Advance fee loan scams and fraudulent loan sites.
#63872 by avenging_angel Fri Aug 26, 2011 5:45 am
Loan Nigeria reply to [email protected]

Received: by 10.213.31.73 with SMTP id x9cs128561ebc;
Thu, 25 Aug 2011 22:32:22 -0700 (PDT)
Received: by 10.223.5.209 with SMTP id 17mr992600faw.109.1314336740078;
Thu, 25 Aug 2011 22:32:20 -0700 (PDT)
Return-Path: <[email protected]>
Received: from mail.bbxnet.sk (mail.bbxnet.sk [87.244.204.213])
by mx.google.com with ESMTP id y27si1804308faj.47.2011.08.25.22.31.50;
Thu, 25 Aug 2011 22:32:20 -0700 (PDT)
Received-SPF: fail (google.com: domain of [email protected] does not designate 87.244.204.213 as permitted sender) client-ip=87.244.204.213;
Authentication-Results: mx.google.com; spf=hardfail (google.com: domain of [email protected] does not designate 87.244.204.213 as permitted sender) [email protected]
Received: from localhost (localhost.localdomain [127.0.0.1])
by mail.bbxnet.sk (Postfix) with ESMTP id C81BA32FF6;
Fri, 26 Aug 2011 07:31:49 +0200 (CEST)
X-Virus-Scanned: amavisd-new at scarabeo.sk
Received: from mail.bbxnet.sk ([127.0.0.1])
by localhost (ikaros.scarabeo.sk [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id 5h6YUMKPnkgI; Fri, 26 Aug 2011 07:31:49 +0200 (CEST)
Received: from webmail.bbxnet.sk (localhost.localdomain [127.0.0.1])
by mail.bbxnet.sk (Postfix) with ESMTP id 456B132FD0;
Fri, 26 Aug 2011 07:31:49 +0200 (CEST)
Received: from 41.138.188.224
(SquirrelMail authenticated user [email protected])
by webmail.bbxnet.sk with HTTP;
Fri, 26 Aug 2011 07:31:49 +0200 (CEST)
Message-ID: <[email protected]>
Date: Fri, 26 Aug 2011 07:31:49 +0200 (CEST)
Subject:
From: "LOAN OFFER" <[email protected]>
Reply-To: [email protected]
User-Agent: SquirrelMail/1.4.8-5.el4.centos.8
MIME-Version: 1.0
Content-Type: text/plain;charset=utf-8
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
To: undisclosed-recipients:;

ipTRACKERonline.com wrote:Header Analysis Quick Report<br>Originating IP: 41.138.188.224<br>Originating ISP: Visafone Communications Limited<br> City: Lagos<br>Country of Origin: Nigeria<br>* For a complete report on this email header goto ipTRACKERonline



from LOAN OFFER [email protected]
reply-to [email protected]
to
date Fri, Aug 26, 2011 at 6:31 AM


COMPANY LOAN OFFER
We are cooperate investment company,we offer financing
to the needy,Are you Interested in getting a credit at 4 %?contact us
today for a legitimate credit.
Email:[email protected]
Advertisement

#64750 by Terminator5 Thu Sep 01, 2011 2:38 pm
Source:

The source IP address is 41.138.188.224.




Geo-Location Information

Country Nigeria

State/Region 05 City Lagos



Body of Scam Email:


COMPANY LOAN OFFER
We are cooperate investment company,we offer financing
to the needy,Are you Interested in getting a credit at 4 %?contact us
today for a legitimate credit.
Email:[email protected]


End Scam Email .




Loan Application In Progress :)

Daniel 8 :25
#65014 by Terminator5 Sat Sep 03, 2011 1:11 pm
Loan Application Results:


Date: Fri, 2 Sep 2011 21:46:36 -0700
From: tony mark [email protected]
+234 8134230689

Begin Scam Email:

this is my number so you can reach me
+2348134230689

Call me so we can commence with the transfer.

Regards,
Tony.


End Scam Email

Googling the phone number we find an online ad and another email address .


http://www.domesticsale.com/classifieds/a511264.html

[email protected]

************************

It also appears that they have been spoofing emails from a legitimate domain.

http://www.419scam.org/emails/2009-08/1 ... 158.10.htm?

[email protected]


********************************

One of Tony Marks unfortunate victims . :(


http://m.host.madison.com/mobile/articl ... 002e0.html

Daniel 8 :25

Who is online

Users browsing this forum: No registered users and 85 guests