Scams re-targeting those who have already been victimized
#230739 by Faizan Docherty Sun Dec 14, 2014 10:48 am
ipTRACKERonline.com wrote:Header Analysis Quick Report
Originating IP: 99.157.95.97
Originating ISP: At&t Internet Services
City: Glen Carbon
Country of Origin: United States
* For a complete report on this email header goto ipTRACKERonline


Return-Path: <[email protected]>
Delivered-To: <snipped>
Received: (qmail 25479 invoked from network); 13 Dec 2014 12:33:00 +0700
Received: from unknown (EHLO mail3.nextsolutions.us) (207.158.44.33)
by server1.tirtamahakam.com (Spanel SMTPD 1.3.16-pre.20131219.squeeze) with SMTP id cf4c487b3bbaaf99130876580a3ecf85; 13 Dec 2014 12:33:00 +0700
Received: from adsl-99-157-95-97.dsl.covlil.sbcglobal.net [99.157.95.97] by mail3.nextsolutions.us with SMTP;
Fri, 12 Dec 2014 21:29:06 -0800
Reply-To: <[email protected]>
From: "Barr. Daniel Duke"<[email protected]>
Subject: IMF WARNING!!!
Date: Fri, 12 Dec 2014 23:29:31 -0600
MIME-Version: 1.0
Content-Type: text/plain;
charset="Windows-1251"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000


INTERNATIONAL MONETARY FUND (IMF)
FINANCIAL MONETARY DEPARTMENT.
7OO 19TH ST N.W, WASHINGTON D.C 2O431 USA.



ATTN:


This is to enlighten you of a very important information which will be of a great help to redeem you from all the difficulties you have been experiencing in getting your long over due payment due to excessive demand of money from you by both corrupt Bank officials and Courier Companies, Diplomatic agents and fraudulent barristers after which your fund/payment remain unpaid to you.


I am Barr. Daniel Duke, a highly placed official of the International Monetary Fund (IMF) United States Region were I have been assigned to take responsibility of your funds remittance to you with out further delay. It may interest you to know that reports have reached our office by so many correspondence on the uneasy way which people like you are treated by Various Banks and Courier Companies across Europe to Africa and Asia and we have decided to put a stop to these nightmares, which is the reason I was appointed to handle your transaction here in California, United States.


All Governmental and Non-Governmental parasites, NGOs, Finance Companies, Banks, Security Companies and Courier companies which have been in contact with you of late have been instructed to quit and back up from your transaction and YOU have been advised NOT to respond to them anymore since the IMF is now directly in charge of your payment. You are hereby advised NOT to remit further payment to any institutions with respect to your transaction/funds remittance as your fund will be transferred to you directly from our source. I hope this is clear. Any action contrary to this instruction is at your own risk.


Respond to this e-mail on ([email protected]) with immediate effect and we shall give you further details on how your funds will be released to you.

NB: Please kindly report any suspected scam/fraud email or ongoing transaction to this office immediately for investigation and verification and wait for feedback. God bless you.


Regards,
Barr. Daniel Duke. (Director Of Operations)
International Monetary Fund
Head Department Washington D.C.
© 2014.

Please DO NOT tell a scammer that he has been posted here!

If you wish you can email me at
faizandocherty @ scamwarners [dot] com

How do I find email headers???

How to analyze an email header.
Advertisement

#237558 by Faizan Docherty Thu Feb 12, 2015 6:51 pm
ipTRACKERonline.com wrote:Header Analysis Quick Report
Originating IP: 154.118.15.218
Originating ISP: Spectranet
City: n/a
Country of Origin: Nigeria
* For a complete report on this email header goto ipTRACKERonline


Delivered-To: <snipped>
Received: by 10.25.211.72 with SMTP id k69csp446573lfg;
Thu, 12 Feb 2015 07:09:21 -0800 (PST)
X-Received: by 10.220.185.193 with SMTP id cp1mr2752701vcb.80.1423753760060;
Thu, 12 Feb 2015 07:09:20 -0800 (PST)
Return-Path: <[email protected]>
Received: from iserver.radar.com.py (mail.radar.com.py. [190.128.226.139])
by mx.google.com with ESMTPS id cf7si2515595vdc.17.2015.02.12.07.09.19
(version=TLSv1.1 cipher=ECDHE-RSA-RC4-SHA bits=128/128);
Thu, 12 Feb 2015 07:09:20 -0800 (PST)
Received-SPF: softfail (google.com: domain of transitioning [email protected] does not designate 190.128.226.139 as permitted sender) client-ip=190.128.226.139;
Authentication-Results: mx.google.com;
spf=softfail (google.com: domain of transitioning [email protected] does not designate 190.128.226.139 as permitted sender) [email protected]
Message-Id: <[email protected]>
Received: from localhost (localhost [127.0.0.1])
by iserver.radar.com.py (Postfix) with ESMTP id 51C5A23B2;
Thu, 12 Feb 2015 12:07:15 -0300 (PYST)
X-Quarantine-ID: <tLAvz6d2ryKM>
X-Virus-Scanned: Debian amavisd-new at
X-Spam-Flag: YES
X-Spam-Score: 36.316
X-Spam-Level: ************************************
X-Spam-Status: Yes, score=36.316 tagged_above=0.2 required=4
tests=[ADVANCE_FEE_4_NEW_FRM_MNY=1.469, ALL_TRUSTED=-1, AWL=-0.107,
AXB_XMAILER_MIMEOLE_OL_024C2=0.396, BAYES_99=3.5, BAYES_999=0.2,
DKIM_ADSP_CUSTOM_MED=0.001, FILL_THIS_FORM=0.001,
FILL_THIS_FORM_FRAUD_PHISH=0.334, FILL_THIS_FORM_LONG=2,
FORGED_MUA_OUTLOOK=1.927, FORM_FRAUD_5=0.215, FREEMAIL_FROM=0.001,
FROM_MISSPACED=0.001, FROM_MISSP_EH_MATCH=0.96,
FROM_MISSP_FREEMAIL=2.425, FROM_MISSP_MSFT=0.001,
FROM_MISSP_USER=0.001, FROM_MISSP_XPRIO=0.001,
FSL_CTYPE_WIN1251=1.889, FSL_NEW_HELO_USER=0.001, HK_SCAM_N8=2.419,
LOTS_OF_MONEY=0.001, LOTTERY_PH_004470=3.299, MALFORMED_FREEMAIL=2.46,
MISSING_HEADERS=1.021, MISSING_MID=0.497, MONEY_FORM=0.797,
MONEY_FRAUD_5=2.136, MONEY_FROM_MISSP=0.001, NML_ADSP_CUSTOM_MED=0.9,
NSL_RCVD_FROM_USER=1.247, REPLYTO_WITHOUT_TO_CC=1.552,
SUBJ_ALL_CAPS=1.506, TO_NO_BRKTS_FROM_MSSP=2.499,
T_FROM_MISSP_DKIM=0.01, URIBL_BLOCKED=0.001, US_DOLLARS_3=1.754]
autolearn=spam
Received: from iserver.radar.com.py ([127.0.0.1])
by localhost (iserver.radar.com.py [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id tLAvz6d2ryKM; Thu, 12 Feb 2015 12:07:14 -0300 (PYST)
Received: from User (unknown [154.118.15.218])
by iserver.radar.com.py (Postfix) with ESMTPA id CA33523B4;
Thu, 12 Feb 2015 12:05:14 -0300 (PYST)
Reply-To: <[email protected]>
From: "IMF, ADMIN. DEPT."<[email protected]>
Subject: MAKE URGENT CONTACT FOR YOUR COMPENSATION GRANT RELEASE...CONGRATULATIONS!
Date: Thu, 12 Feb 2015 16:09:12 +0100
MIME-Version: 1.0
Content-Type: text/plain;
charset="Windows-1251"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
X-Antivirus: avast! (VPS 150212-0, 02/12/2015), Outbound message
X-Antivirus-Status: Clean


INTERNATIONAL MONETARY FUND
HEADQUARTERS 2 (HQ2)
1900 PENNSYLVANIA AVE. NW,
WASHINGTON, DC20431, USA.
TEL: 1-940-603-2743
FAX: 1-973-201-2065

THIS IS FOR YOUR URGENT ATTENTION.

THE RELEASE OF YOUR FINANCIAL GRANT OF USD2,500,000.00

Based on the present anti-fraud/scam war, the International Monetary Fund (IMF) Anti-fraud teams in collaboration with the World Bank are making sure that financial fraud is wiped out completely. The Internet Service Providers have noticed an increased email traffic hence the action of the security operatives to restrict cyber-crime.

In this regard, One hundred and six (106) bank and government officials have been arrested in so many countries so far and arrest is still going on. We have recovered the total sum of US$2.5 Billion from them in both cash and assets confirmed to have come from their victims and foreign beneficiaries' of both contract funds, inheritance funds and lottery winnings. Thousands of email addresses of victims (which include yours) have also been recovered from their address books. It is at this juncture that we are contacting you because you are now listed as one of the beneficiaries of the IMF/World Bank financial grant of 2015 batch "A".

The International Monetary Fund (IMF) with the World Bank are making refunds of US$2,500,000.00 each to all foreigners whom his/her email address is listed on the recovered address book of these arrested fraudulent officials. This refund is of two types:- (a) Those who are beneficiaries of contract, inheritance or lottery funds. (b) Those who are simply found to be scam victims, by receiving fraudulent and scam email letters from these officials, will receive a flat rate financial grant of US$2,500,000.00 each.

Your financial grant will be release to you through our fiscal affairs department in the United Kingdom on your contact to them as instruction for the release of your financial grant has already been passed to them and the issuing bank, therefore you should direct your response to our fiscal affairs department in UK immediately through the below information to claim your financial grant:-

Contact Person: Mr. Vitor Gaspar.
Email: [email protected]
Telephone: +44 702 408 9882

Endeavour to send the following details required for verification and subsequent release of your financial grant.
===================================================
1. Full Names:.
2. Address:..
3. Telephone/Mobile:.
4. Age and Gender:.
5. Nationality:
6. Occupation:
7. Bank Name and Address:.
===================================================
NOTE: You are hereby advised to disassociate yourself from any form of communication with these banks and government officials mostly from African countries and follow our guidelines.

Yours Sincerely,

Signed:
Mr. Carla Grasso,
Chief Administrative Officer,
International Monetary Fund
Washington DC 20431, USA.

Please DO NOT tell a scammer that he has been posted here!

If you wish you can email me at
faizandocherty @ scamwarners [dot] com

How do I find email headers???

How to analyze an email header.
#237610 by Faizan Docherty Fri Feb 13, 2015 1:44 am
ipTRACKERonline.com wrote:Header Analysis Quick Report
Originating IP: 104.232.34.69
Originating ISP: Colocrossing
City: Buffalo
Country of Origin: United States
* For a complete report on this email header goto ipTRACKERonline


Delivered-To: <snipped>
Received: by 10.25.211.72 with SMTP id k69csp274603lfg;
Thu, 12 Feb 2015 01:51:47 -0800 (PST)
X-Received: by 10.68.107.197 with SMTP id he5mr4897480pbb.93.1423734706963;
Thu, 12 Feb 2015 01:51:46 -0800 (PST)
Return-Path: <[email protected]>
Received: from indyworks.co.jp ([122.215.192.117])
by mx.google.com with SMTP id yp2si1930591pab.74.2015.02.12.01.51.44
for <snipped>;
Thu, 12 Feb 2015 01:51:46 -0800 (PST)
Received-SPF: fail (google.com: domain of [email protected] does not designate 122.215.192.117 as permitted sender) client-ip=122.215.192.117;
Authentication-Results: mx.google.com;
spf=fail (google.com: domain of [email protected] does not designate 122.215.192.117 as permitted sender) [email protected]
Received: (qmail 19167 invoked from network); 12 Feb 2015 18:42:23 +0900
Received: from unknown (HELO User) ([email protected]@104.232.34.69)
by indyworks.co.jp with SMTP; 12 Feb 2015 18:42:23 +0900
Reply-To: <[email protected]>
From: "INTERNATIONAL MONETARY FUND"<[email protected]>
Subject: Your Unpaid Funds
Date: Thu, 12 Feb 2015 04:41:33 -0500
MIME-Version: 1.0
Content-Type: text/plain;
charset="Windows-1251"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1081
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1081
Message-ID: <[email protected]>


Attn: Fund Owner,Your email was found ( in the Central Computer among the list of unpaid contractors, inheritance next of kin and lotto beneficiaries that was originated from Africa,
Europe, Asia Plus Middle east, Americans ) among the list of individuals and companies that your unpaid fund has been located to the Capital Sure Bank. Your email appeared among the beneficiaries, who will receive a part-payment of your contractual sum of $11,000,000.00 (Eleven Million Dollars) and it have been approved already for months. You are requested to get back
to us via this

Email:[email protected]

For more direction and instruction on how to receive your fund. However, we received an email from one Mr. Derick G Moore who told us that he is your next of kin and that you died in a car accident last week. He has also submitted his account for us to transfer the fund to him including his International passport; we want to hear from you before we can make the transfer to confirm if you are dead or not? Please if you are still alive, kindly furnish us with below information:

1. Your Full Name.......
2. Address...............
3. Country.................
4. Age....................
5. Occupation................
6. Telephone Number...........
7. Next Of Kin....N/A..............
8. Home Equity (Yes/No).........
Once again, I apologize to you on behalf Of IMF (International Monetary Fund) for failure to pay your funds in time, which according to records in the system had been long overdue. I wait to hear from you soonest.

Best Regards,
Dr Fritz Daniel
OPM
Office of the IMF London,
United Kingdom.

Please DO NOT tell a scammer that he has been posted here!

If you wish you can email me at
faizandocherty @ scamwarners [dot] com

How do I find email headers???

How to analyze an email header.
#238337 by Faizan Docherty Wed Feb 18, 2015 11:17 pm
ipTRACKERonline.com wrote:Header Analysis Quick Report
Originating IP: 154.118.4.99
Originating ISP: Spectranet
City: n/a
Country of Origin: Nigeria
* For a complete report on this email header goto ipTRACKERonline


Delivered-To: <snipped>
Received: by 10.25.43.144 with SMTP id r138csp2258306lfr;
Tue, 17 Feb 2015 14:36:31 -0800 (PST)
X-Received: by 10.68.233.232 with SMTP id tz8mr52191890pbc.166.1424212589939;
Tue, 17 Feb 2015 14:36:29 -0800 (PST)
Return-Path: <[email protected]>
Received: from hkwp.hosting38.com (r52.hkwp.com. [58.64.139.52])
by mx.google.com with ESMTP id cb7si4044449pdb.213.2015.02.17.14.36.26;
Tue, 17 Feb 2015 14:36:29 -0800 (PST)
Received-SPF: fail (google.com: domain of [email protected] does not designate 58.64.139.52 as permitted sender) client-ip=58.64.139.52;
Authentication-Results: mx.google.com;
spf=fail (google.com: domain of [email protected] does not designate 58.64.139.52 as permitted sender) [email protected]
Received: from User (unknown [154.118.4.99])
by hkwp.hosting38.com (Postfix) with ESMTP id 378084060;
Wed, 18 Feb 2015 06:26:47 +0800 (HKT)
Reply-To: <[email protected]>
From: "Office Of The IMF"<[email protected]>
Subject: UNPAID FUND RECOVERED LETTER
Date: Tue, 17 Feb 2015 23:36:20 +0100
MIME-Version: 1.0
Content-Type: text/html;
charset="Windows-1251"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Message-Id: <[email protected]>
To: undisclosed-recipients:;


Office of the IMF Managing Director
700 19th St NW Washington, D.C.
DC 20431, USA
Attn Dear,

2015 UNPAID FUND RECOVERED LETTER

In our efforts to foster global monetary cooperation, secure financial stability and facilitate individual and company economic growth. The IMF through our international monitoring network has recovered your UNPAID FUND that has been on hold. We hereby advise you to reconfirm your information below to enable our payment bank, Citibank contact you for cash payment immediately.

Re-confirm as follows

(1) Your Full Name........?
(2) Full Residential Address: (P.O.BOX NOT ALLOWED)?
(3) Country/State..........?
(4) Beneficiary Amount?
(5) Direct and Current Phone?
(6) Passport identification?

Note: The above information is necessary to certify that you are the rightful beneficiary of the said funds As soon as we confirm these information, our payment Bank (CITIBANK/USA) will contact you for immediate payment.

Thanks

Your sincere
Ms. Christine Lagarde,
IMF Managing director
[email protected]

Please DO NOT tell a scammer that he has been posted here!

If you wish you can email me at
faizandocherty @ scamwarners [dot] com

How do I find email headers???

How to analyze an email header.
#238534 by Faizan Docherty Fri Feb 20, 2015 11:35 am
ipTRACKERonline.com wrote:Header Analysis Quick Report
Originating IP: 41.138.176.6
Originating ISP: Visafone Communications Limited
City: Lagos
Country of Origin: Nigeria
* For a complete report on this email header goto ipTRACKERonline


Delivered-To: <snipped>
Received: by 10.25.43.144 with SMTP id r138csp505318lfr;
Thu, 19 Feb 2015 05:38:12 -0800 (PST)
X-Received: by 10.202.46.138 with SMTP id u132mr2752912oiu.19.1424353091705;
Thu, 19 Feb 2015 05:38:11 -0800 (PST)
Return-Path: <[email protected]>
Received: from host.themainserver.com (host.themainserver.com. [192.190.80.34])
by mx.google.com with ESMTPS id e188si1881110oia.129.2015.02.19.05.38.08
(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
Thu, 19 Feb 2015 05:38:11 -0800 (PST)
Received-SPF: softfail (google.com: domain of transitioning [email protected] does not designate 192.190.80.34 as permitted sender) client-ip=192.190.80.34;
Authentication-Results: mx.google.com;
spf=softfail (google.com: domain of transitioning [email protected] does not designate 192.190.80.34 as permitted sender) [email protected]
Received: from localhost ([::1]:44813 helo=supernovacolor.com)
by host.themainserver.com with esmtpa (Exim 4.82)
(envelope-from <[email protected]>)
id 1YORIo-0003xC-Hu; Thu, 19 Feb 2015 06:38:02 -0700
Received: from 41.138.176.6 ([41.138.176.6])
(SquirrelMail authenticated user [email protected])
by supernovacolor.com with HTTP;
Thu, 19 Feb 2015 06:38:02 -0700
Message-ID: <[email protected]>
Date: Thu, 19 Feb 2015 06:38:02 -0700
Subject: Delivery of Your Diplomatic Luggage 112
From: "International Monetary Funds" <[email protected]>
Reply-To: [email protected]
User-Agent: SquirrelMail/1.5.2 [SVN]
MIME-Version: 1.0
Content-Type: text/plain;charset=iso-8859-1
Content-Transfer-Encoding: 8bit
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - host.themainserver.com
X-AntiAbuse: Original Domain - gmail.com
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - hotmail.com
X-Get-Message-Sender-Via: host.themainserver.com: authenticated_id: [email protected]
X-Source:
X-Source-Args:
X-Source-Dir:


Attention To You:

On behalf of the board and management of International Monetary Financial
Committee. I Christine Lagarde, the Operations Manager wishes to inform
you that your consignment/fund tagged diplomatic luggage 122 with Ref:
No1226/X42/206 which was deposited in our vault for safe keeping is due
for Immediate collection. Be informed that we have concluded all
arrangements to deliver your consignment at your doorstep through
diplomatic means. In line with the binding diplomatic consignment delivery
policies, kindly furnish us with the following as set forth.

. A copy of your international passport or any other means of
identification as the true consignee.

. The address where the above cargo/funds should be delivered to and your
phone number.

. List the nearest international airport to your address location.

Meanwhile, we urge you to treat the above requirement with utmost urgency
to enable us dispense our duties and obligation accordingly thereby
allowing us to serve you in a timely fashion. Upon satisfactory receipt of
all the above mentioned, you will be further acquainted with the detailed
delivery itinerary including information of the diplomat who will
accompany your consignment.

We pledge our best service at all times.

Yours Faithfully,
Christine Lagarde
Foreign Operations Manager

Please DO NOT tell a scammer that he has been posted here!

If you wish you can email me at
faizandocherty @ scamwarners [dot] com

How do I find email headers???

How to analyze an email header.
#240656 by Faizan Docherty Sun Mar 08, 2015 5:39 pm
ipTRACKERonline.com wrote:Header Analysis Quick Report
Originating IP: 208.125.16.142
Originating ISP: Time Warner Cable
City: New York
Country of Origin: United States
* For a complete report on this email header goto ipTRACKERonline


Delivered-To: <snipped>
Received: by 10.25.43.144 with SMTP id r138csp587909lfr;
Sat, 7 Mar 2015 13:13:15 -0800 (PST)
X-Received: by 10.68.57.232 with SMTP id l8mr37452719pbq.42.1425762794374;
Sat, 07 Mar 2015 13:13:14 -0800 (PST)
Return-Path: <[email protected]>
Received: from s21.coreserver.jp (s21.coreserver.jp. [202.172.28.22])
by mx.google.com with ESMTPS id qp10si3307099pdb.125.2015.03.07.13.13.12
for <snipped>
(version=TLSv1 cipher=RC4-SHA bits=128/128);
Sat, 07 Mar 2015 13:13:14 -0800 (PST)
Received-SPF: pass (google.com: domain of [email protected] designates 202.172.28.22 as permitted sender) client-ip=202.172.28.22;
Authentication-Results: mx.google.com;
spf=pass (google.com: domain of [email protected] designates 202.172.28.22 as permitted sender) [email protected]
Message-Id: <54fb69ea.6a8a460a.765e.ffff8fb2SMTPIN_ADDED_MISSING@mx.google.com>
Received: (qmail 31218 invoked by uid 89); 8 Mar 2015 06:13:10 +0900
Received: from mail.495news.com (HELO User) ([email protected]@208.125.16.142)
by s21.coreserver.jp with SMTP; 8 Mar 2015 06:13:10 +0900
Reply-To: <[email protected]>
From: "Office of the IMF"<[email protected]>
Subject: UNPAID FUND RECOVERED LETTER
Date: Sat, 7 Mar 2015 16:18:41 -0500
MIME-Version: 1.0
Content-Type: text/html;
charset="Windows-1251"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1081
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1081


Office of the IMF Managing Director
700 19th St NW Washington, D.C.
DC 20431, USA
Attn Dear,

2015 UNPAID FUND RECOVERED LETTER

In our efforts to foster global monetary cooperation, secure financial stability and facilitate individual and company economic growth. The IMF through our international monitoring network has recovered your UNPAID FUND that has been on hold. We hereby advise you to reconfirm your information below to enable our payment bank, Citibank contact you for cash payment immediately.

Re-confirm as follows

(1) Your Full Name........?
(2) Full Residential Address: (P.O.BOX NOT ALLOWED)?
(3) Country/State..........?
(4) Beneficiary Amount?
(5) Direct and Current Phone?
(6) Passport identification?

Note: The above information is necessary to certify that you are the rightful beneficiary of the said funds As soon as we confirm these information, our payment Bank (CITIBANK/USA) will contact you for immediate payment.

Thanks

Your sincere
Ms. Christine Lagarde,
IMF Managing director
[email protected]

Please DO NOT tell a scammer that he has been posted here!

If you wish you can email me at
faizandocherty @ scamwarners [dot] com

How do I find email headers???

How to analyze an email header.

Who is online

Users browsing this forum: No registered users and 16 guests