Results 1 to 10 of 16
-
11th Sep 2012, 08:09 PM #1OPMember
Payza members beware!
NOTE: DO NOT PROVIDE ANY INFORMATION TO THE LINK IN THIS THREAD (SPECIFICALLY FIRST POST) FOR YOUR OWN SAFETY!
I've just received strange e-mail from "Payza" with next content:
Dear Member
You need follow final step transition From Alertpay To Payza before you can use full access your Payza account!
Please click on the following link to validate your account:
Click here to validate your account.
If you not follow this final step your account will temporary frozen with unknown period.
?
Follow Us
Thanks for choosing Payza (formerly AlertPay),
The Payza Team
1. Dear "member", not with full name
2. Link "help-payza.com"
3. On the link provided, they are requested my e-mail, password and transaction PIN.
Then I've looked at source of e-mail and it came from here.
Received: from [199.191.56.228] (port=36528 helo=mail.comexprofit.com)
Message-ID: <20120911174408.7723.qmail@mail.comexprofit.com>
X-PHP-Script: comexprofit.com/come.php for 114.79.12.102
methad0ne Reviewed by methad0ne on . Payza members beware! NOTE: DO NOT PROVIDE ANY INFORMATION TO THE LINK IN THIS THREAD (SPECIFICALLY FIRST POST) FOR YOUR OWN SAFETY! I've just received strange e-mail from "Payza" with next content: It was strange to me for few reasons: 1. Dear "member", not with full name 2. Link "help-payza.com" 3. On the link provided, they are requested my e-mail, password and transaction PIN. Rating: 5
-
11th Sep 2012, 08:16 PM #2Respected Member
Their is probably about 10,000 of these going around at any given second.
-
11th Sep 2012, 08:19 PM #3OPMember
But I'm sure that owner of Help-payza.com is member on this forum, because my Payza e-mail knew only three persons from this forum (2 with successful transactions completed and third never responded after I send him info's).
-
11th Sep 2012, 08:21 PM #4Respected Member
It's possible. A large body of persons here are not honest.
-
13th Sep 2012, 08:24 AM #5OPMember
After I got this message on second e-mail, I've realized that member with username JeoRocker is responsible for these messages.
-
13th Sep 2012, 08:42 AM #6BannedWebsite's:
ultier.comThis would be a short guide to people to actually get proper information from an email before reacting to its subject. ALWAYS check the email header to get the email source .
-
13th Sep 2012, 09:40 AM #7Member
If you are going to scam, at least hire someone to translate your email into valid English. It looks like a bad joke
KnownSRV.com - Quality comes at a price, and we provide it at affordable prices.
PayPal, Skrill(MoneyBookers), Payza(AlertPay), 2CheckOut and LibertyReserve accepted!
-
13th Sep 2012, 04:09 PM #8BannedWebsite's:
budgetvds.com hilohost.com wdispatch.comLooks like he got reported or caught by eNom which is the domain register for the domain they've put the domain on hold meaning he can't use it anymore.
http://whois.domaintools.com/help-payza.com
Beware of
http://whois.domaintools.com/security-payza.com
which is another domain name that is also hosted on that same server which doesn't have private whois might help you findout whom send you that fake email.
-
13th Sep 2012, 07:58 PM #9OPMember
Probably just fake WHOIS data, so doesn't helps a lot (:
-
20th Sep 2012, 06:20 PM #10Member
This site is using a hacked database of W junction
Last edited by Gavo; 4th Jan 2015 at 01:55 PM.
Sponsored Links
Thread Information
Users Browsing this Thread
There are currently 1 users browsing this thread. (0 members and 1 guests)
Similar Threads
-
Please Beware
By amerriaz in forum General DiscussionReplies: 1Last Post: 15th Nov 2011, 03:59 PM -
Beware of VandalizedHosting
By robert420 in forum Hosting DiscussionReplies: 5Last Post: 2nd Jun 2011, 09:18 AM -
Beware of sujan69! Ban his ass!
By Smith in forum Webmaster DiscussionReplies: 18Last Post: 21st Apr 2011, 07:27 PM -
Beware
By SmartzKool in forum Webmaster DiscussionReplies: 5Last Post: 22nd Oct 2009, 10:25 AM -
Beware
By patt1293 in forum Webmaster DiscussionReplies: 19Last Post: 8th Jun 2009, 01:30 AM
themaCreator - create posts from...
Version 3.22 released. Open older version (or...