Lucky Strike Program - Scamalot

Seen a Scammer? Report Them!

Seen a scammer? Been caught out? Let the world know so they don't get burned. Add information if you see one that's already been logged - scammers move quickly and change details often to avoid detection. Details you log here will be in major search engines within an hour or two.

Please Like, Share, Tweet etc. to spread the word.
  Scam type at Advanced Search      
Scam ReporterScam Tips Received
Vesna
Somewhere in Serbia
2012-08-06 14:13:57
Lottery Scam
Lucky Strike Program 
 Scammer
  Information
Name:
Name Unknown
Email Address:
administrator@localhost
Fax:
+44 (0) 844 665 0919
from: You Have Won administrator@localhost
reply-to: claims.grc@fastservice.com
to: do.not.reply.copythisalert@officialmailing.grc.co.uk
date: Tue, Jul 31, 2012 at 8:06 AM
subject: 31-07-2012: Your Alert
mailed-by: gartow.de


Prize Details:
Ref #: GRCUK/WQT73-2012
Batch #: 85GB-7674
Amount: 839,350.00 Pounds Sterling

Where to Claim:
Cheque payment at GRC Claims Center located at:
26, Station Road, Blackpool
Lancashire, FY4 1BE
United Kingdom
Monday to Friday, 8.00am to 4.30pm (excluding Public Holidays).

Please provide the documents given below at the prize claim counter
* A print-out of the alert message received via email
* Signature identification such as a Drivers Licence or Passport
 Got more information on this Scam/Scammer?
Add to Report
 Problems with this Report? (Spam/Legal/Abuse etc) ?
Report to Scamalot
Curious what information about you is out there? You may be surprised! | Reverse Email Lookup | Reverse Phone Lookup

Increase ad revenue 50-250% with Ezoic
54.80.209.254Array
(
    [CONTEXT_DOCUMENT_ROOT] => /home2/scamalot/public_html
    [CONTEXT_PREFIX] => 
    [DOCUMENT_ROOT] => /home2/scamalot/public_html
    [GATEWAY_INTERFACE] => CGI/1.1
    [HTTPS] => on
    [HTTP_ACCEPT] => text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    [HTTP_ACCEPT_ENCODING] => x-gzip, gzip, deflate
    [HTTP_HOST] => www.scamalot.com
    [HTTP_USER_AGENT] => CCBot/2.0 (http://commoncrawl.org/faq/)
    [HTTP_X_HTTPS] => 1
    [PATH] => /bin:/usr/bin
    [PATH_INFO] => /4369
    [PATH_TRANSLATED] => /home2/scamalot/public_html/ScamTipReports
    [QUERY_STRING] => 
    [REDIRECT_STATUS] => 200
    [REMOTE_ADDR] => 54.80.209.254
    [REMOTE_PORT] => 45620
    [REQUEST_METHOD] => GET
    [REQUEST_SCHEME] => https
    [REQUEST_URI] => /ScamTipReports/4369
    [SCRIPT_FILENAME] => /home2/scamalot/public_html/ScamTipReports
    [SCRIPT_NAME] => /ScamTipReports
    [SCRIPT_URI] => https://www.scamalot.com/ScamTipReports/4369
    [SCRIPT_URL] => /ScamTipReports/4369
    [SERVER_ADDR] => 66.147.230.173
    [SERVER_ADMIN] => webmaster@scamalot.com
    [SERVER_NAME] => www.scamalot.com
    [SERVER_PORT] => 443
    [SERVER_PROTOCOL] => HTTP/1.0
    [SERVER_SIGNATURE] => 
    [SERVER_SOFTWARE] => Apache
    [SSL_TLS_SNI] => www.scamalot.com
    [TZ] => America/Sacramento
    [UNIQUE_ID] => WeqfZkKT5osAAFEvOU0AAAA0
    [PHP_SELF] => /ScamTipReports/4369
    [REQUEST_TIME_FLOAT] => 1508548454.55
    [REQUEST_TIME] => 1508548454
    [argv] => Array
        (
        )

    [argc] => 0
)