Marketting Private: Forums Identity Theft Hacking Be aware with this hacking email

  • Creator
  • #27272


    Please be careful when receiving this scam email do not respond to it.<div>


    <div>I am Staff Sgt.Joyce Scranton, an American soldier serving in the US military. I have some amount that I want to move out of ( SYRIA ) which might require your assistance urgently, Can I trust you? email me now, for details as this mail was sent from a discreet email account.</div>

    I wait your response Sgt.Joyce Scranton

    <div>Her email address is</div>

    You can look up on “Sgt Joyce Scranton” on Google, there are plenty anti-scam platforms warning that you mustn’t respond to email from this scammer 😑


    • This discussion was modified 1 year, 7 months ago by  Gavin.

Log in to reply.

Original Post
0 of 0 posts June 2018



Established: 1995-06-28

server IP Address:

Domain Blacklisted: No

In computing, a blacklist, disallowlist, blocklist, or denylist is a basic access control mechanism that allows through all elements (email addresses, users, …

Suspended site: No

When your website account is suspended, it means the hosting provider has temporarily taken it offline. Website hosts often suspend websites for a myriad of reasons ranging from malware to spam.

Email(MX) configured: yes

Verification that the website has its entity’s proper IMAP (Inbox) and SMTP (Outbox) mailbox servers configured correctly.

DMAR Configured: yes

DMARC is an open email authentication protocol that provides domain-level protection of the email channel. DMARC authentication detects and prevents email spoofing techniques used in phishing, business email compromise (BEC) and other email-based attacks.

SSL Cert Blacklisted No

Hackers have discovered ways to circumvent, alter, or abuse SSL certificates. An SSL certificate blacklist is a list of untrustworthy SSL certificates that have been created and can potentially harm users.

website Popular: No

Risky TLD: No

The TLD (Top Level Domain) are the last characters of an entity’s website name, such as .com, .org, etc. cyber-criminals and threat actors prefer a small set of 25 out of the thousands of available extensions, which accounts for 90% of all malicious sites. A Risky TLD is verification that the domain name is not to be trusted.

Heuristic Pattern: No

If a website uses Heuristics, then it is a scanning method that looks for malware-like behavior patterns. It is commonly used to detect new or not-yet-known malware.

Risky Geolocation: No

Verification to an entity’s geolocation status being labeled as ‘Risky’.

Suspicious Domain: No

Verification the entity’s domain name is not listed its status as “Suspicious”