PHISHING LINK FROM SCAMMER CLAIMING TO BE UBA BANK AND THE IRS.....Subject: UNITED BANK FOR AFRICA - Scamalot

Seen a Scammer? Report Them!

Seen a scammer? Been caught out? Let the world know so they don't get burned. Add information if you see one that's already been logged - scammers move quickly and change details often to avoid detection. Details you log here will be in major search engines within an hour or two.

Please Like, Share, Tweet etc. to spread the word.
  Scam type at Advanced Search      
Scam ReporterScam Tips Received
No Name
Medina, OH, United States
2016-04-26 13:40:48
Identity Theft
PHISHING LINK FROM SCAMMER CLAIMING TO BE UBA BANK AND THE IRS.....Subject: UNITED BANK FOR AFRICA   
 Scammer
  Information
Name:
www.@peace.ocn.ne.jp
Email Address:
ajanaaguleri@gmail.com
Scam Website:
This is from Internal Revenue Service (IRS) We have finally finalized the transfer of your total fund of 15.5 million usd and it will be immediately forwarded to you without any upfront fee because every needed fee have being deducted on the total fund therefore click the above online transfer link here, and feel out your banking details for immediate transfer of your total fund (http://www.iimmpune.in/pagination/45/file.html) then lo-gin your current email address and password then click login now to claim your fund without anymore delay.

Thank you
 Got more information on this Scam/Scammer?
Add to Report
 Problems with this Report? (Spam/Legal/Abuse etc) ?
Report to Scamalot
Curious what information about you is out there? You may be surprised! | Reverse Email Lookup | Reverse Phone Lookup

Increase ad revenue 50-250% with Ezoic
54.225.20.73Array
(
    [CONTEXT_DOCUMENT_ROOT] => /home2/scamalot/public_html
    [CONTEXT_PREFIX] => 
    [DOCUMENT_ROOT] => /home2/scamalot/public_html
    [GATEWAY_INTERFACE] => CGI/1.1
    [HTTPS] => on
    [HTTP_ACCEPT] => text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    [HTTP_ACCEPT_ENCODING] => x-gzip, gzip, deflate
    [HTTP_HOST] => www.scamalot.com
    [HTTP_USER_AGENT] => CCBot/2.0 (http://commoncrawl.org/faq/)
    [HTTP_X_HTTPS] => 1
    [PATH] => /bin:/usr/bin
    [PATH_INFO] => /28197
    [PATH_TRANSLATED] => /home2/scamalot/public_html/ScamTipReports
    [QUERY_STRING] => 
    [REDIRECT_STATUS] => 200
    [REMOTE_ADDR] => 54.225.20.73
    [REMOTE_PORT] => 37440
    [REQUEST_METHOD] => GET
    [REQUEST_SCHEME] => https
    [REQUEST_URI] => /ScamTipReports/28197
    [SCRIPT_FILENAME] => /home2/scamalot/public_html/ScamTipReports
    [SCRIPT_NAME] => /ScamTipReports
    [SCRIPT_URI] => https://www.scamalot.com/ScamTipReports/28197
    [SCRIPT_URL] => /ScamTipReports/28197
    [SERVER_ADDR] => 66.147.230.173
    [SERVER_ADMIN] => webmaster@scamalot.com
    [SERVER_NAME] => www.scamalot.com
    [SERVER_PORT] => 443
    [SERVER_PROTOCOL] => HTTP/1.0
    [SERVER_SIGNATURE] => 
    [SERVER_SOFTWARE] => Apache
    [SSL_TLS_SNI] => www.scamalot.com
    [TZ] => America/Sacramento
    [UNIQUE_ID] => WewHBkKT5osAAF3z2pwAAAAd
    [PHP_SELF] => /ScamTipReports/28197
    [REQUEST_TIME_FLOAT] => 1508640518.24
    [REQUEST_TIME] => 1508640518
    [argv] => Array
        (
        )

    [argc] => 0
)