Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- From btv1==4219ee2bfe3==BannedIP@service-status.co bla bla bla {LMTP}
- X-Dspam-Signature: 59ae7d7416151399018649
- X-Barracuda-Connect: 185.35.56.162.venomit.com[185.35.56.162]
- X-Asg-Orig-Subj: Hack Attempts Detected From IP Address 185.48.237.0
- MIME-Version: 1.0
- X-Asg-Whitelist: Sender
- X-Barracuda-Envelope-From: BannedIP@service-status.co
- X-Barracuda-Apparent-Source-Ip: 185.35.56.162
- Message-ID: <20170905103317.50E431800134@rack56.myspamonline.com>
- X-Virus-Scanned: by bsmtpd at myspamonline.com
- content-type: text/plain; charset="utf-8"
- X-Barracuda-Start-Time: 1504607596
- X-RT-Incoming-Encryption: Not encrypted
- X-Dspam-Probability: 1.0000
- X-Spam-Info: Warning!!! Received message is not from a trusted or internal network
- Received: from [10.10.0.18] (helo=mx1.caravan.ru) by www.rt.inside.caravan.ru with esmtp (Exim 4.72) (envelope-from <btv1==4219ee2bfe3==BannedIP@service-status.co>) id 1dpBMa-0007vO-Np for rt-ABUSE+correspond@www.rt.inside.caravan.ru; Tue, 05 Sep 2017 13:45:49 +0300
- Received: from [185.48.236.28] (helo=devel.inside.caravan.ru) by mx1.caravan.ru with esmtps (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.84_2) (envelope-from <btv1==4219ee2bfe3==BannedIP@service-status.co>) id 1dpBMa-0005xE-Kq for abuse@caravan.ru; Tue, 05 Sep 2017 13:45:48 +0300
- Received: from fetchmail by devel.inside.caravan.ru with local (Exim 4.84_2) (envelope-from <btv1==4219ee2bfe3==BannedIP@service-status.co>) id 1dpBMa-0007fA-Hb for abuse@caravan.ru; Tue, 05 Sep 2017 13:45:48 +0300
- Received: from mail.caravan.ru by devel.int.it-virtualization.ru with IMAP (fetchmail-6.3.17 polling mail.caravan.ru account spambox folder FOR_DELIVERY) for <fetchmail@localhost> (single-drop); Tue, 05 Sep 2017 13:45:48 +0300 (MSK)
- Received: from 1dpBAZ-0005Ta-Hf by mx1.caravan.ru with spam-scanned (Exim 4.84_2) (envelope-from <btv1==4219ee2bfe3==BannedIP@service-status.co>) id 1dpBAZ-0005U4-MK for abuse@caravan.ru; Tue, 05 Sep 2017 13:33:24 +0300
- Received: from [185.35.56.101] (helo=rack56.myspamonline.com) by mx1.caravan.ru with esmtps (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.84_2) (envelope-from <btv1==4219ee2bfe3==BannedIP@service-status.co>) id 1dpBAZ-0005Ta-Hf for abuse@caravan.ru; Tue, 05 Sep 2017 13:33:23 +0300
- Received: from OwlProjectsTS (185.35.56.162.venomit.com [185.35.56.162]) by rack56.myspamonline.com with ESMTP id 4m4bD0yZDoX6gobG for <abuse@caravan.ru>; Tue, 05 Sep 2017 11:33:16 +0100 (BST)
- X-Barracuda-BRTS-Status: 1
- X-Asg-Debug-ID: 1504607596-07a21012ba81440002-AXc8z8
- Subject: Hack Attempts Detected From IP Address 185.48.237.0
- Return-Path: <btv1==4219ee2bfe3==BannedIP@service-status.co>
- X-Dspam-Result: Spam
- X-Dspam-Processed: Tue Sep 5 13:33:24 2017
- Date: 5 Sep 2017 11:33:26 +0100
- X-Dspam-Improbability: 1 in 115 chance of being ham
- X-Barracuda-Url: https://185.35.56.101:443/cgi-mod/mark.cgi
- To: abuse@caravan.ru
- X-Caravan-ID: 0
- Content-Transfer-Encoding: quoted-printable
- X-Dspam-Confidence: 0.5337
- From: BannedIP@service-status.co
- X-RT-Original-Encoding: ascii
- X-RT-Interface: Email
- Content-Length: 555
- We have detected repeated hack attempts from ip address 185.48.237.0 against our servers. Please find the evidence listed below:
- 5 attempts to hack into our ip address of 185.35.56.162.
- - Attempt 1 at 05 September 2017 at 10:19:19 UTC.
- - Attempt 2 at 05 September 2017 at 10:23:22 UTC.
- - Attempt 3 at 05 September 2017 at 10:27:22 UTC.
- - Attempt 4 at 05 September 2017 at 10:30:23 UTC.
- - Attempt 5 at 05 September 2017 at 10:33:25 UTC.
- We ask that you please investigate the matter promptly.
- Thank you.
- Venom I.T. Services
- https://venomit.com
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement