[WARNING Scam Ahead! 419 Eater]-Scam$Fraud


SUBMITTED BY: azzereply

DATE: Oct. 20, 2015, 7:50 a.m.

FORMAT: Text only

SIZE: 4.2 kB

HITS: 740

  1. Delivered-To: 7363616D6C657373776F726B6D6F7265@gmail.com
  2. Received: by 10.27.86.205 with SMTP id m74csp1592621wli;
  3. Mon, 19 Oct 2015 23:56:17 -0700 (PDT)
  4. X-Received: by 10.181.13.101 with SMTP id ex5mr21314511wid.2.1445324177943;
  5. Mon, 19 Oct 2015 23:56:17 -0700 (PDT)
  6. Return-Path: <rosedaniel269@gmail.com>
  7. Received: from mail-wi0-x243.google.com (mail-wi0-x243.google.com. [2a00:1450:400c:c05::243])
  8. by mx.google.com with ESMTPS id jc13si26595181wic.71.2015.10.19.23.56.17
  9. for <7363616D6C657373776F726B6D6F7265@gmail.com>
  10. (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
  11. Mon, 19 Oct 2015 23:56:17 -0700 (PDT)
  12. Received-SPF: pass (google.com: domain of rosedaniel269@gmail.com designates 2a00:1450:400c:c05::243 as permitted sender) client-ip=2a00:1450:400c:c05::243;
  13. Authentication-Results: mx.google.com;
  14. spf=pass (google.com: domain of rosedaniel269@gmail.com designates 2a00:1450:400c:c05::243 as permitted sender) smtp.mailfrom=rosedaniel269@gmail.com;
  15. dkim=pass header.i=@gmail.com;
  16. dmarc=pass (p=NONE dis=NONE) header.from=gmail.com
  17. Received: by mail-wi0-x243.google.com with SMTP id t4so1646147wiu.0
  18. for <7363616D6C657373776F726B6D6F7265@gmail.com>; Mon, 19 Oct 2015 23:56:17 -0700 (PDT)
  19. DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  20. d=gmail.com; s=20120113;
  21. h=mime-version:in-reply-to:references:date:message-id:subject:from:to
  22. :content-type;
  23. bh=SH6mSAz0F9fyjvrjCMJaLFT8OvKrG16TClUWHyOh1B8=;
  24. b=PAUTOwR2cHAsAcHv/GKWgRi79CZmh3dfqSyXayLKVAqMQoPBe2QR5wn8kG0LGbHj0j
  25. i+vaR71puPl44kRIB+YHVikUa9yylHp83ryKEHqs2oE2u+HW6OxscOak0DUsYJBekZD6
  26. ER/QxvlZSFYQRFIxMBlNnzvhJU1XmheA0kMTn36xNFaFkEONw3yL+lDu0/uZmMteqf6f
  27. raIzzeAyiSw0khhPtbeYTh0QHnPLl7+CwsupD1QLC0qz1rnQn3FYY67zi4Tv4XdP9WoN
  28. qLd3jel34LEh84YsXlR5M2JwNc5rHyk0AKpi9Uno4aFWCV8KOYTyyGxgg1o/d8DAJghM
  29. r0WQ==
  30. MIME-Version: 1.0
  31. X-Received: by 10.181.13.102 with SMTP id ex6mr2426839wid.64.1445324177833;
  32. Mon, 19 Oct 2015 23:56:17 -0700 (PDT)
  33. Received: by 10.27.140.82 with HTTP; Mon, 19 Oct 2015 23:56:17 -0700 (PDT)
  34. In-Reply-To: <CAP_KncN4mVzQeLQbMLBZ6Qi3epw_epk-3hffqwuAe=zZfPgPbg@mail.gmail.com>
  35. References: <878580039.1358133.1445275674847.JavaMail.gess@webmail-05.datacenter.cha.cantv.net>
  36. <CAP_KncNE+OWVsxK83vbvsBngLvrB795rosONHDz4Oi9tPm-0VQ@mail.gmail.com>
  37. <CAJ43RSEw+BdLBD4HQ0uJP_H85NkqPZY8MMkQMuJn6e2JN3r+8A@mail.gmail.com>
  38. <CAP_KncN4mVzQeLQbMLBZ6Qi3epw_epk-3hffqwuAe=zZfPgPbg@mail.gmail.com>
  39. Date: Mon, 19 Oct 2015 23:56:17 -0700
  40. Message-ID: <CAJ43RSEJm83=OeAQLanFwQ2vizrOUmw5nxiC+2kHQ7Mzq87qsg@mail.gmail.com>
  41. Subject: Re: western union payment
  42. From: Rose Daniel <rosedaniel269@gmail.com>
  43. To: jackson <7363616D6C657373776F726B6D6F7265@gmail.com>
  44. Content-Type: multipart/alternative; boundary=f46d04389335348253052283c286
  45. --f46d04389335348253052283c286
  46. Content-Type: text/plain; charset=UTF-8 Rose Daniel <rosedaniel269@gmail.com>
  47. *Here is the western union information you will send the $50 for the
  48. activation fee.
  49. Receive Name:__________Osiliu Mattew
  50. Country:________Cotonou / Benin Republic
  51. Text
  52. Question____God Answer_____________Bless AMOUNT___________$50USD
  53. OnlyMTCN__________??????SENDERS NAME _________*
  54. Here is the western union information you will send the $50 for the activation fee.
  55. Receive Name:__________Osiliu Mattew
  56. Country :________Cotonou / Benin Republic
  57. Text Question____God
  58. Answer_____________Bless
  59. AMOUNT___________$50USD Only
  60. MTCN__________??????
  61. SENDERS NAME _________
  62. --f46d04389335348253052283c286--
  63. <END>
  64. **http://interfraud.org/index.htm
  65. **https://en.wikipedia.org/wiki/419_scams
  66. **http://www.419scam.org/
  67. **https://www.scamwarners.com/forum/index.php
  68. **http://www.419eater.com/index.php
  69. **related & keywords: fraudulent messages, 419 Advance Fee Fraud, phishing, lottery scam, suspicious emails, fraud, confidence trick, scam, 419 scams, malicious, suspicious emails, advance fee fraud, scam origin, fraudulent, payment, scam collector, scam log, fraud collection, scam email header, 419eater.com

comments powered by Disqus