![]() Server : LiteSpeed System : Linux premium84.web-hosting.com 4.18.0-553.44.1.lve.el8.x86_64 #1 SMP Thu Mar 13 14:29:12 UTC 2025 x86_64 User : claqxcrl ( 523) PHP Version : 8.1.32 Disable Function : NONE Directory : /home/claqxcrl/mail/new/ |
Return-Path: <> Delivered-To: claqxcrl@premium84.web-hosting.com Received: from premium84.web-hosting.com by premium84.web-hosting.com with LMTP id UNxEL1ngF2Rami4A54oXFA (envelope-from <>) for <claqxcrl@premium84.web-hosting.com>; Mon, 20 Mar 2023 00:26:01 -0400 Return-path: <> Envelope-to: claqxcrl@premium84.web-hosting.com Delivery-date: Mon, 20 Mar 2023 00:26:01 -0400 Received: from mailnull by premium84.web-hosting.com with local (Exim 4.95) id 1pe75t-00CzMS-Oq for claqxcrl@premium84.web-hosting.com; Mon, 20 Mar 2023 00:26:01 -0400 X-Failed-Recipients: jucianodasilvasilvaa@gmail.com Auto-Submitted: auto-replied From: Mail Delivery System <Mailer-Daemon@premium84.web-hosting.com> To: claqxcrl@premium84.web-hosting.com References: <RZgja6rUcKL4a70V5Cx4qqgXSTjZpenwppfPARhZE@matelopsrp.com> Content-Type: multipart/report; report-type=delivery-status; boundary=1679286361-eximdsn-27253980 MIME-Version: 1.0 Subject: Mail delivery failed: returning message to sender Message-Id: <E1pe75t-00CzMS-Oq@premium84.web-hosting.com> Date: Mon, 20 Mar 2023 00:26:01 -0400 --1679286361-eximdsn-27253980 Content-type: text/plain; charset=us-ascii This message was created automatically by mail delivery software. A message that you sent could not be delivered to one or more of its recipients. This is a permanent error. The following address(es) failed: jucianodasilvasilvaa@gmail.com Message discarded as high-probability spam. You can find how to improve your message score here: https://www.namecheap.com/support/knowledgebase/article.aspx/9984/2216/why-emails-go-to-spam-and-what-to-do/ --1679286361-eximdsn-27253980 Content-type: message/delivery-status Reporting-MTA: dns; premium84.web-hosting.com Action: failed Final-Recipient: rfc822;jucianodasilvasilvaa@gmail.com Status: 5.0.0 --1679286361-eximdsn-27253980 Content-type: message/rfc822 Return-path: <claqxcrl@premium84.web-hosting.com> Received: from claqxcrl by premium84.web-hosting.com with local (Exim 4.95) (envelope-from <claqxcrl@premium84.web-hosting.com>) id 1pe75r-00CzHT-9g for jucianodasilvasilvaa@gmail.com; Mon, 20 Mar 2023 00:25:59 -0400 To: jucianodasilvasilvaa@gmail.com Subject: =?UTF-8?Q?MateloPSRP_"Pedido_de_Servi=C3=A7o"?= X-PHP-Script: matelopsrp.com/index.php for 37.46.113.162, 37.46.113.162 X-PHP-Filename: /home/claqxcrl/matelopsrp.com/index.php REMOTE_ADDR: 37.46.113.162 Date: Mon, 20 Mar 2023 04:25:59 +0000 From: MateloPSRP <admin@matelopsrp.com> Reply-To: hacker@kajakikaszuby.com Message-ID: <RZgja6rUcKL4a70V5Cx4qqgXSTjZpenwppfPARhZE@matelopsrp.com> X-Mailer: PHPMailer 6.6.5 (https://github.com/PHPMailer/PHPMailer) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: <claqxcrl@premium84.web-hosting.com> De: [your-name] <[your-email]> Assunto: Pedido de Serviço | Gestão de Contactos e Relacionamento Corpo da mensagem: We have hacked your website matelopsrp.com and extracted your databases. This was due to the security holes you had in your your site/server which have gained us remote control of pretty much everything that was on the server. Our team is mostly interested in customer, administrative, and employee information which we have extracted through your databases once we got remote control over the server. It still needs to be sorted out but it will be well-organized once finished. First, we will be going through the emails/sms information and contacting the recipient how you held in disregard about their information being exposed to a hacking group when you could have stopped it. This would be detrimental to your personal image with these relationships with these people. Lastly, now that we have information not only will we be monetizing off it with our methods but made public or sold to other people that will do whatever they wish with the information also after we are done. Now you can put a stop to this by paying a $3000 fee (0.11 BTC) in bitcoin to the address 3GYE9gjbYKAKz98UNZr8KeTXMNsKCb5LRX We will be notified of payment which we will then delete the information we have obtained, patch the hole in the site/server which we got in and remove you from any future targeting in the future. You have 72 hours in doing so after viewing this message or the series of steps will commence. You can obtain bitcoin through such services such as paxful.com or do a search on bing.com -- Este email foi enviado por um formulário de contacto em MateloPSRP https://matelopsrp.com --1679286361-eximdsn-27253980--