uawdijnntqw1x1x1
IP : 3.139.55.72
Hostname : premium160.web-hosting.com
Kernel : Linux premium160.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Disable Function : None :)
OS : Linux
PATH:
/
home
/
batcwwjx
/
mail
/
new
/
1678684985.M133601P4025417.premium160.web-hosting.com,S=3103,W=3166
/
/
Return-Path: <> Delivered-To: batcwwjx@premium160.web-hosting.com Received: from premium160.web-hosting.com by premium160.web-hosting.com with LMTP id OL4WBzmzDmRJbD0A5d/cxQ (envelope-from <>) for <batcwwjx@premium160.web-hosting.com>; Mon, 13 Mar 2023 01:23:05 -0400 Return-path: <> Envelope-to: batcwwjx@premium160.web-hosting.com Delivery-date: Mon, 13 Mar 2023 01:23:05 -0400 Received: from mailnull by premium160.web-hosting.com with local (Exim 4.95) id 1pbaeH-00GtTs-2k for batcwwjx@premium160.web-hosting.com; Mon, 13 Mar 2023 01:23:05 -0400 Auto-Submitted: auto-replied From: Mail Delivery System <Mailer-Daemon@premium160.web-hosting.com> To: batcwwjx@premium160.web-hosting.com References: <RuQht21kzn0zx2LZkqDvvktH9ea8lZgDXPya586C0@ozdac.org> Subject: Mail failure - rejected by local scanning code Message-Id: <E1pbaeH-00GtTs-2k@premium160.web-hosting.com> Date: Mon, 13 Mar 2023 01:23:05 -0400 A message that you sent was rejected by the local scanning code that checks incoming messages on this system. The following error was given: "Relaying not permitted" ------ This is a copy of your message, including all the headers. ------ Received: from batcwwjx by premium160.web-hosting.com with local (Exim 4.95) (envelope-from <batcwwjx@premium160.web-hosting.com>) id 1pbaeH-00GtSk-28 for bilal2012s@gmail.com; Mon, 13 Mar 2023 01:23:05 -0400 To: bilal2012s@gmail.com Subject: =?us-ascii?Q?Ozdac_"5_Vulnerabilities_Have_Been_Found_In_You?= =?us-ascii?Q?r_Site"?= X-PHP-Script: ozdac.org/index.php for 212.102.57.85, 212.102.57.85 X-PHP-Filename: /home/batcwwjx/ozdac.org/index.php REMOTE_ADDR: 212.102.57.85 Date: Mon, 13 Mar 2023 05:23:04 +0000 From: Organization of Zoonotic Diseases Awareness and Control <bilal2012s@gmail.com> Reply-To: hacker@stevson.com Message-ID: <RuQht21kzn0zx2LZkqDvvktH9ea8lZgDXPya586C0@ozdac.org> X-Mailer: PHPMailer 6.6.5 (https://github.com/PHPMailer/PHPMailer) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: <batcwwjx@premium160.web-hosting.com> From: Berry Lemons <hacker@stevson.com> Subject: 5 Vulnerabilities Have Been Found In Your Site Message Body: We are a group of highly qualified ethical hackers who scan tens of thousands of sites every day for critical vulnerabilities and patch them for a small fee. On your site ozdac.org - we have discovered 5 critical vulnerabilities, each of which can give attackers full access to your site, databases and the server as a whole. Pay $3000 (0.15 BTC) by visiting this site where you will be able to copy our bitcoin (btc) address or scan the QR code with your device https://www.blockchain.com/explorer/addresses/btc/3CzVCBdWuRxshZY2C94R8VFyjqvrnkV6bh And after payment within 12 hours we will fix all the vulnerabilities on your site and you can sleep peacefully without worrying about the safety of your site and server. If we are hired by well-known corporations, then we charge from $50000 for our services, so you are lucky that we offer you the same service for $3000 (0.15 BTC) -- This e-mail was sent from a contact form on Ozdac (https://ozdac.org)
/home/batcwwjx/mail/new/1678684985.M133601P4025417.premium160.web-hosting.com,S=3103,W=3166