (B)
ESET-NOD32 : JS/TrojanDownloader.Nemucod.CXN
F-Prot : JS/Nemucod.EB1!Eldorado
F-Secure : JS:Trojan.Cryxos.725
Fortinet : JS/Nemucod.CXN!tr
GData : JS:Trojan.Cryxos.725
Ikarus : Trojan-Downloader.JS.Nemucod
K7AntiVirus : Trojan ( 004dfe6d1 )
K7GW : Trojan ( 004dfe6d1 )
Kaspersky : HEUR:Trojan.Script.Agent.gen
Microsoft : TrojanDownloader:JS/Nemucod
eScan : JS:Trojan.Cryxos.725
Rising : Downloader.Nemucod!8.34 (cloud:EJcAeQsE3jG)
Sophos : Mal/DrodZp-A
Symantec : Trojan.Gen.NPE
Tencent : Js.Trojan-downloader.Nemucod.Gbr
TrendMicro-HouseCall : Suspicious_GEN.F47V0510
ZoneAlarm by Check Point : HEUR:Trojan.Script.Agent.gen
Source code of the virus :
https://pastebin.com/raw/VaBZWADT
Vous pouvez télécharger plus d'informations sur ce LIEN
Si vous avez des questions vous pouvez appeler les numéros indiqués sur notre site
Merci d'avance,
Sacha Pierre
Spécialiste responsable de la clientèle
BANQUE DE FRANCE
Tél.: 0 811 901 801
31 rue Croix des Petits-Champs
75049 PARIS cedex 01
Email analysis :
NOTE : banque@banque-france.fr
NOTE : gvbev@fulda170.server4you.de
NOTE : client-ip=62.75.219.171;
NOTE : LINK : http://ascomnotizie.confcommerciocremona.it/edizioni/2013/Settembre/mp3/config/page5.html
NOTE : Download a virus "facture.zip" then redirect to the Banque de France.
NOTE : https://www.banque-france.fr/
The title of the phishing can also be "L\\\'avis de Banque de France sur facturation" with a different content :
Bonjour!
Vous avez reçu une nouvelle facture
La facture à payer peut être consultée sur ce LIEN
Si vous avez des questions vous pouvez nous appeler.
Veuillez d\\\'agréer les salutations distinguées,
Patrice Salmon
Spécialiste responsable de la clientèle
BANQUE DE FRANCE
Tél.: 0 811 901 801
31 rue Croix des Petits-Champs
75049 PARIS cedex 01
Email analysis :
NOTE : infos@banque-france.fr
NOTE : www-data@vs186078.vserver.de
NOTE : Received : from www-data by vs186078.vserver.de
NOTE : LINK : http://deko-studio.ru/templates/jblank/html/com_contact/categories/content2.html
NOTE : Phishing is unresponsive.
The title of the phishing can also be "Notification du paiement" with a different content :
Cher client!
Nous vous informons sur la dette existante
Vous pouvez télécharger plus d'informations sur ce LIEN
Si vous avez des questions vous pouvez nous appeler.
Meilleurs vœux,
Aubin Pascal
Spécialiste responsable de la clientèle
BANQUE DE FRANCE
Email analysis :
NOTE : apache@vps11617909.123-vps.co.uk
NOTE : Received : by vps11617909.123-vps.co.uk
NOTE : LINK : http://rolkatravel.ru/includes/Archive/content2.html
NOTE : Redirect to another phishing then Banque de France
The title of the phishing can also be "Rappel de dette" with a different content :
Vous avez reçu la facture de la société Banque de France
Vous pouvez télécharger plus d'informations sur ce LIEN
Si vous avez des questions vous pouvez nous appeler
Meilleurs vœux!
Samy Bouchet
Spécialiste principal responsable de la clientèle
BANQUE DE FRANCE
Email analysis :
NOTE : commercial@banque-france.fr
NOTE : webmaster@missdress.ru
NOTE : Received : from www-data by webs3.ru
NOTE : LINK : http://купить-дом-в-испании.рф/wp-admin/css/colors/blue/content2.html
NOTE : Phishing was removed.
The title of the phishing can also be "Vous avez les dettes" with a different content :
Vous avez les dettes.
Vous pouvez télécharger plus d'informations sur ce LIEN
Si vous avez des questions vous pouvez appeler les numéros indiqués sur notre site
Merci d'avance!
Salomon Legros
Chef
BANQUE DE FRANCE
Tél.: 0 811 901 801
31 rue Croix des Petits-Champs
75049 PARIS cedex 01
Email analysis :
NOTE : contact@banque-france.fr
NOTE : Received : by vps11617909.123-vps.co.uk
NOTE : LINK : http://smartfitness.com.ua/wp-content/themes/fitnesstheme/fontawesome/css/page6.html
NOTE : Redirect to the Banque de France.
Conclusion
Numerous phishing were removed, but I found one still active and I downloaded a virus called facture.zip
Open facture.zip
AegisLab : Troj.Script.Agent!c
Antiy-AVL : Trojan/Generic.ASVCS3S.3FA
Arcabit : JS:Trojan.Cryxos.725
Avast : Other:Malware-gen [Trj]
AVG : Script/Generic_c.NOE
Avira (no cloud) : HEUR/Suspar.Gen
BitDefender : JS:Trojan.Cryxos.725
Comodo : Heur.Dual.Extensions
Cyren : JS/Nemucod.EB1!Eldorado
DrWeb : Trojan.DownLoader24.57175
Emsisoft : JS:Trojan.Cryxos.725 (B)
ESET-NOD32 : JS/TrojanDownloader.Nemucod.CXN
F-Prot : JS/Nemucod.EB1!Eldorado
F-Secure : JS:Trojan.Cryxos.725
Fortinet : JS/Nemucod.CXN!tr
GData : JS:Trojan.Cryxos.725
Ikarus : Trojan-Downloader.JS.Nemucod
K7AntiVirus : Trojan ( 004dfe6d1 )
K7GW : Trojan ( 004dfe6d1 )
Kaspersky : HEUR:Trojan.Script.Agent.gen
Microsoft : TrojanDownloader:JS/Nemucod
eScan : JS:Trojan.Cryxos.725
Rising : Downloader.Nemucod!8.34 (cloud:EJcAeQsE3jG)
Sophos : Mal/DrodZp-A
Symantec : Trojan.Gen.NPE
Tencent : Js.Trojan-downloader.Nemucod.Gbr
TrendMicro-HouseCall : Suspicious_GEN.F47V0510
ZoneAlarm by Check Point : HEUR:Trojan.Script.Agent.gen
Source code of the virus :
https://pastebin.com/raw/VaBZWADT
Need mnoey?Eaarn 50.000 per moonth.
###MAKE MONEY ON1|NE###
===EAARN 50.000 PER MONNTH===
1.You need 0nly email to regisster
2.Fluly automattic sytsem!NOTHING TO DO...
3.@bs0lutely passvie inc0me
http://www.wildstonesolution.com/wp-content/plugins/wordpress-seo/vendor/xrstf/composer-php52/lib/5bc10d79da.html
The title of the scam can also be : Need mooney?Eran 50.000 per moonth. with a different content
###MAAKE MONNEY ONLLNE###
===EAARN 50.000 PER MONTH===
1.You neeed only emmail to reg|$ter
2.Fuliy automatic ssytem!NOTHING TO DO...
3.Absolute1y passive lnc0me
http://www.ieee-papers.com/wp-content/themes/twentyseventeen/2159b211e2.html
Email analysis :
NOTE : mhurdsj@excite.it
NOTE : gfgrimaud@tjb-barre.com
NOTE : 202.150.50.14
NOTE : 113.186.177.167
Phishing analysis :
CLICK : http://www.wildstonesolution.com/wp-content/plugins/wordpress-seo/vendor/xrstf/composer-php52/lib/5bc10d79da.html
Result : Redirect to Google, the phishing was removed...
CLICK : http://www.ieee-papers.com/wp-content/themes/twentyseventeen/2159b211e2.html
RESULT : Redirect to Google, the phishing was removed
NOTE : Two wordpress websites were compromised to do this phishing.
===EAARN 50.000 PER MONNTH===
1.You need 0nly email to regisster
2.Fluly automattic sytsem!NOTHING TO DO...
3.@bs0lutely passvie inc0me
http://www.wildstonesolution.com/wp-content/plugins/wordpress-seo/vendor/xrstf/composer-php52/lib/5bc10d79da.html
The title of the scam can also be : Need mooney?Eran 50.000 per moonth. with a different content
###MAAKE MONNEY ONLLNE###
===EAARN 50.000 PER MONTH===
1.You neeed only emmail to reg|$ter
2.Fuliy automatic ssytem!NOTHING TO DO...
3.Absolute1y passive lnc0me
http://www.ieee-papers.com/wp-content/themes/twentyseventeen/2159b211e2.html
Email analysis :
NOTE : mhurdsj@excite.it
NOTE : gfgrimaud@tjb-barre.com
NOTE : 202.150.50.14
NOTE : 113.186.177.167
Phishing analysis :
CLICK : http://www.wildstonesolution.com/wp-content/plugins/wordpress-seo/vendor/xrstf/composer-php52/lib/5bc10d79da.html
Result : Redirect to Google, the phishing was removed...
CLICK : http://www.ieee-papers.com/wp-content/themes/twentyseventeen/2159b211e2.html
RESULT : Redirect to Google, the phishing was removed
NOTE : Two wordpress websites were compromised to do this phishing.
Friday, May 12, 2017
Update Your Account Information Now !! (PayPal Phishing Attempt)
PayPal
Warning : Account Issue !
Your account is limited untill you update your information because some one requested acces to your account, here is the infos :
Location : Russia
IP adress : 176.96.80.140
Navigator : Mozilla Firefox 48.0 on Windows
The restore the access to your account please click on the link below :
Update My Account
This is an email sent automatically. Please do not reply to this letter, because the e-mail address is only configured to send but not to receive e-mails.
Copyright © 2017 All rights reserved.
Phishing screenshot :
Email analysis :
NOTE : morag@g-p-t.co.uk
NOTE : Received : from RDT.spectra.local (unknown [80.229.37.167])
NOTE : by cust-smtp-auth2.fasthosts.net.uk (Postfix)
NOTE : client-ip=213.171.216.60;
Phishing analysis :
CLICK : Update my Account
OPEN : http://sadagatismayilova.com/update-your-account-information-now/myaccount/
SCREENSHOT :
NOTE : Phishing was removed.
Warning : Account Issue !
Your account is limited untill you update your information because some one requested acces to your account, here is the infos :
Location : Russia
IP adress : 176.96.80.140
Navigator : Mozilla Firefox 48.0 on Windows
The restore the access to your account please click on the link below :
Update My Account
This is an email sent automatically. Please do not reply to this letter, because the e-mail address is only configured to send but not to receive e-mails.
Copyright © 2017 All rights reserved.
Phishing screenshot :
Email analysis :
NOTE : morag@g-p-t.co.uk
NOTE : Received : from RDT.spectra.local (unknown [80.229.37.167])
NOTE : by cust-smtp-auth2.fasthosts.net.uk (Postfix)
NOTE : client-ip=213.171.216.60;
Phishing analysis :
CLICK : Update my Account
OPEN : http://sadagatismayilova.com/update-your-account-information-now/myaccount/
SCREENSHOT :
NOTE : Phishing was removed.
(no subject)
السلام عليكم انا مدام نادية محمد اريد منك ان تساعدنى لاننى لدى مشروع اريد ان اعرضه اليك لذا ارجو منك التواصل معى على هذا الايميل
nadia55mohammed@gmail.com
Translation :
Salam alaikum. I am Madame Nadia Mohamed. I want you to help me because I have a project I want to introduce to you so I hope you can contact me on this email
Nadia55mohammed@gmail.com
Email analysis :
NOTE : nadia55mohammed@gmail.com
NOTE : ib@caucasus.net
NOTE : Received : from webmail.caucasus.net
NOTE : (unknown [213.157.215.234])
NOTE : by mail.caucasus.net (Postfix)
nadia55mohammed@gmail.com
Translation :
Salam alaikum. I am Madame Nadia Mohamed. I want you to help me because I have a project I want to introduce to you so I hope you can contact me on this email
Nadia55mohammed@gmail.com
Email analysis :
NOTE : nadia55mohammed@gmail.com
NOTE : ib@caucasus.net
NOTE : Received : from webmail.caucasus.net
NOTE : (unknown [213.157.215.234])
NOTE : by mail.caucasus.net (Postfix)
Rich and Famous
JOIN THE GREAT ILLUMINATI BROTHER HOOD TODAY AND LIVE A BETTER AND HAPPY LIFE. WELCOME TO THE GREAT TEMPLE OF RICHES AND FAME. Are you a business, Man, politician, musical, student and you. want to be rich, powerful and be famous in life. You can achieve your dreams by being a member of the Great illuminati brother hood. With this all your dreams and heart desire can be fully accomplish, if you really want to be a member of the great illuminati brother hood, contact the Lord illuminati now, Note: newly recruited members are entitled with 100 thousand US Dollars , A Golden Ring, that will protect and guild you from enemies, and a free visa to United State Of America . Please will do not share blood. Do not miss this opportunity. Call Jack lord Now . ¡¡¡ +19066620480. Or email now on: illuminatitemple792@gmail.com
Email analysis :
NOTE : illuminatitemple792@gmail.com
NOTE : gcdash@nitrkl.ac.in
NOTE : X-Originating-Ip : [172.16.0.20]
NOTE : Received : from zmbox2.nitrkl.ac.in
NOTE : (zmbox2.nitrkl.ac.in [172.16.0.24])
NOTE : X-Mailer : Zimbra 8.6.0_GA_1194 (zclient/8.6.0_GA_1194)
NOTE : Received : from mailhost2.nitrkl.ac.in (saraswati.nitrkl.ac.in. [27.48.137.18]
Email analysis :
NOTE : illuminatitemple792@gmail.com
NOTE : gcdash@nitrkl.ac.in
NOTE : X-Originating-Ip : [172.16.0.20]
NOTE : Received : from zmbox2.nitrkl.ac.in
NOTE : (zmbox2.nitrkl.ac.in [172.16.0.24])
NOTE : X-Mailer : Zimbra 8.6.0_GA_1194 (zclient/8.6.0_GA_1194)
NOTE : Received : from mailhost2.nitrkl.ac.in (saraswati.nitrkl.ac.in. [27.48.137.18]
Subscribe to:
Posts (Atom)