Has someone offered you a huge sum of money or a valuable consignment? It's a 419 or advance fee fraud - find out how they work, and what to do to be safe.
#253727 by Tim Atem Sun May 31, 2015 8:26 am
ipTRACKERonline.com wrote:Header Analysis Quick Report
Originating IP: 202.150.151.99
Originating ISP: Pt Comtronics Systems
City: Bandung
Country of Origin: Indonesia
* For a complete report on this email header goto ipTRACKERonline


Delivered-To: <snipped>
Received: by 10.27.176.218 with SMTP id g87csp933516wli;
Sat, 30 May 2015 08:28:50 -0700 (PDT)
X-Received: by 10.68.65.17 with SMTP id t17mr25030466pbs.9.1432999729934;
Sat, 30 May 2015 08:28:49 -0700 (PDT)
Return-Path: <[email protected]>
Received: from mail.unisba.ac.id (mail.unisba.ac.id. [202.150.151.99])
by mx.google.com with ESMTPS id x1si13347432pdm.181.2015.05.30.08.28.37
(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
Sat, 30 May 2015 08:28:49 -0700 (PDT)
Received-SPF: pass (google.com: best guess record for domain of [email protected] designates 202.150.151.99 as permitted sender) client-ip=202.150.151.99;
Authentication-Results: mx.google.com;
spf=pass (google.com: best guess record for domain of [email protected] designates 202.150.151.99 as permitted sender) [email protected]
Received: from localhost (localhost.localdomain [127.0.0.1])
by mail.unisba.ac.id (Postfix) with ESMTP id 60FCC74C8B;
Sat, 30 May 2015 22:28:27 +0700 (WIB)
Received: from mail.unisba.ac.id ([127.0.0.1])
by localhost (mail.unisba.ac.id [127.0.0.1]) (amavisd-new, port 10032)
with ESMTP id smNb3sxPWMdv; Sat, 30 May 2015 22:28:23 +0700 (WIB)
Received: from localhost (localhost.localdomain [127.0.0.1])
by mail.unisba.ac.id (Postfix) with ESMTP id 668326D422;
Sat, 30 May 2015 22:28:21 +0700 (WIB)
X-Virus-Scanned: amavisd-new at unisba.ac.id
Received: from mail.unisba.ac.id ([127.0.0.1])
by localhost (mail.unisba.ac.id [127.0.0.1]) (amavisd-new, port 10026)
with ESMTP id v7IXYQuMew0r; Sat, 30 May 2015 22:28:19 +0700 (WIB)
Received: from mail.unisba.ac.id (mail.unisba.ac.id [192.168.122.39])
by mail.unisba.ac.id (Postfix) with ESMTP id 4188073AAB;
Sat, 30 May 2015 22:28:17 +0700 (WIB)
Date: Sat, 30 May 2015 22:28:08 +0700 (WIB)
From: "Barr. DONALD PARKER" <[email protected]>
Reply-To: "Barr. DONALD PARKER" <[email protected]>
Message-ID: <[email protected]>
Subject: ATTN FROM UNCC
MIME-Version: 1.0


ATTN:
YOUR OVERDUE PAYMENT SUM OF US$12.5 MILLION HAS BEEN CONVERTED INTO AN
ATM CARD. CONTACT REV.JERRY DOUGLAS:VIA EMAIL (
[email protected] ) WITH YOUR ADDRESS FOR DELIVERY AND FURTHER
INSTRUCTIONS YOU CAN CALL HIM AT +229 98-796-860. THANK YOU FOR
COOPERATION.
Thanks
Deputy Division Chief Laurie Husak,
Financial and Administrative Systems
at International
Monetary Fund

====================================
PLEASE DO NOT TELL A SCAMMER HE IS REPORTED HERE!

Learn what a scam is and how to protect yourself
https://www.scamwarners.com/forum/viewtopic.php?f=3&t=5
Advertisement

#281989 by Tim Atem Wed Jan 20, 2016 11:14 am
Using the same email address [email protected] and the same phone number +229-98796860

ipTRACKERonline.com wrote:Header Analysis Quick Report
Originating IP: 99.90.100.250
Originating ISP: At&t Internet Services
City: Austin
Country of Origin: United States
* For a complete report on this email header goto ipTRACKERonline


Delivered-To: <snipped>
Received: by 10.27.171.85 with SMTP id u82csp2041357wle;
Mon, 18 Jan 2016 11:47:08 -0800 (PST)
X-Received: by 10.202.186.198 with SMTP id k189mr15531815oif.72.1453146428332;
Mon, 18 Jan 2016 11:47:08 -0800 (PST)
Return-Path: <[email protected]>
Received: from mail.intelite.info (mail.intelite.info. [201.157.18.142])
by mx.google.com with ESMTPS id m133si28226965oia.143.2016.01.18.11.47.05
(version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
Mon, 18 Jan 2016 11:47:08 -0800 (PST)
Received-SPF: pass (google.com: domain of [email protected] designates 201.157.18.142 as permitted sender) client-ip=201.157.18.142;
Authentication-Results: mx.google.com;
spf=pass (google.com: domain of [email protected] designates 201.157.18.142 as permitted sender) [email protected];
dkim=pass [email protected]
Received: from mail.intelite.info (localhost [127.0.0.1])
by mail.intelite.info (Postfix) with ESMTPS id ABF93FE0412;
Mon, 18 Jan 2016 13:48:03 -0600 (CST)
Received: from localhost (localhost [127.0.0.1])
by mail.intelite.info (Postfix) with ESMTP id 72D00FE03EB;
Mon, 18 Jan 2016 13:48:03 -0600 (CST)
DKIM-Filter: OpenDKIM Filter v2.9.2 mail.intelite.info 72D00FE03EB
DKIM-Signature: <snipped>
Received: from mail.intelite.info ([127.0.0.1])
by localhost (mail.intelite.info [127.0.0.1]) (amavisd-new, port 10026)
with ESMTP id q6DlaCRkkUD2; Mon, 18 Jan 2016 13:48:03 -0600 (CST)
Received: from mail.intelite.info (mail.intelite.info [99.90.100.36])
by mail.intelite.info (Postfix) with ESMTP id 2C52DFE03DC;
Mon, 18 Jan 2016 13:48:03 -0600 (CST)
Date: Mon, 18 Jan 2016 13:48:03 -0600 (CST)
From: "MR.SILVER TETTEH" <[email protected]>
Reply-To: "MR.SILVER TETTEH" <[email protected]>
Message-ID: <[email protected]>
Subject: ATTENTIN.WESTERN UNION OFFICE BENIN REPUBLIC
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
X-Originating-IP: [99.90.100.250]
X-Mailer: Zimbra 8.6.0_GA_1153 (ZimbraWebClient - GC47 (Win)/8.6.0_GA_1153)
Thread-Topic: ATTENTIN.WESTERN UNION OFFICE BENIN REPUBLIC
Thread-Index: MNhLZhA62Rb+C+qsnPcdVihO6NBQdw==


Attention:

This is to notify all our you about the latest development concerning all the payment that are left in our custody,which yours are inclusive Besides, your where given a bill of $159,in order to receive your payment of which we didn’t hear from you for sometime now....

Hence, our Western Union is now offering a Special BONUS to help all our customers that are having their payment in our custody due to of prices. In order words we are now requesting that those involve should pay only the sum of $55. 00 to receive all their payment abandoned in our custody.

Besides, my dear, this is the opportunity for you and have to comply and your funds shall be transfer to your designated address.

But remember that after (3 DAYS) you did not make the payment then we will divert your funds to Government Fund, to avoid problem or we will cancel the payment for this year until next year because this year is not like last year.

Again after (THREE DAYS ) We will enter A new project for the year and that is the reason why we decided to help to all our customers before we enter into the new project.

So be advise to send the $55.00 immediately so that we will register your payment and for to start receive $5000..00 as from tomorrow.
Be advise that there is no time again for we to call any person on phone unless you will call +229-9876860
After the payment of $55.00 you will start receiving your money every day $5000.00 through Western Union A Money Gram $5000 by money gram until the full payment of US$8.5 Million USD is completed. So what you will be receiving per day is $10.000

Send the money through Western Union Money Transfer with the information below,

RECEIVER:..........MR. LOUIS UGO .
COUNTRY...........Cotonou, Benin Republic.
Text Question== In God
Answer...............We Trust.
Amount...............$55.

The moment i receive the payment of $55 i will release the first payment information's of $5000 to you and you will pick up the money and i will send you another money. Hoping to hear from you.

MR.SILVER TETTEH
call me +229-98796860
FOREIGN OPERATION MANAGER
WESTERN UNION OFFICE BENIN REPUBLIC
THIS IS OUR CONDUCT CODE ( 303

====================================
PLEASE DO NOT TELL A SCAMMER HE IS REPORTED HERE!

Learn what a scam is and how to protect yourself
https://www.scamwarners.com/forum/viewtopic.php?f=3&t=5

Who is online

Users browsing this forum: Google [Bot] and 169 guests