This one is now showing: Connection to server 203.87.150.49 failed (The server is not responding.)
On 2 Feb 2007 at 14:14, Ryan Carter wrote: > I have not had time to dig around: > > http://203.87.150.49/.secure.regionsnet.com/EB/logon/VerifiedByVisa/rn > o/ > > > -----Original Message----- > > From: Steve Pirk [mailto:[EMAIL PROTECTED] > > Sent: Friday, February 02, 2007 10:39 AM > > To: [email protected] > > Subject: [phishing] You have 1 new ALERT message (fwd) > > > > Regions Bank phishing site at: > > > > > http://0xcb.0x57.0x96.0x31/.secure.regionsnet.com/EB/logon/VerifiedByV > i > sa/index.htm > or > > http://203.87.150.49/.secure.regionsnet.com/EB/logon/VerifiedByVisa/in > d > ex.htm > > wget shows it still active as of Feb 2nd 8:30 am PST > > > inetnum: 203.87.150.48 - 203.87.150.55 > netname: TCQC-PH > > country: PH > descr: Trinity College of Quezon City > > descr: 14 F Aurora Tower Quezon City > admin-c: RD32-AP > > tech-c: FS45-AP > tech-c: LR70-AP > tech-c: ML210-AP > > status: ASSIGNED NON-PORTABLE > changed: > [EMAIL PROTECTED] 20031020 > mnt-by: > MAINT-PH-MERIDIAN > source: APNIC > > -- > Steve > panic: can't > find / > > ---------- Forwarded message ---------- > Return-Path: > <[EMAIL PROTECTED]> > Received: from spiralock.com > (67.104.198.162.ptr.us.xo.net > [67.104.198.162]) > by mail.pirk.com > (8.13.7/8.12.0.Beta19) with ESMTP id > l12GS1tF010997 > for > <[EMAIL PROTECTED]>; Fri, 2 Feb 2007 08:28:02 -0800 > Received: from > User ([71.57.233.198]) by spiralock.com with Microsoft > > SMTPSVC(6.0.3790.211); > Fri, 2 Feb 2007 10:37:54 -0500 > Reply-To: > <[EMAIL PROTECTED]> > From: "Regions Bank"<[EMAIL PROTECTED]> > > Subject: You have 1 new ALERT message > Date: Fri, 2 Feb 2007 10:36:59 > -0500 > MIME-Version: 1.0 > Content-Type: text/plain; > > charset="Windows-1251" > Content-Transfer-Encoding: 7bit > > X-Priority: 3 > X-MSMail-Priority: Normal > X-Mailer: Microsoft > Outlook Express 5.50.4522.1200 > X-MimeOLE: Produced By Microsoft > MimeOLE V5.50.4522.1200 > Bcc: > Message-ID: > <[EMAIL PROTECTED]> > X-OriginalArrivalTime: > 02 Feb 2007 15:37:55.0034 (UTC) > FILETIME=[1B70BBA0:01C746E0] > > > Dear Regions Cardholder, > > Continuous Monitoring is an integral part > of Regions Bank multiple > layers of security. In addition to other > fraud monitoring tools, we can > often spot fraud based upon > transactions on the card that are outside > of cardholders typical > purchasing pattern. This allows us to spot > fraudulent activity as > quickly as possible and acts as an early-warning > system to identify > fraudulent activity. > > During a recent checkout we detected > suspicious activity and your > credit card may have been compromised. > Fraudulent activity made it > necessary to limit your card for online > services, your case ID number > for this matter: AT09GP32D506 : > Conform to our security requirements > and in order to continue online > services with your card, we must > validate your identity. > > Please > use our link below to proceed. > > > http://0xcb.0x57.0x96.0x31/.secure.regionsnet.com/EB/logon/VerifiedByV > i > sa/index.htm > > Regions Bank takes online security very seriously > so that you can shop > safely on the Internet. > As part of our > commitment to fighting fraud we have the right to > investigate, > prevent, or take action regarding illegal activities, > suspected > fraud, situations involving potential threats to the physical > safety > of any person, or violations of the terms and conditions. > > (c) > Copyright 2007, Regions Bank - Financial Corp. All Rights Reserved. > > _______________________________________________ > phishing mailing > list > [email protected] > > http://www.whitestar.linuxbox.org/mailman/listinfo/phishing > _______________________________________________ phishing mailing list > [email protected] > http://www.whitestar.linuxbox.org/mailman/listinfo/phishing > > > > -- > No virus found in this incoming message. > Checked by AVG Free Edition. > Version: 7.5.432 / Virus Database: 268.17.19/663 - Release Date: > 2/1/2007 2:28 PM >
_______________________________________________ phishing mailing list [email protected] http://www.whitestar.linuxbox.org/mailman/listinfo/phishing
