0 Members and 1 Guest are viewing this topic.
ÒÔϵÄÓÊŒþ:> > ÈÕÆÚ: Thu, 29 Jul 2010 13:33:02 +0200> > Ö÷Ìâ: [clean-mx-viruses-613902](61.191.54.50)-->(abuse@ah163.com) viruses sites (5 so far) within your network, please close them!> > ŽóС: 7447 bytes ×ÖœÚ> > ¶¯×÷: ʧ°ÜûÓÐÄܹ»·¢Ë͵œÒÔϵÄÊÕŒþÈË: abuse "(, ErrMsg=Mailbox space not enough (space limit is 102400KB). Size of arriving mail (1KB) exceeds free space (0KB)."²»»áÔÙÓÐÈκζ¯×÷À޳¢ÊÔ·¢ËÍÄãµÄÓÊŒþÁË¡£ ÇëÁªÏµÄãµÄϵͳ¹ÜÀíÔ±»òÏÈÍš¹ýÆäËü·Çµç×ÓÓÊŒþµÄ·œÊœÏòÄãµÄÅóÓÑ·¢ËÍÐÅÏ¢ÒÔÃâµ¢Îó¡£ original.emlBetreff:[clean-mx-viruses-613902](61.191.54.50)-->(abuse@ah163.com) viruses sites (5 so far) within your network, please close them! status: As of 2010-07-29 13:33:02 CESTVon:abuse@clean-mx.deDatum:Thu, 29 Jul 2010 13:33:02 +0200An:abuse@ah163.comReceived:from relayn.netpilot.net([10.1.7.2]) by ah163.com(AIMC 3.1.0.0) with SMTP id jm254c5180c9; Thu, 29 Jul 2010 19:36:03 +0800Received:from relayn.netpilot.net([62.67.240.20]) by aisp.com(AIMC 2.9.5.4) with SMTP id AISP action; Thr, 29 Jul 2010 19:36:03 +0800Received:from relayn.netpilot.net (localhost [127.0.0.1]) by relayn.netpilot.net (Postfix) with ESMTP id CC6F01EB0071 for <abuse@ah163.com>; Thu, 29 Jul 2010 13:46:15 +0200 (CEST)DKIM-Signature:v=1; a=rsa-sha1; c=simple; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; s=sel; bh=6+ a0P9d9/AS+jlz7RmGlNYZGEMw=; b=umBgH7rT1hvzQ3saXbNjhTClqS6pS65C6C cOeNT6tp7PczljEg/8bW/5zVWiipjlbQ+qEXdOXWuk0HPSB6yoPMkf/DOjRhvlZz PSE2DkfzEXBee7y7Zv2aoBwlgcbswobE9+48KR6mn6WTVDaPf63Mf1vTCkHNpWQg Q2zv9+YBE=DomainKey-Signature:a=rsa-sha1; c=nofws; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; q=dns; s=sel; b= lYxDeEuib+Bn87ebquO7kh7rFNeuL0sRoCruVV+qMKsNi3w9Gbra9j/1lHXHSh5D IDYXNP7TnBxJPlLPxdzGqJ1m30Zin+CXMqjWvo/L/2S7VIq/cUXFqtoL3P65RWtA HOdRIz83/b6RNQpyF+GkzCA6MiSHLr8cOwrUgqthcl4=Received:from dbserv.netpilot.net (unknown [195.214.79.22]) by localhost (Postfix) with ESMTP id 8C9A21EB0051 for <abuse@ah163.com>; Thu, 29 Jul 2010 11:46:15 +0000 (UTC)Precedence:bulkMIME-Version:1.0X-Mailer:clean mx secure mailerX-Virus-Scanned:by netpilot GmbH at clean-mx.deNachricht-ID:<20100729.1280403182@dbserv.netpilot.net>content-Type:multipart/signed; boundary="----------=_1280403975-25182-13531"; micalg="pgp-sha1"; protocol="application/pgp-signature"X-AIMC-AUTH:(null)X-AIMC-MAILFROM:abuse@clean-mx.deX-AIMC-Msg-ID:qKJZ1eYBDear abuse team,please help to close these offending viruses sites(5) so far.status: As of 2010-07-29 13:33:02 CESThttp://support.clean-mx.de/clean-mx/viruses.php?email=abuse@ah163.com&response=alive(for full uri, please scroll to the right end ... We detected many active cases dated back to 2007, so please look at the date column below.You may also subscribe to our MalwareWatch list http://lists.clean-mx.com/cgi-bin/mailman/listinfo/viruswatchThis information has been generated out of our comprehensive real time database, tracking worldwide viruses URI'smost likely also affected pages for these ip may be found via passive dns please have a look on these other domains correlated to these ip example: see http://www.bfk.de/bfk_dnslogger.html?query=61.191.54.50 If your review this list of offending site, please do this carefully, pay attention for redirects also!Also, please consider this particular machines may have a root kit installed !So simply deleting some files or dirs or disabling cgi may not really solve the issue !Advice: The appearance of a Virus Site on a server means thatsomeone intruded into the system. The server's owner shoulddisconnect and not return the system into service until anaudit is performed to ensure no data was lost, that all OS andinternet software is up to date with the latest security fixes,and that any backdoors and other exploits left by the intrudersare closed. Logs should be preserved and analyzed and, perhaps,the appropriate law enforcement agencies notified.DO NOT JUST DELETE THE FILES. IF YOU DO NOT FIX THE SECURITYPROBLEM, THEY WILL BE BACK!You may forward my information to law enforcement, CERTs,other responsible admins, or similar agencies.+-----------------------------------------------------------------------------------------------|date |id |virusname |ip |domain |Url|+-----------------------------------------------------------------------------------------------|2010-06-30 20:22:35 CEST |613902 |unknown_html |61.191.54.50 |61.191.54.50 |http://61.191.54.50:8080/sogou/sogoujhfc.php?id=3|2010-06-30 20:22:35 CEST |613903 |unknown_html |61.191.54.50 |61.191.54.50 |http://61.191.54.50:8080/sogou/sogoujhfc.php?id=5|2010-06-30 20:22:35 CEST |613904 |unknown_html |61.191.54.50 |61.191.54.50 |http://61.191.54.50:8080/sogou/sogoujhfc.php?id=7|2010-07-02 20:09:00 CEST |615520 |unknown_html |61.191.54.50 |61.191.54.50 |http://61.191.54.50:8080/sogou/sogoujhfc.php?id=10|2010-07-02 20:09:00 CEST |615521 |unknown_html |61.191.54.50 |61.191.54.50 |http://61.191.54.50:8080/sogou/sogoujhfc.php?id=9+-----------------------------------------------------------------------------------------------Your email address has been pulled out of whois concerning this offending network block(s).If you are not concerned with anti-fraud measurements, please forward this mail to the next responsible desk available...If you just close(d) these incident(s) please give us a feedback, our automatic walker process may not detect a closed caseexplanation of virusnames:==========================unknown_html_RFI_php not yet detected by scanners as RFI, but pure php code for injectionunknown_html_RFI_perl not yet detected by scanners as RFI, but pure perl code for injectionunknown_html_RFI_eval not yet detected by scanners as RFI, but suspect javascript obfuscationg evalsunknown_html_RFI not yet detected by scanners as RFI, but trapped by our honeypots as remote-code-injectionunknown_html not yet detected by scanners as RFI, but suspious, may be in rare case false positiveunknown_exe not yet detected by scanners as malware, but high risk!all other names malwarename detected by scanners==========================yoursGerhard W. Recher(Geschäftsführer)NETpilot GmbHWilhelm-Riehl-Str. 13D-80687 MünchenTel: ++49 89 547182 0Fax: ++49 89 547182 33GSM: ++49 171 4802507Handelsregister München: HRB 124497w3: http://www.clean-mx.dee-Mail: mailto:abuse@clean-mx.dePGP-KEY: Fingerprint: A4E317B6DC6494DCC9616366A75AB34CDD0CE552 id: 0xDD0CE552Location: http://www.clean-mx.de/downloads/abuse-at-clean-mx.de.pub.asc
ÒÔϵÄÓÊŒþ:> > ÈÕÆÚ: Thu, 29 Jul 2010 13:32:38 +0200> > Ö÷Ìâ: [clean-mx-viruses-470466](61.176.222.143)-->(abuse@online.ln.cn) viruses sites (4 so far) within your network, please close th> > ŽóС: 7282 bytes ×ÖœÚ> > ¶¯×÷: ʧ°ÜûÓÐÄܹ»·¢Ë͵œÒÔϵÄÊÕŒþÈË: abuse "(5), ErrMsg=Mailbox space not enough (space limit is 102400KB). Size of arriving mail (1KB) exceeds free space (0KB)."²»»áÔÙÓÐÈκζ¯×÷À޳¢ÊÔ·¢ËÍÄãµÄÓÊŒþÁË¡£ ÇëÁªÏµÄãµÄϵͳ¹ÜÀíÔ±»òÏÈÍš¹ýÆäËü·Çµç×ÓÓÊŒþµÄ·œÊœÏòÄãµÄÅóÓÑ·¢ËÍÐÅÏ¢ÒÔÃâµ¢Îó¡£ original.emlBetreff:[clean-mx-viruses-470466](61.176.222.143)-->(abuse@online.ln.cn) viruses sites (4 so far) within your network, please close them! status: As of 2010-07-29 13:32:38 CESTVon:abuse@clean-mx.deDatum:Thu, 29 Jul 2010 13:32:38 +0200An:abuse@online.ln.cnReceived:from relayn.netpilot.net([10.1.1.7]) by online.ln.cn(AIMC 3.1.0.0) with SMTP id jm64c51acfb; Thu, 29 Jul 2010 19:43:36 +0800Received:from relayn.netpilot.net([62.67.240.20]) by online.ln.cn(AIMC 2.9.5.4) with SMTP id AISP action; Thr, 29 Jul 2010 19:43:36 +0800Received:from relayn.netpilot.net (localhost [127.0.0.1]) by relayn.netpilot.net (Postfix) with ESMTP id 996F21EB0004 for <abuse@online.ln.cn>; Thu, 29 Jul 2010 13:44:03 +0200 (CEST)DKIM-Signature:v=1; a=rsa-sha1; c=simple; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; s=sel; bh=yW ImKgfpEX8LsWKSE7tzbtfD1vI=; b=OGSZd0hEJIraTiDMhyqmEfhFbk824tLS/y 9FpuJZ/qHxa7d270G430QPEf+lAHCqkOvPBGzpycbrNoN7THiFjniTgTcEpLOS2T nNVhtXzRonlKFgY7tAEcNpQ0p0F4gf+7yhvdHiep4j+B0KxCYVBNOU9iu/IDfOVJ 1X/3PEeN8=DomainKey-Signature:a=rsa-sha1; c=nofws; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; q=dns; s=sel; b= wSgpuCHIanM8Q61HCipo+DaO+o77Z3vSLeEXzDZhDoSetv6wd3B9iT3y64XwipPj aQ8ARSiTuAGu/6cuJTDhBlRHZPD3Cw7rSe+Aql5r9i4XCK7TQmklaMc31Zsxt553 MQVLs25FhHOABjBaxGEoA3ftZ40zoqtjZNoR7thKK4U=Received:from dbserv.netpilot.net (unknown [195.214.79.22]) by localhost (Postfix) with ESMTP id 766D21EB00B1 for <abuse@online.ln.cn>; Thu, 29 Jul 2010 11:44:03 +0000 (UTC)Precedence:bulkMIME-Version:1.0X-Mailer:clean mx secure mailerX-Virus-Scanned:by netpilot GmbH at clean-mx.deNachricht-ID:<20100729.1280403158@dbserv.netpilot.net>content-Type:multipart/signed; boundary="----------=_1280403843-25182-13239"; micalg="pgp-sha1"; protocol="application/pgp-signature"X-AIMC-AUTH:(null)X-AIMC-MAILFROM:abuse@clean-mx.deX-AIMC-Msg-ID:BZ261eYBDear abuse team,please help to close these offending viruses sites(4) so far.status: As of 2010-07-29 13:32:38 CESThttp://support.clean-mx.de/clean-mx/viruses.php?email=abuse@online.ln.cn&response=alive(for full uri, please scroll to the right end ... We detected many active cases dated back to 2007, so please look at the date column below.You may also subscribe to our MalwareWatch list http://lists.clean-mx.com/cgi-bin/mailman/listinfo/viruswatchThis information has been generated out of our comprehensive real time database, tracking worldwide viruses URI'smost likely also affected pages for these ip may be found via passive dns please have a look on these other domains correlated to these ip example: see http://www.bfk.de/bfk_dnslogger.html?query=61.176.222.143 If your review this list of offending site, please do this carefully, pay attention for redirects also!Also, please consider this particular machines may have a root kit installed !So simply deleting some files or dirs or disabling cgi may not really solve the issue !Advice: The appearance of a Virus Site on a server means thatsomeone intruded into the system. The server's owner shoulddisconnect and not return the system into service until anaudit is performed to ensure no data was lost, that all OS andinternet software is up to date with the latest security fixes,and that any backdoors and other exploits left by the intrudersare closed. Logs should be preserved and analyzed and, perhaps,the appropriate law enforcement agencies notified.DO NOT JUST DELETE THE FILES. IF YOU DO NOT FIX THE SECURITYPROBLEM, THEY WILL BE BACK!You may forward my information to law enforcement, CERTs,other responsible admins, or similar agencies.+-----------------------------------------------------------------------------------------------|date |id |virusname |ip |domain |Url|+-----------------------------------------------------------------------------------------------|2010-03-23 05:46:40 CET |470466 |unknown_html_google_malware |61.176.222.143 |bz521.com |http://www.bz521.com/|2010-03-23 12:05:40 CET |470713 |TR/Dldr.Banload.axov |61.176.222.143 |bz521.com |http://www.bz521.com/dlq.rar|2010-05-31 00:29:41 CEST |584304 |unknown_html_google_malware |61.176.222.143 |bz521.com |http://www.bz521.com|2010-07-14 06:43:11 CEST |620662 |PUA.HTML.Infected.WebPage-1 |61.176.222.143 |sfok.net |http://www.sfok.net/+-----------------------------------------------------------------------------------------------Your email address has been pulled out of whois concerning this offending network block(s).If you are not concerned with anti-fraud measurements, please forward this mail to the next responsible desk available...If you just close(d) these incident(s) please give us a feedback, our automatic walker process may not detect a closed caseexplanation of virusnames:==========================unknown_html_RFI_php not yet detected by scanners as RFI, but pure php code for injectionunknown_html_RFI_perl not yet detected by scanners as RFI, but pure perl code for injectionunknown_html_RFI_eval not yet detected by scanners as RFI, but suspect javascript obfuscationg evalsunknown_html_RFI not yet detected by scanners as RFI, but trapped by our honeypots as remote-code-injectionunknown_html not yet detected by scanners as RFI, but suspious, may be in rare case false positiveunknown_exe not yet detected by scanners as malware, but high risk!all other names malwarename detected by scanners==========================yoursGerhard W. Recher(Geschäftsführer)NETpilot GmbHWilhelm-Riehl-Str. 13D-80687 MünchenTel: ++49 89 547182 0Fax: ++49 89 547182 33GSM: ++49 171 4802507Handelsregister München: HRB 124497w3: http://www.clean-mx.dee-Mail: mailto:abuse@clean-mx.dePGP-KEY: Fingerprint: A4E317B6DC6494DCC9616366A75AB34CDD0CE552 id: 0xDD0CE552Location: http://www.clean-mx.de/downloads/abuse-at-clean-mx.de.pub.asc
ÒÔϵÄÓÊŒþ:> > ÈÕÆÚ: Thu, 29 Jul 2010 13:33:20 +0200> > Ö÷Ìâ: [clean-mx-viruses-437752](58.51.95.218)-->(abuse_hb@public.wh.hb.cn) viruses sites (2 so far) within your network, please clos> > ŽóС: 7092 bytes ×ÖœÚ> > ¶¯×÷: ʧ°ÜûÓÐÄܹ»·¢Ë͵œÒÔϵÄÊÕŒþÈË: abuse_hb`public_wh_hb_cn "(, ErrMsg=Mailbox space not enough (space limit is 102400KB). Size of arriving mail (1KB) exceeds free space (0KB)."²»»áÔÙÓÐÈκζ¯×÷À޳¢ÊÔ·¢ËÍÄãµÄÓÊŒþÁË¡£ ÇëÁªÏµÄãµÄϵͳ¹ÜÀíÔ±»òÏÈÍš¹ýÆäËü·Çµç×ÓÓÊŒþµÄ·œÊœÏòÄãµÄÅóÓÑ·¢ËÍÐÅÏ¢ÒÔÃâµ¢Îó¡£ original.emlBetreff:[clean-mx-viruses-437752](58.51.95.218)-->(abuse_hb@public.wh.hb.cn) viruses sites (2 so far) within your network, please close them! status: As of 2010-07-29 13:33:20 CESTVon:abuse@clean-mx.deDatum:Thu, 29 Jul 2010 13:33:20 +0200An:abuse_hb@public.wh.hb.cnReceived:from relayn.netpilot.net([127.0.0.1]) by public.wh.hb.cn(AIMC 4.0.0.0) with SMTP id jm274c51c819; Thu, 29 Jul 2010 19:40:11 +0800Received:from relayn.netpilot.net([62.67.240.20]) by aisp.com(AIMC 4.0.0.0) with SMTP id AISP action; Thu, 29 Jul 2010 19:40:11 +0800Received:from relayn.netpilot.net (localhost [127.0.0.1]) by relayn.netpilot.net (Postfix) with ESMTP id 4F3411EB0045 for <abuse_hb@public.wh.hb.cn>; Thu, 29 Jul 2010 13:47:28 +0200 (CEST)DKIM-Signature:v=1; a=rsa-sha1; c=simple; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; s=sel; bh=62 G+LqGl0Tr6eQSwpRvYhunhjwU=; b=ZRbJjzo4ox4Q5VpPtDJWzeJ/VhDJNJSg9P jR/WR7scEPHBiWdH46zvmaIcX3ZQ+j74RWYMe00rl9RzC9SjDwjLM2iafEdBwfp+ O9E0SJNqMTy3VQYXCsCVPjuOWvzOBFTGRxX1KinBe2bvwl5ZyQbvt7ggdCa0HZGJ CFShK6mDs=DomainKey-Signature:a=rsa-sha1; c=nofws; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; q=dns; s=sel; b= obg0kNMt6gQqOmE5mMdzSF5bjQHegEnbowaHP2WKXW70rEmq8rpMgseckGZb0bd6 FBpLfktX4MWxwwy7LZ0E4iR8MajWyEl42X57OeaFUeMASXvSFfOZe+rV5TrNVYN6 SN5FGTuVnVJs70rkzxO7BKavOC+Ew494nk7D9PIAoik=Received:from dbserv.netpilot.net (unknown [195.214.79.22]) by localhost (Postfix) with ESMTP id 2E3EE1EB00B8 for <abuse_hb@public.wh.hb.cn>; Thu, 29 Jul 2010 11:47:28 +0000 (UTC)Precedence:bulkMIME-Version:1.0X-Mailer:clean mx secure mailerX-Virus-Scanned:by netpilot GmbH at clean-mx.deNachricht-ID:<20100729.1280403200@dbserv.netpilot.net>content-Type:multipart/signed; boundary="----------=_1280404048-25182-13809"; micalg="pgp-sha1"; protocol="application/pgp-signature"X-AIMC-AUTH:(null)X-AIMC-MAILFROM:abuse@clean-mx.deX-AIMC-Msg-ID:S3J31eYBDear abuse team,please help to close these offending viruses sites(2) so far.status: As of 2010-07-29 13:33:20 CESThttp://support.clean-mx.de/clean-mx/viruses.php?email=abuse_hb@public.wh.hb.cn&response=alive(for full uri, please scroll to the right end ... We detected many active cases dated back to 2007, so please look at the date column below.You may also subscribe to our MalwareWatch list http://lists.clean-mx.com/cgi-bin/mailman/listinfo/viruswatchThis information has been generated out of our comprehensive real time database, tracking worldwide viruses URI'smost likely also affected pages for these ip may be found via passive dns please have a look on these other domains correlated to these ip example: see http://www.bfk.de/bfk_dnslogger.html?query=58.51.95.218 If your review this list of offending site, please do this carefully, pay attention for redirects also!Also, please consider this particular machines may have a root kit installed !So simply deleting some files or dirs or disabling cgi may not really solve the issue !Advice: The appearance of a Virus Site on a server means thatsomeone intruded into the system. The server's owner shoulddisconnect and not return the system into service until anaudit is performed to ensure no data was lost, that all OS andinternet software is up to date with the latest security fixes,and that any backdoors and other exploits left by the intrudersare closed. Logs should be preserved and analyzed and, perhaps,the appropriate law enforcement agencies notified.DO NOT JUST DELETE THE FILES. IF YOU DO NOT FIX THE SECURITYPROBLEM, THEY WILL BE BACK!You may forward my information to law enforcement, CERTs,other responsible admins, or similar agencies.+-----------------------------------------------------------------------------------------------|date |id |virusname |ip |domain |Url|+-----------------------------------------------------------------------------------------------|2010-02-21 18:45:00 CET |437752 |TR/Drop.Agent.apd |58.51.95.218 |xf4.cn |http://1.xf4.cn/0/lockfree.exe|2010-03-06 00:00:00 CET |453990 |TR/Dldr.Banload.atxh |58.51.95.218 |djguo.com |http://down.djguo.com/down51/svafd112009.exe+-----------------------------------------------------------------------------------------------Your email address has been pulled out of whois concerning this offending network block(s).If you are not concerned with anti-fraud measurements, please forward this mail to the next responsible desk available...If you just close(d) these incident(s) please give us a feedback, our automatic walker process may not detect a closed caseexplanation of virusnames:==========================unknown_html_RFI_php not yet detected by scanners as RFI, but pure php code for injectionunknown_html_RFI_perl not yet detected by scanners as RFI, but pure perl code for injectionunknown_html_RFI_eval not yet detected by scanners as RFI, but suspect javascript obfuscationg evalsunknown_html_RFI not yet detected by scanners as RFI, but trapped by our honeypots as remote-code-injectionunknown_html not yet detected by scanners as RFI, but suspious, may be in rare case false positiveunknown_exe not yet detected by scanners as malware, but high risk!all other names malwarename detected by scanners==========================yoursGerhard W. Recher(Geschäftsführer)NETpilot GmbHWilhelm-Riehl-Str. 13D-80687 MünchenTel: ++49 89 547182 0Fax: ++49 89 547182 33GSM: ++49 171 4802507Handelsregister München: HRB 124497w3: http://www.clean-mx.dee-Mail: mailto:abuse@clean-mx.dePGP-KEY: Fingerprint: A4E317B6DC6494DCC9616366A75AB34CDD0CE552 id: 0xDD0CE552Location: http://www.clean-mx.de/downloads/abuse-at-clean-mx.de.pub.asc
This report relates to a message you sent with the following header fields: Message-id: <20100729.1280403030@dbserv.netpilot.net> Date: Thu, 29 Jul 2010 13:30:30 +0200 From: abuse@clean-mx.de To: abuse@emirates.net.ae Subject: [clean-mx-viruses-482336](194.170.187.6)-->(abuse@emirates.net.ae) viruses sites (1 so far) within your network, please close them! status: As of 2010-07-29 13:30:30 CESTYour message cannot be delivered to the following recipients: Recipient address: abuse1@ies.etisalat.ae Original address: abuse@emirates.net.ae Reason: Mailbox too largeOriginal-envelope-id: 0L6B00F6YHM42N00@dimail6.emirates.net.aeReporting-MTA: dns;auhmc2.emirates.net.ae (ims-ms-daemon)Original-recipient: rfc822;abuse@emirates.net.aeFinal-recipient: rfc822;abuse1@ies.etisalat.aeAction: failedStatus: 5.0.0 (Mailbox too large)Return-path: <abuse@clean-mx.de>Received: from ims-ms-daemon.auhsmail2.emirates.net.ae by auhsmail2.emirates.net.ae (I&ES Mail Server 4.2) id <0L6B002I6HM4WG00@auhsmail2.emirates.net.ae>; Thu, 29 Jul 2010 15:37:16 +0400 (GST)Received: from dimail6.emirates.net.ae by auhsmail2.emirates.net.ae (I&ES Mail Server 4.2) with ESMTP id <0L6B00L1EHM4VO30@auhsmail2.emirates.net.ae>; Thu, 29 Jul 2010 15:37:16 +0400 (GST)Received: from davmail5.emirates.net.ae ([86.96.226.108]) by dimail6.emirates.net.ae (I&ES Mail Server 4.2) id <0L6B00F00ATS2N00@dimail6.emirates.net.ae> (ORCPT abuse@emirates.net.ae) ; Thu, 29 Jul 2010 15:37:16 +0400 (GST)Received: from davmail5.emirates.net.ae ([86.96.226.108]) by dimail6.emirates.net.ae (I&ES Mail Server 4.2) with ESMTP id <0L6B00LJWHM4KI40@dimail6.emirates.net.ae> for abuse@emirates.net.ae; Thu, 29 Jul 2010 15:37:16 +0400 (GST)Received: from relayn.netpilot.net (relayn.netpilot.net [62.67.240.20]) by davmail5.emirates.net.ae (I&ES Mail Server 4.2) with ESMTP id F21C3725029319EB for <abuse@emirates.net.ae>; Thu, 29 Jul 2010 15:37:11 +0400 (GST)Received: from relayn.netpilot.net (localhost [127.0.0.1]) by relayn.netpilot.net (Postfix) with ESMTP id 364861EB0058 for <abuse@emirates.net.ae>; Thu, 29 Jul 2010 13:37:07 +0200 (CEST)Received: from dbserv.netpilot.net (unknown [195.214.79.22]) by localhost (Postfix) with ESMTP id 1D9FF1EB005A for <abuse@emirates.net.ae>; Thu, 29 Jul 2010 11:37:07 +0000 (UTC)Date: Thu, 29 Jul 2010 13:30:30 +0200From: abuse@clean-mx.deSubject: [clean-mx-viruses-482336](194.170.187.6)-->(abuse@emirates.net.ae) viruses sites (1 so far) within your network, please close them! status: As of 2010-07-29 13:30:30 CESTTo: abuse@emirates.net.aeMessage-id: <20100729.1280403030@dbserv.netpilot.net>MIME-version: 1.0X-Mailer: clean mx secure mailerContent-type: TEXT/PLAINContent-transfer-encoding: QUOTED-PRINTABLEPrecedence: bulkAuthentication-Results: davmail5.emirates.net.ae header.from=abuse@clean-mx.de; domainkeys=pass (ok)DKIM-Signature: v=1; a=rsa-sha1; c=simple; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; s=sel; bh=YI YFvS2X9FPj0eP0qMt2FCLZU98=; b=pIEVbotejJ439JTt5alFrVv6jm6C6M/8Ac BGmUh+0UcAB4M+cftn3MDrBiQZy00C7HNOfFY2TvPJSmscGqnXcr5j5Lpp8Vf6LU FZMAlzGSWXgzqrWI9Agu4JVFDbB14DhDgkHDxEnSo2+K6aQhAHk0EGgwWjYNYkCB iOzoc9Z+g=DomainKey-Signature: a=rsa-sha1; c=nofws; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; q=dns; s=sel; b= fI0pe16hKhyt9fts5vYTbQ4sxJrT1C0+03U32aN9ckzg+Yej5wPdqm/20iOvC9TS kEno5Po9VOfrhtgtUbYetW576AW03C7upXnek9Mmg2pD9pRHKnkB574w/H8E0Urm oBEsk9HAhdKXm+LESKcijbBCPnGyUzMEQdCIuIMjF5o=X-Virus-Scanned: by netpilot GmbH at clean-mx.de
This report relates to a message you sent with the following header fields: Return-path: <abuse@clean-mx.de> Return-path: <abuse@clean-mx.de> Received: from ims-ms-daemon.mail2.mailmty.avantel.net.mx by mail2.mailmty.avantel.net.mx (iPlanet Messaging Server 5.1 HotFix 1.14 (built Oct 8 2003)) id <0L6B00190I3WR1@mail2.mailmty.avantel.net.mx> (original mail from abuse@clean-mx.de); Thu, 29 Jul 2010 06:47:56 -0500 (CDT) Received: from smtpin4.mailmty.avantel.net.mx ([200.38.95.7]) by mail2.mailmty.avantel.net.mx (iPlanet Messaging Server 5.1 HotFix 1.14 (built Oct 8 2003)) with ESMTP id <0L6B00DLKI3WJ0@mail2.mailmty.avantel.net.mx> for noc@ims-ms-daemon (ORCPT noc@avantel.net.mx); Thu, 29 Jul 2010 06:47:56 -0500 (CDT) Received: from relayn.netpilot.net ([62.67.240.20]) by smtpin4.mailmty.avantel.net.mx with ESMTP; Thu, 29 Jul 2010 06:48:04 -0500 Received: from relayn.netpilot.net (localhost [127.0.0.1]) by relayn.netpilot.net (Postfix) with ESMTP id AB7E91EB0052 for <noc@avantel.net.mx>; Thu, 29 Jul 2010 13:48:02 +0200 (CEST) Received: from dbserv.netpilot.net (unknown [195.214.79.22]) by localhost (Postfix) with ESMTP id 98AAE1EB0071 for <noc@avantel.net.mx>; Thu, 29 Jul 2010 11:48:02 +0000 (UTC) Date: Thu, 29 Jul 2010 13:33:28 +0200 From: abuse@clean-mx.de Subject: [clean-mx-viruses-419465](200.78.238.146)-->(noc@AVANTEL.NET.MX) viruses sites (1 so far) within your network, please close them! status: As of 2010-07-29 13:33:28 CEST To: noc@AVANTEL.NET.MX Message-id: <20100729.1280403208@dbserv.netpilot.net> MIME-version: 1.0 X-Mailer: clean mx secure mailer Content-type: multipart/signed; protocol="application/pgp-signature"; micalg=pgp-sha1; boundary="----------=_1280404082-25182-13886" Precedence: bulk DKIM-Signature: v=1; a=rsa-sha1; c=simple; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; s=sel; bh=8B SyxN1CTZGP7oX02WGFld7aN74=; b=erXCq7c+4j2u639wkVYSHIW+HVZiqmPk/o 9JUAzbXZ7m+yUJyizYWeh9AxEaai5KTYWgS3Z6Aa0gHTMGNkayT0tOWi4NL3dHVD R1YaoqyVASF2AnSvZCsi4xd1xYfsvyqxkp1+7eEucjcVIMFcCec/++eAKHLodkne fpaYsHR7k= DomainKey-Signature: a=rsa-sha1; c=nofws; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; q=dns; s=sel; b= pFfBtvihzD9KKIRw/B7cYxndWXdc9wD3IwO1sdP/79aNVT6gAvRc0OEFxST1vkX9 ySdvldxHmpxh7SrJR4YhDdGeUDj2/GGu9mvXDnDBar1gPheQ/x3SzrqteeUcw8Wr EQDiKPnHbbqnMqk6zOqWOHkZawq8tA5+/y70jqsdg1c= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AqEEAIoHUUw+Q/AUZGdsb2JhbAABmUqGPQgaCwoGEgQeiBmoAI5zAQSFOIgfXoJQ X-IronPort-AV: E=Sophos;i="4.55,279,1278306000"; d="asc'?scan'208";a="228985318" X-Virus-Scanned: by netpilot GmbH at clean-mx.deYour message cannot be delivered to the following recipients: Recipient address: noc@ims-ms-daemon Original address: noc@avantel.net.mx Reason: Over quotaReporting-MTA: dns;mail2.mailmty.avantel.net.mx (ims-ms-daemon)Original-recipient: rfc822;noc@avantel.net.mxFinal-recipient: rfc822;noc@ims-ms-daemonAction: failedStatus: 5.2.2 (Over quota)Teil 1.2Betreff:[clean-mx-viruses-419465](200.78.238.146)-->(noc@AVANTEL.NET.MX) viruses sites (1 so far) within your network, please close them! status: As of 2010-07-29 13:33:28 CESTVon:abuse@clean-mx.deDatum:Thu, 29 Jul 2010 13:33:28 +0200An:noc@AVANTEL.NET.MXReturn-path:<abuse@clean-mx.de>Return-path:<abuse@clean-mx.de>Received:from ims-ms-daemon.mail2.mailmty.avantel.net.mx by mail2.mailmty.avantel.net.mx (iPlanet Messaging Server 5.1 HotFix 1.14 (built Oct 8 2003)) id <0L6B00190I3WR1@mail2.mailmty.avantel.net.mx> (original mail from abuse@clean-mx.de); Thu, 29 Jul 2010 06:47:56 -0500 (CDT)Received:from smtpin4.mailmty.avantel.net.mx ([200.38.95.7]) by mail2.mailmty.avantel.net.mx (iPlanet Messaging Server 5.1 HotFix 1.14 (built Oct 8 2003)) with ESMTP id <0L6B00DLKI3WJ0@mail2.mailmty.avantel.net.mx> for noc@ims-ms-daemon (ORCPT noc@avantel.net.mx); Thu, 29 Jul 2010 06:47:56 -0500 (CDT)Received:from relayn.netpilot.net ([62.67.240.20]) by smtpin4.mailmty.avantel.net.mx with ESMTP; Thu, 29 Jul 2010 06:48:04 -0500Received:from relayn.netpilot.net (localhost [127.0.0.1]) by relayn.netpilot.net (Postfix) with ESMTP id AB7E91EB0052 for <noc@avantel.net.mx>; Thu, 29 Jul 2010 13:48:02 +0200 (CEST)Received:from dbserv.netpilot.net (unknown [195.214.79.22]) by localhost (Postfix) with ESMTP id 98AAE1EB0071 for <noc@avantel.net.mx>; Thu, 29 Jul 2010 11:48:02 +0000 (UTC)Nachricht-ID:<20100729.1280403208@dbserv.netpilot.net>MIME-Version:1.0X-Mailer:clean mx secure mailerContent-type:multipart/signed; protocol="application/pgp-signature"; micalg=pgp-sha1; boundary="----------=_1280404082-25182-13886"Precedence:bulkDKIM-Signature:v=1; a=rsa-sha1; c=simple; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; s=sel; bh=8B SyxN1CTZGP7oX02WGFld7aN74=; b=erXCq7c+4j2u639wkVYSHIW+HVZiqmPk/o 9JUAzbXZ7m+yUJyizYWeh9AxEaai5KTYWgS3Z6Aa0gHTMGNkayT0tOWi4NL3dHVD R1YaoqyVASF2AnSvZCsi4xd1xYfsvyqxkp1+7eEucjcVIMFcCec/++eAKHLodkne fpaYsHR7k=DomainKey-Signature:a=rsa-sha1; c=nofws; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; q=dns; s=sel; b= pFfBtvihzD9KKIRw/B7cYxndWXdc9wD3IwO1sdP/79aNVT6gAvRc0OEFxST1vkX9 ySdvldxHmpxh7SrJR4YhDdGeUDj2/GGu9mvXDnDBar1gPheQ/x3SzrqteeUcw8Wr EQDiKPnHbbqnMqk6zOqWOHkZawq8tA5+/y70jqsdg1c=X-IronPort-Anti-Spam-Filtered:trueX-IronPort-Anti-Spam-Result:AqEEAIoHUUw+Q/AUZGdsb2JhbAABmUqGPQgaCwoGEgQeiBmoAI5zAQSFOIgfXoJQX-IronPort-AV:E=Sophos;i="4.55,279,1278306000"; d="asc'?scan'208";a="228985318"X-Virus-Scanned:by netpilot GmbH at clean-mx.deDear abuse team,please help to close these offending viruses sites(1) so far.status: As of 2010-07-29 13:33:28 CESThttp://support.clean-mx.de/clean-mx/viruses.php?email=noc@AVANTEL.NET.MX&response=alive(for full uri, please scroll to the right end ... We detected many active cases dated back to 2007, so please look at the date column below.You may also subscribe to our MalwareWatch list http://lists.clean-mx.com/cgi-bin/mailman/listinfo/viruswatchThis information has been generated out of our comprehensive real time database, tracking worldwide viruses URI'smost likely also affected pages for these ip may be found via passive dns please have a look on these other domains correlated to these ip example: see http://www.bfk.de/bfk_dnslogger.html?query=200.78.238.146 If your review this list of offending site, please do this carefully, pay attention for redirects also!Also, please consider this particular machines may have a root kit installed !So simply deleting some files or dirs or disabling cgi may not really solve the issue !Advice: The appearance of a Virus Site on a server means thatsomeone intruded into the system. The server's owner shoulddisconnect and not return the system into service until anaudit is performed to ensure no data was lost, that all OS andinternet software is up to date with the latest security fixes,and that any backdoors and other exploits left by the intrudersare closed. Logs should be preserved and analyzed and, perhaps,the appropriate law enforcement agencies notified.DO NOT JUST DELETE THE FILES. IF YOU DO NOT FIX THE SECURITYPROBLEM, THEY WILL BE BACK!You may forward my information to law enforcement, CERTs,other responsible admins, or similar agencies.+-----------------------------------------------------------------------------------------------|date |id |virusname |ip |domain |Url|+-----------------------------------------------------------------------------------------------|2010-02-08 17:34:29 CET |419465 |unknown_html_RFI_shell |200.78.238.146 |difusion.com.mx |http://www.difusion.com.mx/ceids/google.php?+-----------------------------------------------------------------------------------------------Your email address has been pulled out of whois concerning this offending network block(s).If you are not concerned with anti-fraud measurements, please forward this mail to the next responsible desk available...If you just close(d) these incident(s) please give us a feedback, our automatic walker process may not detect a closed caseexplanation of virusnames:==========================unknown_html_RFI_php not yet detected by scanners as RFI, but pure php code for injectionunknown_html_RFI_perl not yet detected by scanners as RFI, but pure perl code for injectionunknown_html_RFI_eval not yet detected by scanners as RFI, but suspect javascript obfuscationg evalsunknown_html_RFI not yet detected by scanners as RFI, but trapped by our honeypots as remote-code-injectionunknown_html not yet detected by scanners as RFI, but suspious, may be in rare case false positiveunknown_exe not yet detected by scanners as malware, but high risk!all other names malwarename detected by scanners==========================yoursGerhard W. Recher(Geschäftsführer)NETpilot GmbHWilhelm-Riehl-Str. 13D-80687 MünchenTel: ++49 89 547182 0Fax: ++49 89 547182 33GSM: ++49 171 4802507Handelsregister München: HRB 124497w3: http://www.clean-mx.dee-Mail: mailto:abuse@clean-mx.dePGP-KEY: Fingerprint: A4E317B6DC6494DCC9616366A75AB34CDD0CE552 id: 0xDD0CE552Location: http://www.clean-mx.de/downloads/abuse-at-clean-mx.de.pub.asc
Delivery to the following recipient failed permanently: yijungik@gmail.comTechnical details of permanent failure: Internal Message-ID collision----- Original message -----Received: by 10.224.29.4 with SMTP id o4mr9569608qac.203.1280403592688; Thu, 29 Jul 2010 04:39:52 -0700 (PDT)Return-Path: <abuse@clean-mx.de>Received: from HCLC1 ([211.236.182.240]) by mx.google.com with ESMTP id h7si1349525qcm.80.2010.07.29.04.39.49; Thu, 29 Jul 2010 04:39:51 -0700 (PDT)Received-SPF: fail (google.com: domain of abuse@clean-mx.de does not designate 211.236.182.240 as permitted sender) client-ip=211.236.182.240;Authentication-Results: mx.google.com; spf=hardfail (google.com: domain of abuse@clean-mx.de does not designate 211.236.182.240 as permitted sender) smtp.mail=abuse@clean-mx.de; dkim=pass header.i=@clean-mx.deReceived: by HCLC1 (Postfix) id 0F6DF3801E5A3; Thu, 29 Jul 2010 20:39:49 +0900 (KST)Delivered-To: noc@hclc.co.krReceived: from relayn.netpilot.net (relayn.netpilot.net [62.67.240.20]) by HCLC1 (Postfix) with ESMTPS id 480263801E58C for <noc@hclc.co.kr>; Thu, 29 Jul 2010 20:39:48 +0900 (KST)Received: from relayn.netpilot.net (localhost [127.0.0.1]) by relayn.netpilot.net (Postfix) with ESMTP id F31091EB00DD for <noc@hclc.co.kr>; Thu, 29 Jul 2010 13:39:39 +0200 (CEST)DKIM-Signature: v=1; a=rsa-sha1; c=simple; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; s=sel; bh=fm A+fj+c3JX7XP+u0cvOjT56Psg=; b=ZGMkTRq//kWi+MPKV2H9tX6IMWvSOLiBDk J6Vs8sOeCdS9/CEGBqtbXjey0Hji9G4QeMoJVbz/VXg34dkJHyzBj9a3w8INDxT/ /7sMnNGoXrnpPIml9N5Z5N/Pnr0JLPGzXoxDLXvgU0FYlUIs6UIiWWhCpqvjaLzZ nnDT+bXsE=DomainKey-Signature: a=rsa-sha1; c=nofws; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; q=dns; s=sel; b= e7nIxpe0I24rQX2T+gzQascCR6cbrDfCti8/tDyoEA7NZUauN4WBLxxQjuvVjNIN 5XKqgrTDHgtf5rBlXKDhuIMnDKGIt/pyWo6sThYH5ICQan5yu2T5bVwZRsTKt/lu dyGcvYOEsWlU+x23A+/7pDakkkeFy0Yf0DwTVZBtKjY=Received: from dbserv.netpilot.net (unknown [195.214.79.22]) by localhost (Postfix) with ESMTP id E717B1EB00DE for <noc@hclc.co.kr>; Thu, 29 Jul 2010 11:39:39 +0000 (UTC)From: abuse@clean-mx.deto: noc@hclc.co.krSubject: [clean-mx-viruses-499493](124.217.198.252)-->(noc@hclc.co.kr) viruses sites (1 so far) within your network, please close them! status: As of 2010-07-29 13:31:29 CESTPrecedence: bulkMIME-Version: 1.0X-Mailer: clean mx secure mailerX-Virus-Scanned: by netpilot GmbH at clean-mx.deMessage-Id: <20100729.1280403089@dbserv.netpilot.net>Date: Thu, 29 Jul 2010 13:31:29 +0200content-Type: multipart/signed; boundary="----------=_1280403579-25182-12375"; micalg="pgp-sha1"; protocol="application/pgp-signature"Dear abuse team,please help to close these offending viruses sites(1) so far.status: As of 2010-07-29 13:31:29 CESThttp://support.clean-mx.de/clean-mx/viruses.php?email=noc@hclc.co.kr&response=alive(for full uri, please scroll to the right end ... We detected many active cases dated back to 2007, so please look at the date column below.You may also subscribe to our MalwareWatch list http://lists.clean-mx.com/cgi-bin/mailman/listinfo/viruswatchThis information has been generated out of our comprehensive real time database, tracking worldwide viruses URI'smost likely also affected pages for these ip may be found via passive dns please have a look on these other domains correlated to these ip example: see http://www.bfk.de/bfk_dnslogger.html?query=124.217.198.252 If your review this list of offending site, please do this carefully, pay attention for redirects also!Also, please consider this particular machines may have a root kit installed !So simply deleting some files or dirs or disabling cgi may not really solve the issue !Advice: The appearance of a Virus Site on a server means thatsomeone intruded into the system. The server's owner shoulddisconnect and not return the system into service until anaudit is performed to ensure no data was lost, that all OS andinternet software is up to date with the latest security fixes,and that any backdoors and other exploits left by the intrudersare closed. Logs should be preserved and analyzed and, perhaps,the appropriate law enforcement agencies notified.DO NOT JUST DELETE THE FILES. IF YOU DO NOT FIX THE SECURITYPROBLEM, THEY WILL BE BACK!You may forward my information to law enforcement, CERTs,other responsible admins, or similar agencies.+-----------------------------------------------------------------------------------------------|date |id |virusname |ip |domain |Url|+-----------------------------------------------------------------------------------------------|2010-04-04 00:00:00 CEST |499493 |JS/iFrame.AL |124.217.198.
This is an automatically generated Delivery Status Notification.Delivery to the following recipients failed. abuse@fastservers.netReporting-MTA: dns;mx1.layeredtechnologies.comReceived-From-MTA: dns;relentless.fastservers.netArrival-Date: Thu, 29 Jul 2010 06:49:13 -0500Final-Recipient: rfc822;abuse@fastservers.netAction: failedStatus: 5.1.1Teil 1.2Betreff:[clean-mx-viruses-445649](74.200.208.10)-->(abuse@fastservers.net) viruses sites (2 so far) within your network, please close them! status: As of 2010-07-29 13:33:43 CESTVon:abuse@clean-mx.deDatum:Thu, 29 Jul 2010 13:33:43 +0200An:abuse@fastservers.netReceived:from relentless.fastservers.net ([64.38.19.98]) by mx1.layeredtechnologies.com with Microsoft SMTPSVC(6.0.3790.3959); Thu, 29 Jul 2010 06:49:13 -0500X-ASG-Debug-ID:1280404152-784c02530000-UtaBuuX-Barracuda-URL:http://64.38.19.98:7777/cgi-bin/mark.cgiReceived:from relayn.netpilot.net (localhost [127.0.0.1]) by relentless.fastservers.net (Spam Firewall) with ESMTP id 34B7811FD475 for <abuse@fastservers.net>; Thu, 29 Jul 2010 06:49:12 -0500 (CDT)Received:from relayn.netpilot.net (relayn.netpilot.net [62.67.240.20]) by relentless.fastservers.net with ESMTP id pBxrEBz4k6PmBrR2 for <abuse@fastservers.net>; Thu, 29 Jul 2010 06:49:12 -0500 (CDT)Received:from relayn.netpilot.net (localhost [127.0.0.1]) by relayn.netpilot.net (Postfix) with ESMTP id 5756D1EB0044 for <abuse@fastservers.net>; Thu, 29 Jul 2010 13:49:10 +0200 (CEST)DKIM-Signature:v=1; a=rsa-sha1; c=simple; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; s=sel; bh=t7 7ijT5kdwccUGHXQXWPxr6yYAU=; b=ZPeUELI0ULgAJ66/DYG1Js44sZAgUo01jq 4a3vfJe6IazUmr2SNGSVO9Z49oBg2vSZ7HVeKI5NamYmAOSMe5GPsLsWd0+vayij 7tYIdyUrsADjKlSk6V64BQt/xH/uLBJrUIQeOQDMQjEktRjQ8llkQR/wZQRRWw4V 6ohls6ijQ=DomainKey-Signature:a=rsa-sha1; c=nofws; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; q=dns; s=sel; b= mTZabkSzBlVXYi969qT9TbFGI15e+Fhv/AOV/4HBTGjAqdQwh9aJ+YOtntSe/aXV rrR2pgc1lA3v7XZtsx2kr+BUYm6jsc2SjlGEUuXEKC0KCtlg0JvVNFHEmLdUDKZs o/TaBKQ3b/Nc4f6NjCX9xFkuPWfJfQenN8zi6ugFAEY=Received:from dbserv.netpilot.net (unknown [195.214.79.22]) by localhost (Postfix) with ESMTP id 2219F1EB0087 for <abuse@fastservers.net>; Thu, 29 Jul 2010 11:49:09 +0000 (UTC)X-ASG-Orig-Subj:[clean-mx-viruses-445649](74.200.208.10)-->(abuse@fastservers.net) viruses sites (2 so far) within your network, please close them! status: As of 2010-07-29 13:33:43 CESTPrecedence:bulkMIME-Version:1.0X-Mailer:clean mx secure mailerX-Virus-Scanned:by netpilot GmbH at clean-mx.deNachricht-ID:<20100729.1280403223@dbserv.netpilot.net>content-Type:multipart/signed; boundary="----------=_1280404149-25182-14031"; micalg="pgp-sha1"; protocol="application/pgp-signature"X-Barracuda-Connect:relayn.netpilot.net[62.67.240.20]X-Barracuda-Start-Time:1280404153X-Barracuda-Virus-Scanned:by RELENTLESS Barracuda Spam Firewall at fastservers.netReturn-Path:abuse@clean-mx.deX-OriginalArrivalTime:29 Jul 2010 11:49:13.0432 (UTC) FILETIME=[10962D80:01CB2F14]Dear abuse team,please help to close these offending viruses sites(2) so far.status: As of 2010-07-29 13:33:43 CESThttp://support.clean-mx.de/clean-mx/viruses.php?email=abuse@fastservers.net&response=alive(for full uri, please scroll to the right end ... We detected many active cases dated back to 2007, so please look at the date column below.You may also subscribe to our MalwareWatch list http://lists.clean-mx.com/cgi-bin/mailman/listinfo/viruswatchThis information has been generated out of our comprehensive real time database, tracking worldwide viruses URI'smost likely also affected pages for these ip may be found via passive dns please have a look on these other domains correlated to these ip example: see http://www.bfk.de/bfk_dnslogger.html?query=74.200.208.10 If your review this list of offending site, please do this carefully, pay attention for redirects also!Also, please consider this particular machines may have a root kit installed !So simply deleting some files or dirs or disabling cgi may not really solve the issue !Advice: The appearance of a Virus Site on a server means thatsomeone intruded into the system. The server's owner shoulddisconnect and not return the system into service until anaudit is performed to ensure no data was lost, that all OS andinternet software is up to date with the latest security fixes,and that any backdoors and other exploits left by the intrudersare closed. Logs should be preserved and analyzed and, perhaps,the appropriate law enforcement agencies notified.DO NOT JUST DELETE THE FILES. IF YOU DO NOT FIX THE SECURITYPROBLEM, THEY WILL BE BACK!You may forward my information to law enforcement, CERTs,other responsible admins, or similar agencies.+-----------------------------------------------------------------------------------------------|date |id |virusname |ip |domain |Url|+-----------------------------------------------------------------------------------------------|2010-02-26 00:00:00 CET |445649 |HTML/Crypted.Gen |74.200.208.10 |arthaexpress.com.np |http://arthaexpress.com.np/|2010-02-26 00:00:00 CET |445650 |TR/Crypt.XDR.Gen |74.200.208.10 |arthaexpress.com.np |http://arthaexpress.com.np/zcv.gif+-----------------------------------------------------------------------------------------------Your email address has been pulled out of whois concerning this offending network block(s).If you are not concerned with anti-fraud measurements, please forward this mail to the next responsible desk available...If you just close(d) these incident(s) please give us a feedback, our automatic walker process may not detect a closed caseexplanation of virusnames:==========================unknown_html_RFI_php not yet detected by scanners as RFI, but pure php code for injectionunknown_html_RFI_perl not yet detected by scanners as RFI, but pure perl code for injectionunknown_html_RFI_eval not yet detected by scanners as RFI, but suspect javascript obfuscationg evalsunknown_html_RFI not yet detected by scanners as RFI, but trapped by our honeypots as remote-code-injectionunknown_html not yet detected by scanners as RFI, but suspious, may be in rare case false positiveunknown_exe not yet detected by scanners as malware, but high risk!all other names malwarename detected by scanners==========================yoursGerhard W. Recher(Geschäftsführer)NETpilot GmbHWilhelm-Riehl-Str. 13D-80687 MünchenTel: ++49 89 547182 0Fax: ++49 89 547182 33GSM: ++49 171 4802507Handelsregister München: HRB 124497w3: http://www.clean-mx.dee-Mail: mailto:abuse@clean-mx.dePGP-KEY: Fingerprint: A4E317B6DC6494DCC9616366A75AB34CDD0CE552 id: 0xDD0CE552Location: http://www.clean-mx.de/downloads/abuse-at-clean-mx.de.pub.asc
This is an automatically generated Delivery Status Notification.Delivery to the following recipients failed. scott.porter@interoute.comReporting-MTA: dns;ukex01.interoute.comReceived-From-MTA: dns;mail1.interoute.comArrival-Date: Thu, 29 Jul 2010 13:43:05 +0200Final-Recipient: rfc822;scott.porter@interoute.comAction: failedStatus: 5.1.1Teil 1.2Betreff:[clean-mx-viruses-245911](195.81.248.143)-->(scott.porter@interoute.com) viruses sites (1 so far) within your network, please close them! status: As of 2010-07-29 13:32:00 CESTVon:abuse@clean-mx.deDatum:Thu, 29 Jul 2010 13:32:00 +0200An:scott.porter@interoute.comReceived:from mail1.interoute.com ([172.31.49.60]) by ukex01.interoute.com with Microsoft SMTPSVC(6.0.3790.3959); Thu, 29 Jul 2010 13:43:05 +0200Received:from mail189.messagelabs.com ([85.158.139.179]) by mail1.interoute.com with Microsoft SMTPSVC(7.0.6001.18000); Thu, 29 Jul 2010 13:43:11 +0200X-VirusChecked:CheckedX-Env-Sender:abuse@clean-mx.deX-Msg-Ref:server-8.tower-189.messagelabs.com!1280403726!61640040!1X-StarScan-Version:6.2.4; banners=-,-,-X-Originating-IP:[62.67.240.20]X-SpamReason:No, hits=3.4 required=7.0 tests=ADDRESS_IN_SUBJECT, BODY_RANDOM_LONG,X_MAILER_SPAMReceived:(qmail 10684 invoked from network); 29 Jul 2010 11:42:06 -0000Received:from relayn.netpilot.net (HELO relayn.netpilot.net) (62.67.240.20) by server-8.tower-189.messagelabs.com with DHE-RSA-AES256-SHA encrypted SMTP; 29 Jul 2010 11:42:06 -0000Received:from relayn.netpilot.net (localhost [127.0.0.1]) by relayn.netpilot.net (Postfix) with ESMTP id 3A37F1EB0052 for <scott.porter@interoute.com>; Thu, 29 Jul 2010 13:42:06 +0200 (CEST)DKIM-Signature:v=1; a=rsa-sha1; c=simple; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; s=sel; bh=Ee jT7TbfIdC7vRtl0nilRQA8Cp0=; b=sVB9j8kIoA3CiM6LSVm3L4tA/S/TSqM8nC dOjfnSCyVlOmkP969cow5BIK66/vNXvqlxd4JkTQ0R3xMiMs95aqTr1AFB+SAaVL Zypewbcph9Rp/xHogDZvWDBIHffnFMT5JCBCGWr41hvmE2MW23pe5cSPXGcMFBrT Zvygfeufk=DomainKey-Signature:a=rsa-sha1; c=nofws; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; q=dns; s=sel; b= msTB2LvXzmneiMCp413xOetpVNtPbz98tB0YvU6IDAaIDkj1zVTpDf67u6DLJa4Q w5GJewCJpUvI1ORLmMDe9mIFjCdAlib82UnDVMLkPzkMKxYwxlLlJ8WmvOdYrDiY WaZU2hkINMykIa7lhK6sjpvJfma0EKQtQPuY7QCcVwE=Received:from dbserv.netpilot.net (unknown [195.214.79.22]) by localhost (Postfix) with ESMTP id F3CC11EB0048 for <scott.porter@interoute.com>; Thu, 29 Jul 2010 11:42:05 +0000 (UTC)Precedence:bulkMIME-Version:1.0X-Mailer:clean mx secure mailerX-Virus-Scanned:by netpilot GmbH at clean-mx.deNachricht-ID:<20100729.1280403120@dbserv.netpilot.net>content-Type:multipart/signed; boundary="----------=_1280403725-25182-12743"; micalg="pgp-sha1"; protocol="application/pgp-signature"Return-Path:abuse@clean-mx.deX-OriginalArrivalTime:29 Jul 2010 11:43:11.0593 (UTC) FILETIME=[38E9ED90:01CB2F13]Dear abuse team,please help to close these offending viruses sites(1) so far.status: As of 2010-07-29 13:32:00 CESThttp://support.clean-mx.de/clean-mx/viruses.php?email=scott.porter@interoute.com&response=alive(for full uri, please scroll to the right end ... We detected many active cases dated back to 2007, so please look at the date column below.You may also subscribe to our MalwareWatch list http://lists.clean-mx.com/cgi-bin/mailman/listinfo/viruswatchThis information has been generated out of our comprehensive real time database, tracking worldwide viruses URI'smost likely also affected pages for these ip may be found via passive dns please have a look on these other domains correlated to these ip example: see http://www.bfk.de/bfk_dnslogger.html?query=195.81.248.143 If your review this list of offending site, please do this carefully, pay attention for redirects also!Also, please consider this particular machines may have a root kit installed !So simply deleting some files or dirs or disabling cgi may not really solve the issue !Advice: The appearance of a Virus Site on a server means thatsomeone intruded into the system. The server's owner shoulddisconnect and not return the system into service until anaudit is performed to ensure no data was lost, that all OS andinternet software is up to date with the latest security fixes,and that any backdoors and other exploits left by the intrudersare closed. Logs should be preserved and analyzed and, perhaps,the appropriate law enforcement agencies notified.DO NOT JUST DELETE THE FILES. IF YOU DO NOT FIX THE SECURITYPROBLEM, THEY WILL BE BACK!You may forward my information to law enforcement, CERTs,other responsible admins, or similar agencies.+-----------------------------------------------------------------------------------------------|date |id |virusname |ip |domain |Url|+-----------------------------------------------------------------------------------------------|2009-10-28 14:07:14 CET |245911 |Suspicious File |195.81.248.143 |partycasino.com |http://www.partycasino.com/Downloads/si/pcsetup_si.exe+-----------------------------------------------------------------------------------------------Your email address has been pulled out of whois concerning this offending network block(s).If you are not concerned with anti-fraud measurements, please forward this mail to the next responsible desk available...If you just close(d) these incident(s) please give us a feedback, our automatic walker process may not detect a closed caseexplanation of virusnames:==========================unknown_html_RFI_php not yet detected by scanners as RFI, but pure php code for injectionunknown_html_RFI_perl not yet detected by scanners as RFI, but pure perl code for injectionunknown_html_RFI_eval not yet detected by scanners as RFI, but suspect javascript obfuscationg evalsunknown_html_RFI not yet detected by scanners as RFI, but trapped by our honeypots as remote-code-injectionunknown_html not yet detected by scanners as RFI, but suspious, may be in rare case false positiveunknown_exe not yet detected by scanners as malware, but high risk!all other names malwarename detected by scanners==========================yoursGerhard W. Recher(Geschäftsführer)NETpilot GmbHWilhelm-Riehl-Str. 13D-80687 MünchenTel: ++49 89 547182 0Fax: ++49 89 547182 33GSM: ++49 171 4802507Handelsregister München: HRB 124497w3: http://www.clean-mx.dee-Mail: mailto:abuse@clean-mx.dePGP-KEY: Fingerprint: A4E317B6DC6494DCC9616366A75AB34CDD0CE552 id: 0xDD0CE552Location: http://www.clean-mx.de/downloads/abuse-at-clean-mx.de.pub.asc
Hi. This is the qmail-send program at inmail.gabia.com.I'm afraid I wasn't able to deliver your message to the following addresses.This is a permanent error; I've given up. Sorry it didn't work out.<liy@gabia.com>:Sorry, no mailbox here by that name. (#5.1.1)--- Below this line is a copy of the message.Return-Path: <abuse@clean-mx.de>Received: (hhosting 30629 invoked by uid 99); 29 Jul 2010 20:42:53 +0900(KST)Delivered-To: security@gabia.comReceived: (hhosting 21999 invoked from network); 29 Jul 2010 20:33:29 +0900(KST)Received: from unknown (HELO gabia-spamzone.gabia.com) (121.254.168.150) by 0 (qmail 1.03 + ejcp) with SMTP; 29 Jul 2010 20:33:29 +0900(KST)Received: from unknown (HELO relayn.netpilot.net) (62.67.240.20) by 121.254.168.150 with SMTP; 29 Jul 2010 20:32:03 +0900X-Original-SENDERIP: 62.67.240.20X-Original-MAILFROM: abuse@clean-mx.deReceived: from relayn.netpilot.net (localhost [127.0.0.1]) by relayn.netpilot.net (Postfix) with ESMTP id EC4791EB003F for <security@gabia.com>; Thu, 29 Jul 2010 13:33:25 +0200 (CEST)DKIM-Signature: v=1; a=rsa-sha1; c=simple; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; s=sel; bh=yT l9r0Gij7OQIWHyXd0y145gjSY=; b=bweDZXFjTaQd0jstdWux941Gf2zQGFywcV gvwrW63CPfOEIfELhFyI4PHy8/OPmFTRVsq67o9pUEl3giXI58CBrbZZLDezIhdR atXabB2wP3Xrf8bQS7qHRUNxt8uoUuALDaTtIYzwIIeQCwrZQhJ1AX+4AJOeJGVN hGdcSo1gg=DomainKey-Signature: a=rsa-sha1; c=nofws; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; q=dns; s=sel; b= EIMqJSzadtDq82FlcOGsT7/0QOLt12dwGnbqsDFPx0HIrTEby6X0dXmGviRWSn33 Hhxsu+Zvm41JlG2wHqUwjagKpNKtSoByNbvNzWRFu3jIatkAl8sHJYdBgWRZ0NO9 y1TzTjZQg5HADiglUTeJRPlZwqTCzo/my8MWrA6Kk8U=Received: from dbserv.netpilot.net (unknown [195.214.79.22]) by localhost (Postfix) with ESMTP id DBFA21EB0047 for <security@gabia.com>; Thu, 29 Jul 2010 11:33:25 +0000 (UTC)From: abuse@clean-mx.deto: security@gabia.comSubject: [clean-mx-viruses-368972](121.254.177.220)-->(security@gabia.com) viruses sites (1 so far) within your network, please close them! status: As of 2010-07-29 13:29:14 CESTPrecedence: bulkMIME-Version: 1.0X-Mailer: clean mx secure mailerX-Virus-Scanned: by netpilot GmbH at clean-mx.deMessage-Id: <20100729.1280402954@dbserv.netpilot.net>Date: Thu, 29 Jul 2010 13:29:14 +0200content-Type: multipart/signed; boundary="----------=_1280403205-25182-10823"; micalg="pgp-sha1"; protocol="application/pgp-signature"This is a multi-part message in MIME format.It has been signed conforming to RFC3156.Produced by clean-mx transparent crypt gateway.Version: 2.01.0619 http://www.clean-mx.deYou need GPG to check the signature.------------=_1280403205-25182-10823Content-type: multipart/mixed; boundary="----=_NextPart"This is a multi-part message in MIME format.------=_NextPartContent-Type: text/plain; charset="iso-8859-1"Dear abuse team,please help to close these offending viruses sites(1) so far.status: As of 2010-07-29 13:29:14 CESThttp://support.clean-mx.de/clean-mx/viruses.php?email=security@gabia.com&response=alive(for full uri, please scroll to the right end ... We detected many active cases dated back to 2007, so please look at the date column below.You may also subscribe to our MalwareWatch list http://lists.clean-mx.com/cgi-bin/mailman/listinfo/viruswatchThis information has been generated out of our comprehensive real time database, tracking worldwide viruses URI'smost likely also affected pages for these ip may be found via passive dns please have a look on these other domains correlated to these ip example: see http://www.bfk.de/bfk_dnslogger.html?query=121.254.177.220 If your review this list of offending site, please do this carefully, pay attention for redirects also!Also, please consider this particular machines may have a root kit installed !So simply deleting some files or dirs or disabling cgi may not really solve the issue !Advice: The appearance of a Virus Site on a server means thatsomeone intruded into the system. The server's owner shoulddisconnect and not return the system into service until anaudit is performed to ensure no data was lost, that all OS andinternet software is up to date with the latest security fixes,and that any backdoors and other exploits left by the intrudersare closed. Logs should be preserved and analyzed and, perhaps,the appropriate law enforcement agencies notified.DO NOT JUST DELETE THE FILES. IF YOU DO NOT FIX THE SECURITYPROBLEM, THEY WILL BE BACK!You may forward my information to law enforcement, CERTs,other responsible admins, or similar agencies.+-----------------------------------------------------------------------------------------------|date |id |virusname |ip |domain |Url|+-----------------------------------------------------------------------------------------------|2010-01-22 00:00:00 CET |368972 |TR/Dldr.Genome.abln |121.254.177.220 |winnerstudy.net |http://file.winnerstudy.net/ipsi_board/wsupporters/1/7812/7812.exe+-----------------------------------------------------------------------------------------------Your email address has been pulled out of whois concerning this offending network block(s).If you are not concerned with anti-fraud measurements, please forward this mail to the next responsible desk available...If you just close(d) these incident(s) please give us a feedback, our automatic walker process may not detect a closed caseexplanation of virusnames:==========================unknown_html_RFI_php not yet detected by scanners as RFI, but pure php code for injectionunknown_html_RFI_perl not yet detected by scanners as RFI, but pure perl code for injectionunknown_html_RFI_eval not yet detected by scanners as RFI, but suspect javascript obfuscationg evalsunknown_html_RFI not yet detected by scanners as RFI, but trapped by our honeypots as remote-code-injectionunknown_html not yet detected by scanners as RFI, but suspious, may be in rare case false positiveunknown_exe not yet detected by scanners as malware, but high risk!all other names malwarename detected by scanners==========================yoursGerhard W. Recher(Geschäftsführer)NETpilot GmbHWilhelm-Riehl-Str. 13D-80687 MünchenTel: ++49 89 547182 0Fax: ++49 89 547182 33GSM: ++49 171 4802507Handelsregister München: HRB 124497w3: http://www.clean-mx.dee-Mail: mailto:abuse@clean-mx.dePGP-KEY: Fingerprint: A4E317B6DC6494DCC9616366A75AB34CDD0CE552 id: 0xDD0CE552Location: http://www.clean-mx.de/downloads/abuse-at-clean-mx.de.pub.asc------=_NextPart--------------=_1280403205-25182-10823Content-Type: application/pgp-signature; name="signature.asc"Content-Disposition: inline; filename="signature.asc"Content-Transfer-Encoding: 7bitContent-Description: Digital Signature-----BEGIN PGP SIGNATURE-----Version: GnuPG v1.4.9 (GNU/Linux)iQEcBAEBAgAGBQJMUWcFAAoJEBTGcx9kwGtzPLsH/3XPM8a9Ejk06uOBaG096Qo2IfIhsKNE+qZ/0aTIFUdIdhf+SfBRVQBdyxaQ8pLpTzy+GiLooXjeXq7ac3VrtNl1INJSw9STvxFv3E46gxtVJeEgbhj1tz6nHfEClWGcwTyY0d2QdPy7YFaJEYk/OmU7SKTC9D944DiSmGcTjCBGeBuVy/x/ZmIdtb/oyxkI3sGagO54BGDJq42CAOTgF6HuCqzxyHRFAdoC1mcGAi227+of3uCb12n/vzn/EBJafpmNx+NKfubgfj7rM7JzMrvzN3rYkJ16lNSXhQk8sKMuMIUTq7b8lTknq83zuaBsXUpHDOy6WS1+wvh3WFfSMCA==UhAz-----END PGP SIGNATURE-----------------=_1280403205-25182-10823--
Hi. This is the deliver program at jltele.com.I'm afraid I wasn't able to deliver your message to the following addresses.This is a permanent error; I've given up. Sorry it didn't work out.ipmgr@jltele.comquota exceed--- Attachment is a copy of the message.[ÕâÊÇ·þÎñÆ÷ jltele.com µÄͶµÝ³ÌÐò·µ»ØµÄÌáÊŸÐÅÏ¢]µœÏÂÁеØÖ·µÄÐÅŒþͶµÝʧ°Ü£¬¶Ô·œ·þÎñÆ÷ÎÞ·šÕý³£œÓÊÜ»òÕߟܟøœÓÊÜÕâ·âÓÊŒþ£¬ÕâÊÇÒ»žöÓÀŸÃÐԵĎíÎ󣬷þÎñÆ÷ÒÑŸ·ÅÆúŒÌÐøÍ¶µÝ¡£ipmgr@jltele.com¶Ô·œ·þÎñÆ÷·µ»ØŽíÎóÌáÊŸ:quota exceed--[žœŒþÊÇÄúËù·¢ËÍÐÅŒþµÄÔŒþ]orig.emlBetreff:[clean-mx-viruses-361740](222.169.224.74)-->(ipmgr@jltele.com) viruses sites (1 so far) within your network, please close them! status: As of 2010-07-29 13:33:06 CESTVon:abuse@clean-mx.deDatum:Thu, 29 Jul 2010 13:33:06 +0200An:ipmgr@jltele.comReceived:(eyou send program); Thu, 29 Jul 2010 19:43:47 +0800Received:from 192.168.66.201 (HELO rf1.jltele.com) (192.168.66.201) by 192.168.66.142 with SMTP; Thu, 29 Jul 2010 19:43:47 +0800Return-Path:<abuse@clean-mx.de>Received:from [62.67.240.20] by [10.10.10.10] with StormMail ESMTP id 47659.11027314; Thu, 29 Jul 2010 19:44:07 +0800 (CST)Received:from relayn.netpilot.net (localhost [127.0.0.1]) by relayn.netpilot.net (Postfix) with ESMTP id 80EFD1EB0044 for <ipmgr@jltele.com>; Thu, 29 Jul 2010 13:46:29 +0200 (CEST)DKIM-Signature:v=1; a=rsa-sha1; c=simple; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; s=sel; bh=wW ePw3oo1YKwgA5YVoD5iQONmis=; b=FaXJxlrhnVUytpI9NWYuYzUwfdn/gTgz5u hYBE52I0ltiTDFAW7fOOjwojp+Mao27g1hj/o1LC4obtlezHL21/nqOKmVgmZYGC WNH4gAWWsRpaJjtHPf/QBAjQFGs9h3L1KV8gDc/+hhGo2MdoAktb3cy0EMQO0E+M NMDy0i+tQ=DomainKey-Signature:a=rsa-sha1; c=nofws; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; q=dns; s=sel; b= fy/sleTf8bXRPueeAFTXHJFOHJnNC9mo6uUWm/7wKIWOs4j+fSGHsYmSk/J5Z6dv scHGFJrgWJnm9QNlx8+UbRZ8raU32f7kCYAaJxfReSFGH+f0xmOLCrzddpb5MugC zaReprRs/kQVmujTWdlROojKRqn5JKLjbdeFqLKNoF0=Received:from dbserv.netpilot.net (unknown [195.214.79.22]) by localhost (Postfix) with ESMTP id 564B61EB00C2 for <ipmgr@jltele.com>; Thu, 29 Jul 2010 11:46:29 +0000 (UTC)Precedence:bulkMIME-Version:1.0X-Mailer:clean mx secure mailerX-Virus-Scanned:by netpilot GmbH at clean-mx.deNachricht-ID:<20100729.1280403186@dbserv.netpilot.net>content-Type:multipart/signed; boundary="----------=_1280403989-25182-13583"; micalg="pgp-sha1"; protocol="application/pgp-signature"Dear abuse team,please help to close these offending viruses sites(1) so far.status: As of 2010-07-29 13:33:06 CESThttp://support.clean-mx.de/clean-mx/viruses.php?email=ipmgr@jltele.com&response=alive(for full uri, please scroll to the right end ... We detected many active cases dated back to 2007, so please look at the date column below.You may also subscribe to our MalwareWatch list http://lists.clean-mx.com/cgi-bin/mailman/listinfo/viruswatchThis information has been generated out of our comprehensive real time database, tracking worldwide viruses URI'smost likely also affected pages for these ip may be found via passive dns please have a look on these other domains correlated to these ip example: see http://www.bfk.de/bfk_dnslogger.html?query=222.169.224.74 If your review this list of offending site, please do this carefully, pay attention for redirects also!Also, please consider this particular machines may have a root kit installed !So simply deleting some files or dirs or disabling cgi may not really solve the issue !Advice: The appearance of a Virus Site on a server means thatsomeone intruded into the system. The server's owner shoulddisconnect and not return the system into service until anaudit is performed to ensure no data was lost, that all OS andinternet software is up to date with the latest security fixes,and that any backdoors and other exploits left by the intrudersare closed. Logs should be preserved and analyzed and, perhaps,the appropriate law enforcement agencies notified.DO NOT JUST DELETE THE FILES. IF YOU DO NOT FIX THE SECURITYPROBLEM, THEY WILL BE BACK!You may forward my information to law enforcement, CERTs,other responsible admins, or similar agencies.+-----------------------------------------------------------------------------------------------|date |id |virusname |ip |domain |Url|+-----------------------------------------------------------------------------------------------|2010-01-18 13:11:21 CET |361740 |Trojan-Clicker.HTML.RemoteScript (v) |222.169.224.74 |haoting.com |http://www.haoting.com/?=dh+-----------------------------------------------------------------------------------------------Your email address has been pulled out of whois concerning this offending network block(s).If you are not concerned with anti-fraud measurements, please forward this mail to the next responsible desk available...If you just close(d) these incident(s) please give us a feedback, our automatic walker process may not detect a closed caseexplanation of virusnames:==========================unknown_html_RFI_php not yet detected by scanners as RFI, but pure php code for injectionunknown_html_RFI_perl not yet detected by scanners as RFI, but pure perl code for injectionunknown_html_RFI_eval not yet detected by scanners as RFI, but suspect javascript obfuscationg evalsunknown_html_RFI not yet detected by scanners as RFI, but trapped by our honeypots as remote-code-injectionunknown_html not yet detected by scanners as RFI, but suspious, may be in rare case false positiveunknown_exe not yet detected by scanners as malware, but high risk!all other names malwarename detected by scanners==========================yoursGerhard W. Recher(Geschäftsführer)NETpilot GmbHWilhelm-Riehl-Str. 13D-80687 MünchenTel: ++49 89 547182 0Fax: ++49 89 547182 33GSM: ++49 171 4802507Handelsregister München: HRB 124497w3: http://www.clean-mx.dee-Mail: mailto:abuse@clean-mx.dePGP-KEY: Fingerprint: A4E317B6DC6494DCC9616366A75AB34CDD0CE552 id: 0xDD0CE552Location: http://www.clean-mx.de/downloads/abuse-at-clean-mx.de.pub.asc
The original message was received at Thu, 29 Jul 2010 06:57:24 -0500from relayn.netpilot.net [62.67.240.20] ----- The following addresses had permanent fatal errors -----<techops@pantherexpress.net> (reason: 591 techops@cdnetworks.com your host [65.61.159.36] is blacklisted by feb.spamlab.com. No mail will be accepted) ----- Transcript of session follows -----... while talking to cdnetworks.com.1.arsmtp.com.:>>> >>> DATA<<< 591 techops@cdnetworks.com your host [65.61.159.36] is blacklisted by feb.spamlab.com. No mail will be accepted554 5.0.0 Service unavailable<<< 554 no valid RCPT address specifiedReporting-MTA: dns; rs11.luxsci.comReceived-From-MTA: DNS; relayn.netpilot.netArrival-Date: Thu, 29 Jul 2010 06:57:24 -0500Original-Recipient: rfc822;techops@pantherexpress.netFinal-Recipient: RFC822; techops@cdnetworks.comAction: failedStatus: 5.0.0Remote-MTA: DNS; cdnetworks.com.1.arsmtp.comDiagnostic-Code: SMTP; 591 techops@cdnetworks.com your host [65.61.159.36] is blacklisted by feb.spamlab.com. No mail will be acceptedLast-Attempt-Date: Thu, 29 Jul 2010 06:57:27 -0500Return-Path: <abuse@clean-mx.de>Received: from relayn.netpilot.net (relayn.netpilot.net [62.67.240.20]) by rs11.luxsci.com (8.13.1/8.13.7) with ESMTP id o6TBvNOX008493 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT) for <techops@pantherexpress.net>; Thu, 29 Jul 2010 06:57:24 -0500Received: from relayn.netpilot.net (localhost [127.0.0.1]) by relayn.netpilot.net (Postfix) with ESMTP id E211C1EB0024 for <techops@pantherexpress.net>; Thu, 29 Jul 2010 13:57:22 +0200 (CEST)DKIM-Signature: v=1; a=rsa-sha1; c=simple; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; s=sel; bh=fz ZYuibLW+aWwKoz1tZTvBy1fOI=; b=jqjwtWqeskuHpm7Hvzcgv0T6HQNb7rTY4N AgRpzfvAsff/BqDWS+enrrYpodF7dzK3afyDYMqEKWolgqAdQPQGbK+2Z1TukRty 59EA5uJ0od7VXsMNc92ELWVL3BFqgXraYyHeFXpBvlhHHJoHLx7YTchSh+RYAYSF BrY/Z6B4c=DomainKey-Signature: a=rsa-sha1; c=nofws; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; q=dns; s=sel; b= GJHD1c9gfkGbGb+tkjIQYRaHTwY7aHg4XIRz8eDPUbwj1+OeY9RHAWc8TCGUh1yt kk+MEKNTDkTe6c84wqkmS8kuXTC+7tFMoNvIocQt0c+xuRR47Z03iCOhxY5pux/j DfDQyEwZS1DXgq4B8mlQEPCDOl8qTRerWXhaKXNTsMg=Received: from dbserv.netpilot.net (unknown [195.214.79.22]) by localhost (Postfix) with ESMTP id CDFA91EB0061 for <techops@pantherexpress.net>; Thu, 29 Jul 2010 11:57:22 +0000 (UTC)From: abuse@clean-mx.deto: techops@pantherexpress.netSubject: [clean-mx-viruses-546800](93.188.130.21)-->(techops@pantherexpress.net) viruses sites (1 so far) within your network, please close them! status: As of 2010-07-29 13:34:59 CESTPrecedence: bulkMIME-Version: 1.0X-Mailer: clean mx secure mailerX-Virus-Scanned: by netpilot GmbH at clean-mx.deMessage-Id: <20100729.1280403299@dbserv.netpilot.net>Date: Thu, 29 Jul 2010 13:34:59 +0200content-Type: multipart/signed; boundary="----------=_1280404642-25182-15341"; micalg="pgp-sha1"; protocol="application/pgp-signature"
This is an automatically generated Delivery Status Notification.Delivery to the following recipients failed. anoriega@prima.com.arReporting-MTA: dns;prima23.prima.localReceived-From-MTA: dns;postino1-hr.prima.com.arArrival-Date: Thu, 29 Jul 2010 09:01:28 -0300Final-Recipient: rfc822;anoriega@prima.com.arAction: failedStatus: 5.1.1Teil 1.2Betreff:[clean-mx-portals-120441](190.228.29.89)-->(anoriega@PRIMA.COM.AR) portals sites (3 so far) within your network, please close them! status: As of 2010-07-29 13:35:31 CESTVon:abuse@clean-mx.deDatum:Thu, 29 Jul 2010 13:35:31 +0200An:anoriega@PRIMA.COM.ARReceived:from postino1-hr.prima.com.ar ([200.42.0.132]) by prima23.prima.local with Microsoft SMTPSVC(6.0.3790.4675); Thu, 29 Jul 2010 09:01:28 -0300Received:(qmail 73027 invoked from network); 29 Jul 2010 12:01:28 -0000Received:from relayn.netpilot.net (62.67.240.20) by postino1.prima.com.ar with SMTP; 29 Jul 2010 12:01:28 -0000Received:from relayn.netpilot.net (localhost [127.0.0.1]) by relayn.netpilot.net (Postfix) with ESMTP id A9CF11EB00B1 for <anoriega@prima.com.ar>; Thu, 29 Jul 2010 14:01:25 +0200 (CEST)DKIM-Signature:v=1; a=rsa-sha1; c=simple; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; s=sel; bh=Ew Mh4mIgvw9r3fTasltoWV/WGiw=; b=thTuZAY4XQmvv5HsgEYQoLLmoA+ub3pjOm tsnzbx7q6BAyNldusVyTUwwqtA8rI7P8v/zy1SGybZKwNqh+bTfNTPfU0Ls4WDl3 ksx4EYDkNezI1O6IqnLw6IiKCBOl8OqX55zfM92Swa0oRxzAdp6TwiMIxCCiwI3k yi9VNMizA=DomainKey-Signature:a=rsa-sha1; c=nofws; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; q=dns; s=sel; b= X5l4O7ji9W9HSYu1Ta+onRtuyjr6CF8h6MWTctCFHm58dXzD6Fh3/WozPFGtwLw3 MWZprgWD0u6JL4bEq7ll5PRe6tOdzNL+6FxpL+alt92Jmm8Gy0GlwLpdUZOqvgVG rMzjs3jaHbAM+HvF7cLsGjuFwmzJ9wkypCrqddSqIDY=Received:from dbserv.netpilot.net (unknown [195.214.79.22]) by localhost (Postfix) with ESMTP id 7620A1EB0004 for <anoriega@prima.com.ar>; Thu, 29 Jul 2010 12:01:25 +0000 (UTC)Precedence:bulkMIME-Version:1.0X-Mailer:clean mx secure mailerX-Virus-Scanned:by netpilot GmbH at clean-mx.deNachricht-ID:<20100729.1280403331@dbserv.netpilot.net>content-Type:multipart/signed; boundary="----------=_1280404885-25182-16015"; micalg="pgp-sha1"; protocol="application/pgp-signature"Return-Path:abuse@clean-mx.deX-OriginalArrivalTime:29 Jul 2010 12:01:28.0890 (UTC) FILETIME=[C6F429A0:01CB2F15]Dear abuse team,please help to close these offending portals sites(3) so far.status: As of 2010-07-29 13:35:31 CESThttp://support.clean-mx.de/clean-mx/portals.php?email=anoriega@PRIMA.COM.AR&response=alive(for full uri, please scroll to the right end ... This information has been generated out of our comprehensive real time database, tracking worldwide portals URI'smost likely also affected pages for these ip may be found via passive dns please have a look on these other domains correlated to these ip example: see http://www.bfk.de/bfk_dnslogger.html?query=190.228.29.89 If your review this list of offending site, please do this carefully, pay attention for redirects also!Also, please consider this particular machines may have a root kit installed !So simply deleting some files or dirs or disabling cgi may not really solve the issue !Advice: The appearance of a Virus Site on a server means thatsomeone intruded into the system. The server's owner shoulddisconnect and not return the system into service until anaudit is performed to ensure no data was lost, that all OS andinternet software is up to date with the latest security fixes,and that any backdoors and other exploits left by the intrudersare closed. Logs should be preserved and analyzed and, perhaps,the appropriate law enforcement agencies notified.DO NOT JUST DELETE THE FILES. IF YOU DO NOT FIX THE SECURITYPROBLEM, THEY WILL BE BACK!You may forward my information to law enforcement, CERTs,other responsible admins, or similar agencies.+-----------------------------------------------------------------------------------------------|date |id |virusname |ip |domain |Url|+-----------------------------------------------------------------------------------------------|2010-06-18 19:47:25 CEST |120441 |unknown_html |190.228.29.89 |alsham-artarabe.com |http://alsham-artarabe.com/k1.html|2010-07-02 18:45:03 CEST |128324 |unknown_html |190.228.29.89 |buenosairesdental.com.ar |http://buenosairesdental.com.ar/rx1.html|2010-07-28 05:45:07 CEST |138342 |unknown_html |190.228.29.89 |elserver.com |http://jiamm.com.ar.elserver.com/rx1.html+-----------------------------------------------------------------------------------------------Your email address has been pulled out of whois concerning this offending network block(s).If you are not concerned with anti-fraud measurements, please forward this mail to the next responsible desk available...If you just close(d) these incident(s) please give us a feedback, our automatic walker process may not detect a closed caseyoursGerhard W. Recher(Geschäftsführer)NETpilot GmbHWilhelm-Riehl-Str. 13D-80687 MünchenTel: ++49 89 547182 0Fax: ++49 89 547182 33GSM: ++49 171 4802507Handelsregister München: HRB 124497w3: http://www.clean-mx.dee-Mail: mailto:abuse@clean-mx.dePGP-KEY: Fingerprint: A4E317B6DC6494DCC9616366A75AB34CDD0CE552 id: 0xDD0CE552Location: http://www.clean-mx.de/downloads/abuse-at-clean-mx.de.pub.asc
Hi. This is the qmail-send program at pop.aviso.ci.I'm afraid I wasn't able to deliver your message to the following addresses.This is a permanent error; I've given up. Sorry it didn't work out.<denis.tiegbe@orange-cit.ci>:Connected to 41.202.66.19 but sender was rejected.Remote host said: 501 Syntax error - Badly formatted address.<cjelen@aviso.ci>:user does not exist, but will deliver to /home/vpopmail/domains/aviso.ci/postmaster/user is over quota--- Below this line is a copy of the message.Return-Path: <abuse@clean-mx.de>Received: (qmail 22705 invoked by uid 513); 29 Jul 2010 11:56:57 -0000Received: from unknown (HELO ultramx.aviso.ci) (213.136.96.5) by 0 with SMTP; 29 Jul 2010 11:56:57 -0000Received-SPF: fail (0: SPF record at netpilot.net does not designate 213.136.96.5 as permitted sender)X-Greylist: delayed 83 seconds by postgrey-1.32 at ultramx; Thu, 29 Jul 2010 11:47:00 GMTReceived: from relayn.netpilot.net (relayn.netpilot.net [62.67.240.20]) by ultramx.aviso.ci (Postfix) with SMTP id 46CFEB41E1 for <cjelen@aviso.ci>; Thu, 29 Jul 2010 11:47:00 +0000 (GMT)Received: from relayn.netpilot.net (localhost [127.0.0.1]) by relayn.netpilot.net (Postfix) with ESMTP id DE2811EB0032 for <cjelen@aviso.ci>; Thu, 29 Jul 2010 13:47:14 +0200 (CEST)DKIM-Signature: v=1; a=rsa-sha1; c=simple; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; s=sel; bh=xB DTER+RjvDuDdlj7ky7tClNFmw=; b=pNs/lLwl6Pg9aOfNyhAEVzpvN4qcflY0dH omkRk/Lp8VjPiLMZ+luqDI+RLe9me7qGQwXMrSR9K+W/0jE7o5PLtX7sSlIwtVok O6ZSYDrYcvAQGmnlYfUnk9iyuglG15L2ZTKT+tgXwIY46JhzPeqChOUGiOuI+R4K 3bwdxnNuY=DomainKey-Signature: a=rsa-sha1; c=nofws; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; q=dns; s=sel; b= r4LPuH7uQNRpBTUwfNQ/9nFbIuaNnMwjKjmONUHUANSxKoJVCM6zWIKZYrV4CFut cgs1ih8Riv1J0k4i4NuSL9txkDBGCk5U+3Ez/7v8k6t9MopwoMVvDpx5C1CJXcTK 2g3ZS4f3rtHX94P+O+JrazLrQKAdgq/a1YmavgQ0Hjk=Received: from dbserv.netpilot.net (unknown [195.214.79.22]) by localhost (Postfix) with ESMTP id B5C731EB0044 for <cjelen@aviso.ci>; Thu, 29 Jul 2010 11:47:14 +0000 (UTC)From: abuse@clean-mx.deto: cjelen@aviso.ciSubject: [clean-mx-viruses-410579](213.136.106.214)-->(cjelen@aviso.ci) viruses sites (1 so far) within your network, please close them! status: As of 2010-07-29 13:33:16 CESTPrecedence: bulkMIME-Version: 1.0X-Mailer: clean mx secure mailerX-Virus-Scanned: by netpilot GmbH at clean-mx.deMessage-Id: <20100729.1280403196@dbserv.netpilot.net>Date: Thu, 29 Jul 2010 13:33:16 +0200content-Type: multipart/signed; boundary="----------=_1280404034-25182-13745"; micalg="pgp-sha1"; protocol="application/pgp-signature"X-AVISO-MailScanner-ID: 46CFEB41E1.A4B2CX-AVISO-MailScanner: Found to be cleanX-AVISO-MailScanner-SpamScore: sX-AVISO-MailScanner-From: abuse@clean-mx.deX-Spam-Status: NoThis is a multi-part message in MIME format.It has been signed conforming to RFC3156.Produced by clean-mx transparent crypt gateway.Version: 2.01.0619 http://www.clean-mx.deYou need GPG to check the signature.------------=_1280404034-25182-13745Content-type: multipart/mixed; boundary="----=_NextPart"This is a multi-part message in MIME format.------=_NextPartContent-Type: text/plain; charset="iso-8859-1"Dear abuse team,please help to close these offending viruses sites(1) so far.status: As of 2010-07-29 13:33:16 CESThttp://support.clean-mx.de/clean-mx/viruses.php?email=cjelen@aviso.ci&response=alive(for full uri, please scroll to the right end ... We detected many active cases dated back to 2007, so please look at the date column below.You may also subscribe to our MalwareWatch list http://lists.clean-mx.com/cgi-bin/mailman/listinfo/viruswatchThis information has been generated out of our comprehensive real time database, tracking worldwide viruses URI'smost likely also affected pages for these ip may be found via passive dns please have a look on these other domains correlated to these ip example: see http://www.bfk.de/bfk_dnslogger.html?query=213.136.106.214 If your review this list of offending site, please do this carefully, pay attention for redirects also!Also, please consider this particular machines may have a root kit installed !So simply deleting some files or dirs or disabling cgi may not really solve the issue !Advice: The appearance of a Virus Site on a server means thatsomeone intruded into the system. The server's owner shoulddisconnect and not return the system into service until anaudit is performed to ensure no data was lost, that all OS andinternet software is up to date with the latest security fixes,and that any backdoors and other exploits left by the intrudersare closed. Logs should be preserved and analyzed and, perhaps,the appropriate law enforcement agencies notified.DO NOT JUST DELETE THE FILES. IF YOU DO NOT FIX THE SECURITYPROBLEM, THEY WILL BE BACK!You may forward my information to law enforcement, CERTs,other responsible admins, or similar agencies.+-----------------------------------------------------------------------------------------------|date |id |virusname |ip |domain |Url|+-----------------------------------------------------------------------------------------------|2010-02-01 00:24:50 CET |410579 |PHP/Pbot.A.9 |213.136.106.214 |213.136.106.214 |http://213.136.106.214/nicci/_private/_cgi_cnf/.loop/.rut2.txt??+-----------------------------------------------------------------------------------------------Your email address has been pulled out of whois concerning this offending network block(s).If you are not concerned with anti-fraud measurements, please forward this mail to the next responsible desk available...If you just close(d) these incident(s) please give us a feedback, our automatic walker process may not detect a closed caseexplanation of virusnames:==========================unknown_html_RFI_php not yet detected by scanners as RFI, but pure php code for injectionunknown_html_RFI_perl not yet detected by scanners as RFI, but pure perl code for injectionunknown_html_RFI_eval not yet detected by scanners as RFI, but suspect javascript obfuscationg evalsunknown_html_RFI not yet detected by scanners as RFI, but trapped by our honeypots as remote-code-injectionunknown_html not yet detected by scanners as RFI, but suspious, may be in rare case false positiveunknown_exe not yet detected by scanners as malware, but high risk!all other names malwarename detected by scanners==========================yoursGerhard W. Recher(Geschäftsführer)NETpilot GmbHWilhelm-Riehl-Str. 13D-80687 MünchenTel: ++49 89 547182 0Fax: ++49 89 547182 33GSM: ++49 171 4802507Handelsregister München: HRB 124497w3: http://www.clean-mx.dee-Mail: mailto:abuse@clean-mx.dePGP-KEY: Fingerprint: A4E317B6DC6494DCC9616366A75AB34CDD0CE552 id: 0xDD0CE552Location: http://www.clean-mx.de/downloads/abuse-at-clean-mx.de.pub.asc------=_NextPart--------------=_1280404034-25182-13745Content-Type: application/pgp-signature; name="signature.asc"Content-Disposition: inline; filename="signature.asc"Content-Transfer-Encoding: 7bitContent-Description: Digital Signature-----BEGIN PGP SIGNATURE-----Version: GnuPG v1.4.9 (GNU/Linux)iQEcBAEBAgAGBQJMUWpCAAoJEBTGcx9kwGtzLIYIAIM6IhNbvKOBwTjYLaEiI+BImSVpMhwBm+F8/tY9Pk+pzY1Q0D09fbtfB767NuG+2Hv657CNjpl/foLV7huaV2TOolWVwNGBsH0URNUuH8sr3bICrehfBByS90mHPa62S4TqUHAOTxC9/gm1kON3LXgiGT90ql9PPfzWtjHVCnuzDakjms+T8VbbT01C56nXefSIDSh1gWNmYgoqk2kzeLd5tOOWPLcFHg83BgGIvCaEB2ZxjSnXN7U4ORRZbu7EGHETdbtmVT20mCmaTZOOXzWvKa9nFpk3HFjIHMPrfklehEpBc7pr6L3xcGZY3noUrhqy8zTKJC4RSUoQeRJ0vhs==Tkzy-----END PGP SIGNATURE-----------------=_1280404034-25182-13745---- Ce message a été vérifié par MailScanner pour des virus ou des polluriels et rien de suspect n'a été trouvé. For all your IT requirements visit: http://www.transtec.co.uk
This is an automatically generated Delivery Status Notification.Delivery to the following recipients failed. abuse@ono.esReporting-MTA: dns;correo.ono.esReceived-From-MTA: dns;antispam01.ono.esArrival-Date: Thu, 29 Jul 2010 14:04:41 +0200Final-Recipient: rfc822;abuse@ono.esAction: failedStatus: 5.7.1X-Display-Name: AbuseTeil 1.2Betreff:[clean-mx-viruses-617004](62.82.102.227)-->(abuse@ono.es) viruses sites (3 so far) within your network, please close them! status: As of 2010-07-29 13:35:58 CESTVon:abuse@clean-mx.deDatum:Thu, 29 Jul 2010 13:35:58 +0200An:abuse@ono.esReceived:from antispam01.ono.es ([172.16.3.19]) by correo.ono.es with Microsoft SMTPSVC(6.0.3790.4675); Thu, 29 Jul 2010 14:04:41 +0200Received:from (unknown [62.67.240.20]) by antispam01.ono.es with smtp id 089a_2ced_1441d2f0_9b1a_11df_a987_0013725c6ca4; Thu, 29 Jul 2010 16:03:35 +0200Received:from relayn.netpilot.net (localhost [127.0.0.1]) by relayn.netpilot.net (Postfix) with ESMTP id 3C7311EB00F6 for <abuse@ono.es>; Thu, 29 Jul 2010 14:04:38 +0200 (CEST)DKIM-Signature:v=1; a=rsa-sha1; c=simple; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; s=sel; bh=ER bl/vF8J2cgaKJEBXSHNPZzWms=; b=MH4iTgIvDaJXV95vUMNzF9qdUkmOkU/gwy wfJqus8/TAGjw1ueKbXEZAFi6Zpjke5iqI4kQ2kHjqjrwWt4Y3TPGwXG3b2uCYtr CnYHhui9puyQlfF5ELCI/te/w48g6yzmgGJrh+P0WqsmqAxzoYS87sb9DHquELB8 PNQ5FylDc=DomainKey-Signature:a=rsa-sha1; c=nofws; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; q=dns; s=sel; b= ZTkAVq1+3XgrJSDRVPjfTYhdwlosKSIdb26ZXRGBR4JzoDNuEAnAZqjsnsI367TM dA3v4ThXf8dik9orNdMqiqppX8S3dEzJiLU1OmEE4pwxDP4qeEUquUpgNAQyyroN UcSiWxJDUfyk7SGYGd+ArjFKtxYJYIVeRMcjDiXVkMg=Received:from dbserv.netpilot.net (unknown [195.214.79.22]) by localhost (Postfix) with ESMTP id 092BF1EB00FC for <abuse@ono.es>; Thu, 29 Jul 2010 12:04:38 +0000 (UTC)Precedence:bulkMIME-Version:1.0X-Mailer:clean mx secure mailerX-Virus-Scanned:by netpilot GmbH at clean-mx.deNachricht-ID:<20100729.1280403358@dbserv.netpilot.net>content-Type:multipart/signed; boundary="----------=_1280405077-25182-16598"; micalg="pgp-sha1"; protocol="application/pgp-signature"X-NAI-Spam-Flag:NOX-NAI-Spam-Level:**X-NAI-Spam-Threshold:4X-NAI-Spam-Score:2X-NAI-Spam-Version:2.2.0.9286 : core <3588> : streams <515234> : uri <637092>Return-Path:abuse@clean-mx.deX-OriginalArrivalTime:29 Jul 2010 12:04:41.0068 (UTC) FILETIME=[398032C0:01CB2F16]Dear abuse team,please help to close these offending viruses sites(3) so far.status: As of 2010-07-29 13:35:58 CESThttp://support.clean-mx.de/clean-mx/viruses.php?email=abuse@ono.es&response=alive(for full uri, please scroll to the right end ... We detected many active cases dated back to 2007, so please look at the date column below.You may also subscribe to our MalwareWatch list http://lists.clean-mx.com/cgi-bin/mailman/listinfo/viruswatchThis information has been generated out of our comprehensive real time database, tracking worldwide viruses URI'smost likely also affected pages for these ip may be found via passive dns please have a look on these other domains correlated to these ip example: see http://www.bfk.de/bfk_dnslogger.html?query=62.82.102.227 If your review this list of offending site, please do this carefully, pay attention for redirects also!Also, please consider this particular machines may have a root kit installed !So simply deleting some files or dirs or disabling cgi may not really solve the issue !Advice: The appearance of a Virus Site on a server means thatsomeone intruded into the system. The server's owner shoulddisconnect and not return the system into service until anaudit is performed to ensure no data was lost, that all OS andinternet software is up to date with the latest security fixes,and that any backdoors and other exploits left by the intrudersare closed. Logs should be preserved and analyzed and, perhaps,the appropriate law enforcement agencies notified.DO NOT JUST DELETE THE FILES. IF YOU DO NOT FIX THE SECURITYPROBLEM, THEY WILL BE BACK!You may forward my information to law enforcement, CERTs,other responsible admins, or similar agencies.+-----------------------------------------------------------------------------------------------We denote domains and url in this fancy way, because your spamfilter will not pass this !If you lower your filter drop us a note to reset this attribute for your email contact!|date |id |virusname |ip |domain |Url|+-----------------------------------------------------------------------------------------------|2010-07-05 22:19:53 CEST |617004 |PHP.Id-30 |62.82.102.227 |_n_u_e_v_o_p_g_c_._e_s |_h_t_t_p_:_/_/_w_w_w_._n_u_e_v_o_p_g_c_._e_s_/_/_i_m_a_g_e_s_/_s_c_._p_d_f|2010-07-07 19:37:12 CEST |617748 |PHP.Agent-4 |62.82.102.227 |_n_u_e_v_o_p_g_c_._e_s |_h_t_t_p_:_/_/_w_w_w_._n_u_e_v_o_p_g_c_._e_s_/_/_i_m_a_g_e_s_/_1_._t_x_t|2010-07-14 20:02:47 CEST |620866 |PHP.Agent-4 |62.82.102.227 |_n_u_e_v_o_p_g_c_._e_s |_h_t_t_p_:_/_/_w_w_w_._n_u_e_v_o_p_g_c_._e_s_/_/_i_m_a_g_e_s_/_e_r_r_o_r+-----------------------------------------------------------------------------------------------Your email address has been pulled out of whois concerning this offending network block(s).If you are not concerned with anti-fraud measurements, please forward this mail to the next responsible desk available...If you just close(d) these incident(s) please give us a feedback, our automatic walker process may not detect a closed caseexplanation of virusnames:==========================unknown_html_RFI_php not yet detected by scanners as RFI, but pure php code for injectionunknown_html_RFI_perl not yet detected by scanners as RFI, but pure perl code for injectionunknown_html_RFI_eval not yet detected by scanners as RFI, but suspect javascript obfuscationg evalsunknown_html_RFI not yet detected by scanners as RFI, but trapped by our honeypots as remote-code-injectionunknown_html not yet detected by scanners as RFI, but suspious, may be in rare case false positiveunknown_exe not yet detected by scanners as malware, but high risk!all other names malwarename detected by scanners==========================yoursGerhard W. Recher(Geschäftsführer)NETpilot GmbHWilhelm-Riehl-Str. 13D-80687 MünchenTel: ++49 89 547182 0Fax: ++49 89 547182 33GSM: ++49 171 4802507Handelsregister München: HRB 124497w3: http://www.clean-mx.dee-Mail: mailto:abuse@clean-mx.dePGP-KEY: Fingerprint: A4E317B6DC6494DCC9616366A75AB34CDD0CE552 id: 0xDD0CE552Location: http://www.clean-mx.de/downloads/abuse-at-clean-mx.de.pub.asc
很抱歉地通知您,邮件无法投递到指定收件人,请先通过其它方式向您的朋友发送信息,以免耽误。Sorry, we were unable to deliver your message to the following address. Please reach him/her through other ways for any emergency . 被退回邮件(Returned Mail):> > 日期(Date): <Thu, 29 Jul 2010 19:41:03 +0800>> > 大小(Size): <353>没有能够发送到以下的收件人:Sorry, we were unable to deliver your message to the following address:<abuse@gddc.com.cn>退信原因(The Reasons For Bounce):<abuse@gddc.com.cn>: host 127.0.0.1[127.0.0.1] said: 550 bounce as<too many mails in the destination mailbox abuse@gddc.com.cn> (in reply to end of DATA command)[clean-mx-viruses-621748](121.12.105.151)-->(abuse@gddc.com.cn) viruses sites (2 so far) within your network, please close them! status: As of 2010-07-29 13:31:48 CEST.emlBetreff:[clean-mx-viruses-621748](121.12.105.151)-->(abuse@gddc.com.cn) viruses sites (2 so far) within your network, please close them! status: As of 2010-07-29 13:31:48 CESTVon:abuse@clean-mx.deDatum:Thu, 29 Jul 2010 13:31:48 +0200An:abuse@gddc.com.cnHMM_SOURCE_IP:10.27.101.1:55130.1639014530HMM_ATTACHE_NUM:0001HMM_SOURCE_TYPE:SMTPReceived:from entas1-mta (unknown [10.27.101.1]) by corp.21cn.com (HERMES) with ESMTP id 9247B3E4014 for <abuse@gddc.com.cn>; Thu, 29 Jul 2010 19:41:03 +0800 (CST)Received:from relayn.netpilot.net([62.67.240.20]) by entas1-mta(Knowledge-based Antispam Gateway 2.129d2(2010-06-30),121.14.129.71) with ESMTP id mx29403.1280403662 for <abuse@gddc.com.cn>; Thu, 29 Jul 2010 19:41:04 +0800 (CST)X-Original-MailFrom:abuse@clean-mx.deReceived:from relayn.netpilot.net (localhost [127.0.0.1]) by relayn.netpilot.net (Postfix) with ESMTP id 9CBF81EB00BD for <abuse@gddc.com.cn>; Thu, 29 Jul 2010 13:40:53 +0200 (CEST)DKIM-Signature:v=1; a=rsa-sha1; c=simple; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; s=sel; bh=Wl v0zJNliZJJZrUNO8AJG25pn/8=; b=cN6jeFJqYdil1rmMOQm7HAM355iY/rFmCU C9Net9Nxby+hFwUEnpT1a3EqAni4L5RQGlcaiTIjp8ierWRZnfpwOrDzOcpvRT+p gXFA3XXD0utzDmTq8mBhbyJXKo7LvJeaDYPpxK1PiBVghlvRFYe4AnaY2HnTfIvD 3ZwnhM/38=DomainKey-Signature:a=rsa-sha1; c=nofws; d=clean-mx.de; h=from:to :subject:mime-version:message-id:date:content-type; q=dns; s=sel; b= NhDoATmSjCER7acxsZUJAjSAZ2QxRsZs5Mb3F8EDa7XLf89HeJ9boiEu25i7iB+g 1hGL+jImmwVqhZExnYPBPVwswfYV9LbzVAcrutf6ST/MV8LzJte7PyGXUMsKiXSP oPFo6tcvh97VSbW1NaB5zFfPxYbA+A7EBBCeaNOtSdQ=Received:from dbserv.netpilot.net (unknown [195.214.79.22]) by localhost (Postfix) with ESMTP id 8155B1EB00E1 for <abuse@gddc.com.cn>; Thu, 29 Jul 2010 11:40:53 +0000 (UTC)Precedence:bulkMIME-Version:1.0X-Mailer:clean mx secure mailerX-Virus-Scanned:by netpilot GmbH at clean-mx.deNachricht-ID:<20100729.1280403108@dbserv.netpilot.net>content-Type:multipart/signed; boundary="----------=_1280403653-25182-12594"; micalg="pgp-sha1"; protocol="application/pgp-signature"Dear abuse team,please help to close these offending viruses sites(2) so far.status: As of 2010-07-29 13:31:48 CESThttp://support.clean-mx.de/clean-mx/viruses.php?email=abuse@gddc.com.cn&response=alive(for full uri, please scroll to the right end ... We detected many active cases dated back to 2007, so please look at the date column below.You may also subscribe to our MalwareWatch list http://lists.clean-mx.com/cgi-bin/mailman/listinfo/viruswatchThis information has been generated out of our comprehensive real time database, tracking worldwide viruses URI'smost likely also affected pages for these ip may be found via passive dns please have a look on these other domains correlated to these ip example: see http://www.bfk.de/bfk_dnslogger.html?query=121.12.105.151 If your review this list of offending site, please do this carefully, pay attention for redirects also!Also, please consider this particular machines may have a root kit installed !So simply deleting some files or dirs or disabling cgi may not really solve the issue !Advice: The appearance of a Virus Site on a server means thatsomeone intruded into the system. The server's owner shoulddisconnect and not return the system into service until anaudit is performed to ensure no data was lost, that all OS andinternet software is up to date with the latest security fixes,and that any backdoors and other exploits left by the intrudersare closed. Logs should be preserved and analyzed and, perhaps,the appropriate law enforcement agencies notified.DO NOT JUST DELETE THE FILES. IF YOU DO NOT FIX THE SECURITYPROBLEM, THEY WILL BE BACK!You may forward my information to law enforcement, CERTs,other responsible admins, or similar agencies.+-----------------------------------------------------------------------------------------------We denote domains and url in this fancy way, because your spamfilter will not pass this !If you lower your filter drop us a note to reset this attribute for your email contact!|date |id |virusname |ip |domain |Url|+-----------------------------------------------------------------------------------------------|2010-07-16 12:40:05 CEST |621748 |JS/Dldr.Agent.biu |121.12.105.151 |_w_a_n_g_q_i_a_o_3_6_5_._c_o_m |_h_t_t_p_:_/_/_w_w_w_._w_a_n_g_q_i_a_o_3_6_5_._c_o_m_/_i_m_g_/_a_d_._h_t_m|2010-07-16 12:40:05 CEST |621749 |Trojan-Downloader.Win32.Small!IK |121.12.105.151 |_w_a_n_g_q_i_a_o_3_6_5_._c_o_m |_h_t_t_p_:_/_/_w_w_w_._w_a_n_g_q_i_a_o_3_6_5_._c_o_m_/_i_m_g_/_s_._e_x_e+-----------------------------------------------------------------------------------------------Your email address has been pulled out of whois concerning this offending network block(s).If you are not concerned with anti-fraud measurements, please forward this mail to the next responsible desk available...If you just close(d) these incident(s) please give us a feedback, our automatic walker process may not detect a closed caseexplanation of virusnames:==========================unknown_html_RFI_php not yet detected by scanners as RFI, but pure php code for injectionunknown_html_RFI_perl not yet detected by scanners as RFI, but pure perl code for injectionunknown_html_RFI_eval not yet detected by scanners as RFI, but suspect javascript obfuscationg evalsunknown_html_RFI not yet detected by scanners as RFI, but trapped by our honeypots as remote-code-injectionunknown_html not yet detected by scanners as RFI, but suspious, may be in rare case false positiveunknown_exe not yet detected by scanners as malware, but high risk!all other names malwarename detected by scanners==========================yoursGerhard W. Recher(Geschäftsführer)NETpilot GmbHWilhelm-Riehl-Str. 13D-80687 MünchenTel: ++49 89 547182 0Fax: ++49 89 547182 33GSM: ++49 171 4802507Handelsregister München: HRB 124497w3: http://www.clean-mx.dee-Mail: mailto:abuse@clean-mx.dePGP-KEY: Fingerprint: A4E317B6DC6494DCC9616366A75AB34CDD0CE552 id: 0xDD0CE552Location: http://www.clean-mx.de/downloads/abuse-at-clean-mx.de.pub.asc