Wednesday, September 29, 2010

Ann Summers Mid Season Sale

Ann Summers
Lingerie Sex Toys Rampant Rabbits Dress Up Gifts Sale Offers New
MID-SEASON SALE
Don't miss these spectacular deals!
Bras from £2 Up to £25 off Corsets and Nightwear Books and DVD's from 99p
Up to 60% off Toys and Lubes Accessories Dress Up
Ann summers Parties




Ann Summers Mid Season Sale

Ann Summers
Lingerie Sex Toys Rampant Rabbits Dress Up Gifts Sale Offers New
MID-SEASON SALE
Don't miss these spectacular deals!
Bras from £2 Up to £25 off Corsets and Nightwear Books and DVD's from 99p
Up to 60% off Toys and Lubes Accessories Dress Up
Ann summers Parties




Inbox - You've received a payment - SCAM email from thief that steals our domain name to hide behind

----- Original Message -----
To:
Sent: Thursday, September 30, 2010 6:44 AM
Subject: You've received a payment

Hi there,

Ifyouaretiredofhearinghow
"easy"itistomakem0ney0nline,
butnothavinganybodytellyou
howtodoit,letmeshowyou
exactlyhow....

Thiswillnotbearoundforever
sotakesomeactionandfinallymake
ithappen...

AndIknowyouwillenjoywhat's
ontheinside.

Haveaniceday!

Seeyouatthetop,

Angelbizmarketing
==> http://ucanberich.co.cc/

P.O.Box186,Bradley,IL60915

To unsubscribe please hit reply.

Thankyou!

Information for the Police / Interpol
Return-Path: <masyaw@com1.goodlifeonline.co.cc>
Received: from gateway13.websitewelcome.com (gateway13.websitewelcome.com [69.41.255.6])
by mailer.ran.es (8.14.2/8.13.8) with SMTP id o8T6dd3g031843
for ; Wed, 29 Sep 2010 08:39:40 +0200
Received: (qmail 8907 invoked from network); 29 Sep 2010 06:39:38 -0000
Received: from waco.websitewelcome.com (67.18.67.2)
by gateway13.websitewelcome.com with SMTP; 29 Sep 2010 06:39:38 -0000
Received: from [112.207.151.58] (port=3912 helo=com1.goodlifeonline.co.cc)
by waco.websitewelcome.com with esmtpa (Exim 4.69)
(envelope-from <masyaw@com1.goodlifeonline.co.cc>)
id 1P0pUC-0006Ia-8d
for ?; Wed, 29 Sep 2010 00:45:48 -0500
Reply-To: admin@agaricus.goodlifeonline.co.cc
From: masyaw@com1.goodlifeonline.co.cc
To: ?
Subject: You've received a payment
Date: 30 Sep 2010 12:44:39 +0800
Message-ID: <20100930124425.DE987DBF81BDFF67@com1.goodlifeonline.co.cc>
MIME-Version: 1.0
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - waco.websitewelcome.com
X-AntiAbuse: Original Domain - itccommunications.net Scammer uses our domain name without our consent
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - com1.goodlifeonline.co.cc
X-UIDL: `:o"!SU6!!_JL"!1eM"!
Status: U
Old-X-EsetId: E74D982990713469F84B987D932A76
X-EsetId: E74D982990713469F84B987D932A76
X-EsetScannerBuild: 7897.
.
IP
69.41.255.6
Country
United States (USA)
Region
Texas
City
Houston
IP
112.207.151.58
Country
Philippines (PHL)

tracking a suspected scammer(s)

41.206.15.6 1 23:46:26, 28 Sep NIGERIA, LAGOS
Referrer url: google > EMAIL CONTACT OF GREK 34 2010
23:46:26, 28 Sep ...arch?q=cache:wykZLu8cJa8J:itccommunicationsnet-johnnichols%2 Página de salida
Entry page Back to top



41.203.64.241 1 00:16:50, 29 Sep NIGERIA, -
Referrer url: google > squirrelmail authenticated user 28th september 2010
00:16:50, 29 Sep ...chols.blogspot.com/2010/09/inbox-united-nations-sincere.html Página de salida
Entry page Back to top

41.203.64.246 1 00:05:40, 29 Sep NIGERIA, -
Referrer url: google > squirrelmail authenticated user 28th september 2010
00:05:40, 29 Sep ...chols.blogspot.com/2010/09/inbox-united-nations-sincere.html Página de salida
Entry page Back to top

Inbox - lo que su banco local no quiere que usted sepa. (As the sender has stolen our domain name we consider this a SCAM

Esto podría ser un phishing o robo de identidad o si hace clic en el enlace que podría introducir un virus troyano en su computadora para que el estafador puede robar su información. Hemos eliminado los enlaces a donde se había señalado para su seguridad. Como remitente, una vez más ha robado nuestro nombre de dominio se sospecha que es la misma persona que nos ha enviado la carta estafa en los últimos días. Nuestro dominio / blog atraer mucho interés de differnet IP en Syosset ESTADOS UNIDOS, y nos preguntamos si existe una relación entre los estafadores y timadores estos

----- Original Message -----
To: domain email address
Sent: Tuesday, September 28, 2010 9:03 PM
Subject: lo que su banco local no quiere que usted sepa.

?Esta usted conforme con el
retorno de sus inversiones?




?Comience con un bono del 20%
por inversion desde el primer dia!



Descubre como

http://forex21ad.com/es-usd/ the suspect link
golpeo aqui para dejar de publicidad

este hijo de puta ni siquiera es español - Un extranjero! Es probable que un negro! que necesitan para invertir en un teclado español, si se va a tratar de estafar a los españoles. ESTAFADORES DETENIDOS http://bit.ly/cC8ixX vamos a tener más de este :-)

Información para la Policia Guardia Civil o Interpol
Return-Path: <
scammer sends from our domain name>
Received: from aichain.com ([178.213.36.241])
by mailer.ran.es (8.14.2/8.13.8) with SMTP id o8SJ3Qqv008305
for ; Tue, 28 Sep 2010 21:03:27 +0200
Date: Tue, 28 Sep 2010 21:03:26 +0200
Message-Id: <201009281903.o8sj3qqv008305@mailer.ran.es>
To:
From:
Subject: =?utf-8?B?bG8gcXVlIHN1IGJhbmNvIGxvY2FsIG5vIHF1aWVyZSBxdWUgdXN0ZWQgc2VwYS4=?=
MIME-Version: 1.0
Importance: High
Content-Type: text/html
X-UIDL: F,m"!-$=!!?5:!!R+V!!
Status: U
Old-X-EsetId: E74D982990713469F84B987D932A76
X-EsetId: E74D982990713469F84B987D932A76
X-EsetScannerBuild: 7897

.
http://www.iphacks.com/index.php
IP
178.213.36.241
Country
UNITED STATES