Cyber threats come in all forms from computer viruses, data breaches, denial of service (DoS), blackmail (phishing attacks), to damage ranking and flagging sites causing search engine penalties or ransomware. A cyber attack or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general.
Firstly I would like to say I do not know this individual or the company this person is referring to and I have not upset anyone enough to threaten me. The only thing I could think of is that I do not outsource my work and I may have disgruntled a Website Designer or two from India thinking I am being awkward. My business is UK-based and I support local businesses. I never outsource my work offshore. Some of my clients have been burnt because either their websites have performed poorly or their domain names have been taken, hostage. Besides with so many people out of work in the UK, why on earth would I give my work to someone abroad?
The email I received today was a demand to give this individual a backlink.
The said individual should have asked nicely and in most cases I oblige, but I do not think this was their ulterior motive.
The entity that wrote the email said if I do not give a backlink he will spam my site and damage my ranking. He did have a clickable URL in the email and I did not open it as it could have been a virus. I do not recommend anyone else typing it into their browser either as it could be malicious.
I did a Google search for his name and came up with someone working in LinkedIn but the entity may not be using a real name, so I am not going to contact this person as the name in the email could be fake.
I also did a Google search of the company the entity is referring to:
Bizcope | SEO, Web Design & Digital Marketing Company
Website: https://www.bizcope.com/ (I am not giving a backlink here as this company could be the victim or the instigator (no one knows for certain), although they firmly deny ever using such low-blow tactics in the reviews).
This email threat could be a malicious and elaborate way to damage this companies reputation. Maybe the entity is a disgruntled employee but reading the Google reviews the company seems to have never have heard of this person, again Ireiterate he/she/it may not be using a false name.
It clearly shows I am not the only person being contacted by this individual also with the same jargon… I am not going to give a review as this company could well be the victim to getting one-star reviews.
(“A WORD OF CAUTION – DO NOT EMAIL THIS PERSON OR TYPE ANY OF HIS LINKS INTO YOUR BROWSER”).
Through the email source, I managed to find the IP address but if the entity is using VPN then this location may not even be accurate.
The said individual did get his/her 5 minutes of fame and gave me a post to write about but as for backlinks ask nicely.
I believe this person is a hacker and wants to ruin someone’s life and business. This tells me this person has a very sad life if they want to hurt other people. Imagine if the same thing happened to their family or friends would they be so eager to cause anguish and distress to another person?
I believe that search engines should do more and blacklist these people off the internet altogether. I think search engines should also make people show photo id to prove they are who they say they are so that they can eliminate fake accounts and websites and stop these idiots in their tracks. As an example, I am connected with some very important people and you would be amazed how many fake accounts add me every week near enough claiming to be the real person in question.
I believe in:
“What Goes Around, Comes Around”.
If you give out bad vibes then the UNIVERSE will pay you a visit but will punish you ten times harder.
When Companies Do Not Use Telephone Encryption To Process Payments.
It is drummed into our heads to never give out bank details over the phone especially your CVV number (the last three or four digits on the back of the card), yet some companies still are not PCI DSS Compliant and still insist on processing payments without encryption.
Is it secure to provide debit card information over the phone?
Generally speaking – if the merchant has encryption software installed it is safe to give your card details, however giving your details to a person is not, as they can easily screenshot your information or use spy cameras and use it further down the line in say a month or two. Most reputable merchants employ a number of technologies that greatly increase the security level when making payments over the phone.
One of them is your credit/debit card number, which as an owner of the card only you should know, and another is a shortcode called CVV – an abbreviation that stands for card verification value.
Printed on the back of your card, the CVV is a 3-4 digit code and its intended goal is to provide additional security when making purchases. The CVV makes sure you are in possession of the card and not someone else as the code shouldn’t be known to anyone other than the card owner.
Despite all security measures you should never forget that fraudsters are always looking for ways to beat them and steal your credit/debit card information and quite possibly even your money! This is why it is important to know how to protect your data by doing a few simple things you can further protect yourself and your earnings.
This is what you need to know and so by paying attention when providing card details, especially on the phone:
If using the Internet, make sure the goods or service you want to buy comes from a reputable web site. With that being said, always research the company offering the service or product beforehand.
Never make your card details shown in public.
Never provide your cvv number when asked on the phone or when processing a card payment in person.This is a sure sign of an impending fraud! CVV numbers are for online purchases only!
When making a payment on the phone, always obtain the phone number from a trusted source and make the call directly.
Always check your monthly bank statement thoroughly for charges you do not recognize.
Non-compliance can result in fines, likely to be imposed by the card issuers via the acquiring banks, for any merchant who fails to meet the required standard.
Any organization that takes credit card payments is subject to the rules laid out in the PCI DSS, and they also apply to payments taken over the phone. For those companies taking payments inside a contact center, they must make sure that they:
Demonstrate evidence of compliance with over 400 security controls which are applicable to any part of the contact center environment handling card data.
Ensure that sensitive authentication data (CVC2/CVV2 security code) is not stored in any format anywhere, including call recordings.
Vet new CSRs and conduct appropriate background checks; an expensive and time-consuming process
Make sure data cannot be removed from the call center by any means; usually by restricting the use of pens and paper and banning mobile phones from the contact center.
For a company to brush off your concerns that their payment processing methods are secure, they need to provide evidence of this when asked.
ENCRYPTION (or cryptography) makes card data unreadable to people without special information (called a key). Cryptography can be used on stored data and data transmitted over a network. Payment terminals that are part of PCI-listed P2PE solutions provide merchants the best assurance about the quality of the encryption. With a PCI-listed P2PE solution, card data is always entered directly into a PCI-approved payment terminal with something called “secure reading and exchange of data (SRED)” enabled. This approach minimizes the risk to clear-text card data and protects merchants against payment-terminal exploits such as “memory scraping” malware. Any encryption that is not done within a PCI-listed P2PE should be discussed with your vendor.
Certain consumer rights in the UK mean that all card transactions come with responsibilities for the merchant.
Cardholders can raise a dispute for transactions – including those done over the phone – to their card issuer, where the retailer did not provide the product or service, deliver on its own terms, or the transaction went ahead without the cardholder’s consent. This can result in a chargeback where the merchant is charged a fee and the full amount that was disputed.
The merchant should therefore be careful to get consent for each card transaction done over the phone. To avoid chargebacks, you should consequently get enough details from the customer to back up the consent. This could be the card security code, billing address, customer name as it appears on the card, etc.
If a credit (not debit) card is used for a £100+ transaction, section 75 of the Consumer Credit Act 1974 gives the consumer the right to claim back the money for a telephone transaction they did not clearly consent to.
Anyone reading this who has concerns about a company asking for their bank details over the phone should contact us using the form below for more guidance:
Note From the Editor.
The reason for this post today is because my daughter wanted to cancel her contract early with a mobile phone provider in the UK. She first spoke to someone who said they could not make the payment over the phone because they were working from home and that they would get the billing department to phone my daughter within the hour.
It was not long after my daughter received the call from the company and she could tell it was a call center because of the background noise. The operator then asked for my daughter’s card details over the phone without encryption and the worrying part was they asked for my daughter’s CVV number.
Now if this was me and I should have warned my daughter ahead of the call that if anyone asks for a CVV number refuse to give it and just insist they send a link to a secure payment method.
The amount was quite significant and now my daughter and I are worried that her details could have been stored for a later date. It does not take much effort to write the details down or screenshot a screen. One could even use a spy camera if mobile phones, pens, and notepads are prohibited.
I will be contacting the company for comment before publishing their name and my findings with Ofcom and the card payment companies who will all be making their inquiries.
**All Card issuers and banks should have a PPI & DSS Compliance Page on their websites giving consumers an opportunity to report companies to them, for them to investigate. Furthermore, the Banks and Credit Card issuers should also spread awareness to help counteract the UK £2 Billion credit card/debit card fraud problem. Merchants should only use telephone encryption software which should be made mandatory by law.
I had written about this case on my other Domain Brokering site many months ago and the problems arising from using offshore website designers, that basically cybersquatting the domain name which eventually getting it suspended by the City of London Police and Nominet.
However, it was an enormous task to delete all the breadcrumbs and carbon footprint this domain had incurred over the years that showed the domain in a bad light. The backlinks have been updated although we were not able to successfully catch them all, hopefully now business will pick up seeing we have now acquired the domain name and is in safe hands.
UK Website Designers built two sites for Jeff both exact match searchable keywords domain names www.electricianswales.co.uk and www.pattestingwales.co.ukwhilst his original branded domain had been compromised and was waiting to be recovered. It took over a year to finally get the domain back to its rightful owner.
The problem with website designers is unless a client has a contract stating the domain names that have been registered on the client’s behalf which will be released on termination of the agreement the business owner could get unstuck getting their domain names back as in the case of Jeff and his previous website designers.
Jeff is fortunate to have such a contract with “UK Website Designers” as we do not do business without signed agreements.
We have learned by our mistakes, the hard way over the years that not having contracts can become messy and as with one passport photographer in particular located in Cardiff who got “UK Website Designers” to build him 3 websites and he then started having financial problems paying, yet he had full control of the hosting and domain names.
Without a signed agreement it was difficult to prove what he had agreed to and that is when we decided that we would never get unstuck like that again.
All businesses should have contracts for the services they offer and anyone that just wants a gentlemen’s handshake should be avoided. A person who refuses to sign a contract obviously has ulterior motives.
Supporting Your Local Business.
Electrician In Wales.
If you are in South Wales UK and are reading this please support your local business and share this article with your connections as Jeff has lost a lot of business because of these people in India.
If you have any electrical work that needs doing-especially coming up to the holiday season with Halloween and Christmas lights and rewiring hots spots for kitchen Appliances or Landlord Property Safety checks and Commercial Properties Jeff is the man to call.
Neither one of these pages exist and would be deemed as broken.
Hence when a client gets a similar message and a prompt to click a link to fix the issue or inspect the problem, what is going to happen?, well I will tell you you will have clicked a virus or malware that will infiltrate your device, in which they could take over your webcam, have a keylogger so every time you put a password in they would steal your credentials.
Cybercrime is on the rise and you would think the cybercriminals would have a conscience and be worried about karma paying them a visit, but obviously not as the world if full of hackers and scammers without a conscience.
My client yesterday received such a message which he sent to me. I have redacted some of the data to keep my clients information private but you will get the gist.
The link linkSniff.com may have a virus hence I have not made this link clickable and advice anyone NOT to copy and paste the link into their browser as it can open up a can of worms.
However I will give Beth Collins have her 5 minutes of fame by posting her email email@example.com and her telephone that does not exist 0203 877 1138
Now here is a screenshot to one of my own websites that have had an attempted hack:
16 Failed Attempts, Unbelievable.
I have a few other websites that also have similar warnings. Put it this way my sites must be hot property if whoever is doing this, wants to steal the domain names or wants to steal other data.
How can these people sleep at night knowing they have scammed someone out of money or destroyed their livelyhood?
I believe in Karma….
Stay vigilant and never click any links from anyone you do not recognise.
Today and it was my fault for latching on to a post on Facebook about an appeal by South Wales Police about laser pointers, that I received some backlash for merely trying to clear up some confusion in my mind.
Obviously the people or person that pointed the laser should be punished under the terrorism act.
The reason why I latched on was because I could not believe that a simple pocket laser could cause harm or injure a pilot airborne or crew member when the culprit was on the ground, according to the original post an on-board critical care practitioner suffered blurred vision and a migraine,and had to go off-duty (This implies the injury was serious). Obviously I was naive about laser pointers and have since learnt a thing or two.
The incident which happened on Sunday 28th February 2021 at 9.30 pm over Heath Roath Park and Roath Recreation Ground in Cardiff UK. The laser was directed at a Wales Air Ambulance causing injuries to a crew member.
This is what a laser pointer looks like from the ground according to this blogger of this paper:
This is what a pointer looks like from 20km or 12 miles.
I obviously did some research and fact checking and all I got was negative people trolling me, with one stating that my shared links where belittling the crime and what I was sharing weretheoretical papers, even going as far as insinuating I had some ulterior motive to make the comment. (I do not take kindly to accusations), the said person (mentioning no names) even demanded I explain myself.
Also it was unclear how come the pilot was not mentioned?, unless the person was a paramedic and pilot?
When writing articles one should be clear about the content as to not confuse the reader. One should not write one line and hope the reader will second guess the rest.
The only reason for the Facebook Comment was if I am brutally honest was to establish factsand clear up any confusion, first of all there was no mention how far the helicopter was off the ground at the time of the incident?… so my question was how did the laser pointer affect a paramedics vision? Was the helicopter landing or taking off or in mid air?
Good Journalism should not cause confusion.
A laser pointer can be a distraction for helicopter pilots that wear night vision googles or airplanes that want to land, the same applies for military aircraft at night.
The most important part wasI was not condoning this in anyway and all perpertrators should be punished to fit the crime. I was merely pointing out that there would be no adverse physical affects from this according to theFact Checking‘ I had made from two verified sources the BJO & BBC, links below:
I can see how serious pointing a laser at an aircraft can be to the aviation authority and itcan be deemed as an act of terrorismand I certainly do not condone it.
Laser pointers can be distracting to pilots!
It seems to be a craze or fad for idiots to laser aircraft. Perhaps the powers that be should educate people in the masses about STUPIDITY with social awareness and media amplification that pointing lasers at aircraft is wrong on all levels, regardless if it affects a pilot or not. I can see that lasers pointers can be distracting and potenially dangerous. https://www.laserpointersafety.com/laser-hazards_aircraft/laser-hazards_aircraft.html
I personally think that laser pointers should be banned from the public and only used and sold to businesses and higher education institutes. I also believe fireworks should also be banned for sale to the public or the public need a license. Fireworks should only be sold to organisations for public events or people with firework licenses.
I am still open minded about the distance a laser pointer would have had to be to cause any adverse affect to the paramedic, considering in the BJO a laser does not cause headaches, but temporary blindness similar to a flash on a camera going off.
I have since removed myself from the group. I do not know how Facebook groups work but I do not wish to be associatied with narrow minded people.
(Addendum) apparantly if you remove yourself from the group it still does not remove you from the thread, lesson learnt, hence I had someone like my comment a few minutes ago.
My daughter gave me some solid advice:
“if you do not want to be trolled do not leave comments as people do not like the truth”.
I never once said that I was defending or condoning the culprits.
All I was doing was getting my head round the fact when one verified fact checked source says one thing and I read something else from anothersource that is confusing and that is when I start to question.
From what I can gather according to my verified source below, it is virtually impossible to have adverse physical affects from a laser on the ground whilst a pilot is airborne. If anything it can be a distraction when pilots wear night time googles or are landing and may experience flash blindness.
However pointing a laser to an aircraft is an obstruction and an should carry the punishment of an act of terrorism(and if it is isn’t, it should be).
Accordig to the Civil Aviation Authority in 2016, there were 1,258 incidents of lasers being pointed at aircraft. In future, those who deliberately target aircraft with lasers could face a jail sentence or hefty fine. Currently, shining lasers at planes has a penalty of up to £2,500.
Pointing a laser pointer at an aircraft is illegal.
Obviously I reiterate again, pointing a laser on a moving vehicle such as plane, helicopter, car motorbike, boat, yacht etc can be deemed as an act of terrorism, it does not matter why a perpertrator has engaged in such an act but more so that they executed their action and this is punishable by law.
For pilots to be affected and injured because of this act, the laser would have to directly be pointed in their eyes or for them to experience aflash blind effect.
According to theThe British Journal of Ophthalmology (BJO)
While many claims have been made for ocular and other injury, as a result of exposure to laser pointers, none has been sustained. Most victims are unaware of the clinical symptoms that would be appropriate to retinal injury; thus many individuals claim to have seen a bright light followed by pain or irritation in the irradiated eye. Some also complain of redness of the eye and headaches. In reality, there are no pain receptors in the retina and, therefore, threshold laser strike in the visible region of the spectrum is not associated with pain.
Yes a maximum punishment should be served to idiots using laser pointers for illegal means and maximum jail time should apply, as it could potenially cause a catastrophic disaster. This also applies to drones.
I personally think all journalist and media should use the phrase:
“Anyone caught using a laser pointer publicallyfor illegal purposes will be arrested and punished under the terrorism act”, which adds MORE CLOUT than a minimum sentence of 5 years, going as far as spreadingawareness in bold campaigns that show how dangerous laser pointers can be.
“Good Journalism Does Not Cause Confusion”.
It does not take much effort to log details who the device was sold to, making verification ID mandantory in the UK. However to stop people buying them from abroad is another matter and there would have to be an import ban from other countries to the consumer and only legitimate organisations that were licensed would have access.
BJO states and I quote “that in conclusion, laser pointers, pens, or key rings if used appropriately are not an eye hazard, and even if used inappropriately will not cause permanent eye damage”.
“It is sad that in this day and age with an array of social media platforms we are censored for the things we write. I am all for censorship if it promotes hate crime or worse. But when it comes to merely expressing an opinion or asking a question we should not be scrutinised. There is little room for freedom of speech anymore and we cannot ask questions as people will question our motives and get defensive. I believe if people have questions they should be able to express them without the fear of someone trolling themand without the fear of being censored or punished”.
Pointing any laser device to a moving vehicle eg: (planes, trains, cars, motor bikes, boats) or directly at someone to purposely maim including eyes and body or cause destruction and accidents, the perpartrators should be punished to fit the crime.
According to this article distances of up to 1200 feet can engulf a cockpit. It remains a distraction hazard all the way up to 12,000 feet.
The point is:
The maximum altitude which a helicopter can be reached during forward flight typically depends more on the ability of the engine. Helicopters can reach around 25,000 feet. But the maximum height at which a helicopter can hover is much lower – a high performance helicopter like the Agusta A109E can hover at 10,400 feet. However, if the helicopter remains in ‘ground effect’ – ie, if it is hovering close to high ground – its maximum hover altitude will be higher. The Agusta can hover in ground effect – ‘HIGE’ in helicopter jargon – at 13,800 feet. This is useful for mountain rescue missions.
I would also like to add I am a law abiding citizen and if I was to catch anyone pointing lasers for illegal purposes, other than for the purpose of business, education or the cat, I would report them to the authorities without question.
I was notified today by my angry client thinking that I had collected a payment via ‘www.gocardless.com’ for an amount that did not relate to our agreement. My client went on to say he has been charged since December twice in the month.
Obviously I had to investigate this and ‘Gocardless‘ confirmed that the amount my client was querying was nothing to do with me.
Gocardless sent me an email to trace payments with a link https://gocardless.com/payment-lookup/ I forwarded this onto my client and he managed to find out who the company was that had in fact taken the payments and it so happens to be the company named above.
I nearly lost a client because of these muppets so I am going to play fire with fire.
Who are GoCardless:
Gocardless in a nutshell is a service to set up direct debits for small businesses, meaning any company that collects recurring payments has the ability to collect payments month after month. They have created a global bank debit network, to rival credit and debit cards. … GoCardless has offices in London, Paris, Munich, Melbourne and San Francisco.
This is what I found out about the company by doing to simply search:
Do not just take my word for it do read what trust pilot have on them:
Now there are a couple of resigned directors on this portal however I am after the current director ‘ STEVEN DOMINIK COLEMAN’ who has 75% shares in the company but what is a bit weird he does not seem to be on LinkedIn. However I did find one of the resigned directors and have asked this person to contact me. If they don’t then it will be a matter for the police and small claims court.
Seeing now I have a name for this person not only will I be advising my client and anyone else that has been scammed by this company to contact:
This is classed as cyber crime. To try to get the money back a formal letter needs to be sent to this person:
Mr Steven Dominik Coleman
Correspondence Address is also in the footer of their website:
123 Domains Names Limited 48 Dartmouth Street Barrow-In-Furness LA14 3AS
To get your money back after giving this person time preferably 7 – 14 days, one can also go down the following route, however you need to exhaust all avenues to retrieve payment including, phoning your bank , emailing, sending snail mail letter (post) and finally take them to a small claims court, this will cost you but you can claim the money back for court fees and debt collection fees:
If you go down the route of getting a debt collector involved they will charge you upfront.
You could try this company although I have never used them personally but they offer ‘NO WIN NO FEE DEBT COLLECTION’https://mydebtrecovery.co.uk/
Do your own research and get prices before settling for any particular company.
Hence it is better to try and do it yourself and try to recover the money. If you find this daunting you can then hire a debt collector.
These people are low lifes in my opinion if they prey on people and give web designers a bad name.
Hence anyone that crosses my path and messes with my clients will be publicly named and shamed.
‘Steven Dominik Coleman’
….is now publically named and shamed and will be on my radar forever unless he gives back all the money he has scammed from everyone.
He is not on LinkedIn, not sure about Facebook and seems to have little carbon footprint. He may well in fact have two locations, but primarily I am concentrating on 123 Domain Names LTD (no relation ot 123reg,com), obviously in the world of domaining someone is bound to know who he is……
THE DOMAIN DIRECTORY GROUP LTD 69 Market Street, Dalton-In-Furness, England, LA15 8DL
Anyone who has any information on these people and companies 123 Domain Names LTD, MangoMedia.Online and The Domain Directory, should contact us using the form below, all information will be treated confidentially. Also when trying to recover your money send letters to both addresses mentioned above:
Who ever this person is knows who I am and is continuingly trying to scam me and break me down. I suspect who it might be but at the same time it could a coincidence of multiple people that may not be associated with one another. Either way I know enough about hacking to stay alert. Obviously either I am a hot commodity or someone is doing it out of spite. One way or another although I must admit it has played its toll on my mental health, I find that everytime someone tries to hack or scam me they have inevitabily created content for me to write on my blog.
So today I get a phone call and it is automated message that says my credit card associated with my Amazon account has had suspicious activity and it was prompting me to press options to either agree I made the transaction of over £1000 or decline or speak to an operator.
My gut feeling told me if this was really Amazon they would not be phoning from a mobile phone. My second gut reaction was not to say anything and not to press any buttons. This then made the caller hang up.
I did a reverse call lookup to see who called me and this is the screenshot of what I found (May I point out anyone can buy a telephone number from a different location / country and pretend to be phoning from th location they are targeting) Obviously this person forgot to hide his ip location:
Report Suspicious Emails, Phone Calls, Text Messages, or Webpages
We take fraud, scam,phishing and spoofing attempts seriously. If you receive correspondence you think may not be from Amazon, please report it immediately.
Suspicious Emails or Webpages To report a phishing or spoofed email or webpage:
Open a new email and attach the email you suspect is fake.For suspicious webpages, copy & paste the link into the email body. If you can’t send the email as an attachment, forward it.
Send the email to firstname.lastname@example.orgNote: Sending the suspicious email as an attachment is the best way for us to track it.
Note: Amazon can’t respond personally when you report a suspicious correspondence to email@example.com, but you may receive an automatic confirmation. If you have security concerns about your account, please contact us.
Suspicious Phone Calls or Text Messages
Report any suspicious phone call or text message to the Federal Trade Commission (FTC).
To report a phone call or text message visit ftc.gov/complaint and follow the onscreen assistant.
If you’re concerned about your account security, go to Protect Your System for tips and recommendations.
So now this entity has been reported, hopefully I have helped to stop someone else from being scammed.
What concerns me is that these entities that try to scam people out of money or ruin their businesses do not give two monkeys about the knock on effect it will have on a victim.
Not all people are internet savvy or cyber security astute. Imagine if the victim was someone who had mental health issues and this unlawful act pushed them over the edge.
People who scam need to find a real job that other people would be proud of them for, not be low life bottom feeders not thinking two pennies for someone elses downfall or situation if the domino effect happened.
All I can say is:
“What goes around comes around” !
If you only do good then only good things will happen but if you do bad then do not blame anyone other than yourself for the consequences of your actions.
“If people had empathy there would not be any wars”.
I have just received an email today attemptimg to steal my domain name www.cymrumarketing.com or put a virus on my computer.
The person must own www.domainworld.com to set up an email address appertaining to the domain name.
Obviously this person is visiting my site in order to physically fill out my online form.
Here is the email source:
Received: from mx3.pub.mailpod7-cph3.one.com ([10.27.31.13])
by mailstorage11.cst.mailpod7-cph3.one.com with LMTP id SOtuDYx1/182bwAAuBebmg
for <firstname.lastname@example.org>; Wed, 13 Jan 2021 22:34:52 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
Received: from mailout1-5.pub.mailoutpod1-cph3.one.com (mailout1-5.pub.mailoutpod1-cph3.one.com [126.96.36.199])
by mx3.pub.mailpod7-cph3.one.com (Halon) with ESMTPS
Wed, 13 Jan 2021 22:34:51 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
Received: from onecom-formmail1 (customer-nat.pub.webpod9-cph3.one.com [188.8.131.52])
by mailout1.pub.mailoutpod1-cph3.one.com (Halon) with ESMTPSA
Wed, 13 Jan 2021 22:34:50 +0000 (UTC)
Date: Wed, 13 Jan 2021 22:34:50 GMT
Subject: New message via contact form on cymrumarketing.com - Contact page
Content-Type: text/plain; charset=UTF-8
You received a new message from email@example.com sent via the contact f=
orm on cymrumarketing.com.
Name: Joe Miller
Message: Notice#: 491343
Date: 2021-01-14 =20
YOUR IMMEDIATE ATTENTION TO THIS MESSAGE IS ABSOLUTELY NECESSARY!
YOUR DOMAIN cymrumarketing.com WILL BE TERMINATED WITHIN 24 HOURS
We have not received your payment for the renewal of your domain cymrumarke=
We have made several attempts to reach you by phone, to inform you regardin=
g the TERMINATION of your domain cymrumarketing.com
CLICK HERE FOR SECURE ONLINE PAYMENT: https://yourdomainregistration.ga/?n=
IF WE DO NOT RECEIVE YOUR PAYMENT WITHIN 24 HOURS, YOUR DOMAIN cymrumarketi=
ng.com WILL BE TERMINATED
CLICK HERE FOR SECURE ONLINE PAYMENT: https://yourdomainregistration.ga/?n=
The submission notification cymrumarketing.com will EXPIRE WITHIN 24 HOURS =
after reception of this email
This person is a parasite, the lowest of the low and I hope karma teaches him or her a lesson. Consider the consequences of your actions, next time you try to steal a domain name or try to ruin someone’s business!
This is the Whois Data.
Name TUCOWS, INC. Whois Server whois.tucows.com
Referral URL http://tucowsdomains.com Status client