From: \"Wells Fargo Bank, N.A.\" message.alert@wellsfargo.com; Source IP 166.159.46.132; Subject: Suspicious Transaction Detecte - Scamalot

Seen a Scammer? Report Them!

Seen a scammer? Been caught out? Let the world know so they don't get burned. Add information if you see one that's already been logged - scammers move quickly and change details often to avoid detection. Details you log here will be in major search engines within an hour or two.

Please Like, Share, Tweet etc. to spread the word.
  Scam type at Advanced Search      
Scam ReporterScam Tips Received
No Name
Doncaster, Doncaster, United Kingdom
2013-12-21 11:39:25
Identity Theft
From: "Wells Fargo Bank, N.A." message.alert@wellsfargo.com; Source IP 166.159.46.132; Subject: Suspicious Transaction Detecte   
 Scammer
  Information
Name:
Name Unknown
Email Address:
message.alert@wellsfargo.com
Scam Website:
Wells Fargo Phish sent by message.alert@wellsfargo.com from Host name: 132.sub-166-159-46.myvzw.com ;

Source IP:166.159.46.132 ;
ISP & Organization: Verizon Wireless;
Host Name: 132.sub-166-159-46.myvzw.com ;
Country: United States.
................
body of message:-

\"http://i48.tinypic.com/25u6xrc.gif\"




We have noticed that there have been some unusual activities and
transactions in your account, we at Wells Fargo Security Department would want
you to verify your account details to enable us update your account with the
latest security features available.



We will continue to monitor your account every business day and alert you
if certain activity is detected.



CLICK HERE TO VERIFY AND UPDATE YOUR WELLS FARGO
ACCOUNT


Thank you for your patience as we work together to protect your account




Sincerely,



Wells
Fargo Bank, N.A 







© 2013
Wells Fargo Bank, N.A
, Member FDIC.
converted-space\">                                                    

src=\"https://a248.e.akamai.net/f/248/1856/90m/www.wellsfargo.com/img/hp/al_ehl_house_gen.gi

f\" alt=\"\" width=\"14\" height=\"10\" style=\"font-family: arial, helvetica, sans-serif; border-

top-style: none; border-right-style: none; border-bottom-style: none; border-left-style:

none; border-width: initial; border-color: initial; border-image: initial; padding-top:

0px; padding-right: 5px; padding-bottom: 0px; padding-left: 15px; \">

family: arial, helvetica, sans-serif; color: rgb(0, 0, 0); \">Equal
Housing Lender

 Got more information on this Scam/Scammer?
Add to Report
 Problems with this Report? (Spam/Legal/Abuse etc) ?
Report to Scamalot
Curious what information about you is out there? You may be surprised! | Reverse Email Lookup | Reverse Phone Lookup

Increase ad revenue 50-250% with Ezoic
54.81.178.153Array
(
    [CONTEXT_DOCUMENT_ROOT] => /home2/scamalot/public_html
    [CONTEXT_PREFIX] => 
    [DOCUMENT_ROOT] => /home2/scamalot/public_html
    [GATEWAY_INTERFACE] => CGI/1.1
    [HTTPS] => on
    [HTTP_ACCEPT] => text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    [HTTP_ACCEPT_ENCODING] => x-gzip, gzip, deflate
    [HTTP_HOST] => www.scamalot.com
    [HTTP_USER_AGENT] => CCBot/2.0 (http://commoncrawl.org/faq/)
    [HTTP_X_HTTPS] => 1
    [PATH] => /bin:/usr/bin
    [PATH_INFO] => /15035
    [PATH_TRANSLATED] => /home2/scamalot/public_html/ScamTipReports
    [QUERY_STRING] => 
    [REDIRECT_STATUS] => 200
    [REMOTE_ADDR] => 54.81.178.153
    [REMOTE_PORT] => 54422
    [REQUEST_METHOD] => GET
    [REQUEST_SCHEME] => https
    [REQUEST_URI] => /ScamTipReports/15035
    [SCRIPT_FILENAME] => /home2/scamalot/public_html/ScamTipReports
    [SCRIPT_NAME] => /ScamTipReports
    [SCRIPT_URI] => https://www.scamalot.com/ScamTipReports/15035
    [SCRIPT_URL] => /ScamTipReports/15035
    [SERVER_ADDR] => 66.147.230.173
    [SERVER_ADMIN] => webmaster@scamalot.com
    [SERVER_NAME] => www.scamalot.com
    [SERVER_PORT] => 443
    [SERVER_PROTOCOL] => HTTP/1.0
    [SERVER_SIGNATURE] => 
    [SERVER_SOFTWARE] => Apache
    [SSL_TLS_SNI] => www.scamalot.com
    [TZ] => America/Sacramento
    [UNIQUE_ID] => We2ESEKT5osAADy7AmwAAAAR
    [PHP_SELF] => /ScamTipReports/15035
    [REQUEST_TIME_FLOAT] => 1508738120.26
    [REQUEST_TIME] => 1508738120
    [argv] => Array
        (
        )

    [argc] => 0
)