Royal Bank of Scotland Fraud.; verify your account activity;- cpanel.redrangerhosting.com : authenticated_id: abinstan - Scamalot

Seen a Scammer? Report Them!

Seen a scammer? Been caught out? Let the world know so they don't get burned. Add information if you see one that's already been logged - scammers move quickly and change details often to avoid detection. Details you log here will be in major search engines within an hour or two.

Please Like, Share, Tweet etc. to spread the word.
  Scam type at Advanced Search      
Scam ReporterScam Tips Received
No Name
Edinburgh, Edinburgh, United Kingdom
2013-04-22 13:21:30
Identity Theft
Royal Bank of Scotland Fraud.; verify your account activity;- cpanel.redrangerhosting.com : authenticated_id: abinstan 
 Scammer
  Information
Name:
abinstan :authenticated id - cpanel.redrangerhosting.com
Email Address:
info1@rbspersonalbanking.rbs.co.uk
Scam Website:
RBS(Royal Bank of Scotland) Phishing scam sent by User(info1@rbspersonalbanking.rbs.co.uk) of IP 177.23.151.10 (host ns1.speedwebnet.com.br) via server: cpanel.redrangerhosting.com (authenticated_id: abinstan).
Supposed rbs.co.uk link in email redirects to http://www.brigadamirim.com.br/template/js/login.html
(DO NOT CLICK ON LINK)

Source IP: 177.23.151.10 (blacklisted cbl.abuseat.org and xbl.spamhaus.org)
Host Name: ns1.speedwebnet.com.br
ISP & Organization: SpeedWeb Net Telecomunicacoes
Location: Belford Roxo, 21 Rio de Janeiro, Brazil (BR)
 Got more information on this Scam/Scammer?
Add to Report
 Problems with this Report? (Spam/Legal/Abuse etc) ?
Report to Scamalot
Curious what information about you is out there? You may be surprised! | Reverse Email Lookup | Reverse Phone Lookup

Increase ad revenue 50-250% with Ezoic
54.166.232.243Array
(
    [CONTEXT_DOCUMENT_ROOT] => /home2/scamalot/public_html
    [CONTEXT_PREFIX] => 
    [DOCUMENT_ROOT] => /home2/scamalot/public_html
    [GATEWAY_INTERFACE] => CGI/1.1
    [HTTPS] => on
    [HTTP_ACCEPT] => text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    [HTTP_ACCEPT_ENCODING] => x-gzip, gzip, deflate
    [HTTP_HOST] => www.scamalot.com
    [HTTP_USER_AGENT] => CCBot/2.0 (http://commoncrawl.org/faq/)
    [HTTP_X_HTTPS] => 1
    [PATH] => /bin:/usr/bin
    [PATH_INFO] => /9293
    [PATH_TRANSLATED] => /home2/scamalot/public_html/ScamTipReports
    [QUERY_STRING] => 
    [REDIRECT_STATUS] => 200
    [REMOTE_ADDR] => 54.166.232.243
    [REMOTE_PORT] => 50434
    [REQUEST_METHOD] => GET
    [REQUEST_SCHEME] => https
    [REQUEST_URI] => /ScamTipReports/9293
    [SCRIPT_FILENAME] => /home2/scamalot/public_html/ScamTipReports
    [SCRIPT_NAME] => /ScamTipReports
    [SCRIPT_URI] => https://www.scamalot.com/ScamTipReports/9293
    [SCRIPT_URL] => /ScamTipReports/9293
    [SERVER_ADDR] => 66.147.230.173
    [SERVER_ADMIN] => webmaster@scamalot.com
    [SERVER_NAME] => www.scamalot.com
    [SERVER_PORT] => 443
    [SERVER_PROTOCOL] => HTTP/1.0
    [SERVER_SIGNATURE] => 
    [SERVER_SOFTWARE] => Apache
    [SSL_TLS_SNI] => www.scamalot.com
    [TZ] => America/Sacramento
    [UNIQUE_ID] => Weq5qkKT5osAAE6f7EcAAAA3
    [PHP_SELF] => /ScamTipReports/9293
    [REQUEST_TIME_FLOAT] => 1508555178.18
    [REQUEST_TIME] => 1508555178
    [argv] => Array
        (
        )

    [argc] => 0
)