From "Web-mail Administrator WEB MAIL BETA.......SCAM EMAIL PHISHING FOR EMAIL ACCOUNT PASSWORD. - Scamalot

Seen a Scammer? Report Them!

Seen a scammer? Been caught out? Let the world know so they don't get burned. Add information if you see one that's already been logged - scammers move quickly and change details often to avoid detection. Details you log here will be in major search engines within an hour or two.

Please Like, Share, Tweet etc. to spread the word.
  Scam type at Advanced Search      
Scam ReporterScam Tips Received
No Name
Medina, OH, United States
2016-04-25 13:35:21
Identity Theft
From "Web-mail Administrator WEB MAIL BETA.......SCAM EMAIL PHISHING FOR EMAIL ACCOUNT PASSWORD.   
 Scammer
  Information
Name:
elizondo@infovia.com.ar
Email Address:
officfile288@gmail.com
WARNING!!! Dear E-mail Account Owner,

This is to notify you that you are over your mailbox limit which is
2000MB as default mailbox memory size,you are currently at 1969MB,
your email account will automatically be blocked when memory exceeds
default size.

NOTE: Additional file of 31MB will result in blocking your mailbox.

To re-validate your account kindly ** Reconfirm Below **for additional 2500MB

****************************** *****************
Email User-name
Email Password :::::::
Date of Birth :::::::::::::::
Secret questions:::::::
Secret Answer:::::::::
Country or Territory :
************************ ***************************

IMPORTANT This updating is compulsory as a result of our recent server
changes. If you fail to update your email address you will soon be
unable to receive/send mails

Thanks for your co-operation,
Web-mail Administrator WEB MAIL BETA
 Got more information on this Scam/Scammer?
Add to Report
 Problems with this Report? (Spam/Legal/Abuse etc) ?
Report to Scamalot
Curious what information about you is out there? You may be surprised! | Reverse Email Lookup | Reverse Phone Lookup

Increase ad revenue 50-250% with Ezoic
54.80.148.252Array
(
    [CONTEXT_DOCUMENT_ROOT] => /home2/scamalot/public_html
    [CONTEXT_PREFIX] => 
    [DOCUMENT_ROOT] => /home2/scamalot/public_html
    [GATEWAY_INTERFACE] => CGI/1.1
    [HTTPS] => on
    [HTTP_ACCEPT] => text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    [HTTP_ACCEPT_ENCODING] => x-gzip, gzip, deflate
    [HTTP_HOST] => www.scamalot.com
    [HTTP_USER_AGENT] => CCBot/2.0 (http://commoncrawl.org/faq/)
    [HTTP_X_HTTPS] => 1
    [PATH] => /bin:/usr/bin
    [PATH_INFO] => /28173
    [PATH_TRANSLATED] => /home2/scamalot/public_html/ScamTipReports
    [QUERY_STRING] => 
    [REDIRECT_STATUS] => 200
    [REMOTE_ADDR] => 54.80.148.252
    [REMOTE_PORT] => 34566
    [REQUEST_METHOD] => GET
    [REQUEST_SCHEME] => https
    [REQUEST_URI] => /ScamTipReports/28173
    [SCRIPT_FILENAME] => /home2/scamalot/public_html/ScamTipReports
    [SCRIPT_NAME] => /ScamTipReports
    [SCRIPT_URI] => https://www.scamalot.com/ScamTipReports/28173
    [SCRIPT_URL] => /ScamTipReports/28173
    [SERVER_ADDR] => 66.147.230.173
    [SERVER_ADMIN] => webmaster@scamalot.com
    [SERVER_NAME] => www.scamalot.com
    [SERVER_PORT] => 443
    [SERVER_PROTOCOL] => HTTP/1.0
    [SERVER_SIGNATURE] => 
    [SERVER_SOFTWARE] => Apache
    [SSL_TLS_SNI] => www.scamalot.com
    [TZ] => America/Sacramento
    [UNIQUE_ID] => We1T0EKT5osAAHP9NW0AAAAO
    [PHP_SELF] => /ScamTipReports/28173
    [REQUEST_TIME_FLOAT] => 1508725712.52
    [REQUEST_TIME] => 1508725712
    [argv] => Array
        (
        )

    [argc] => 0
)