-
-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
False Positive | https://www.chaparral.com.au #1025
Comments
Verification Required@Netwizseo, thank you for submitting a false positive report! To help us verify your ownership of the affected domain(s), please complete the following steps:
Important Notes
How to Check the TXT Record ?You can verify that the TXT record is properly set using:
Thank you for your cooperation! We will address your issue as soon as possible after verification. The Phishing.Database Project Team. |
Added the TXT to the DNS.
Please whitelist the domain.
Best Regards,
Netwizard SEO team
Netwizard Design SEO
Ground Floor 215 Bell St, Preston, Victoria 3070
Level 32, 101 Miller Street, North Sydney, NSW 2060
P: 1300 638 949
F: 03 9020 2030 / 02 8355 7360
Email: ***@***.***> ***@***.***
W: <http://www.netwizarddesign.com.au/> www.netwizarddesign.com.au
<http://www.netwizardhosting.com.au/> www.netwizardhosting.com.au
<http://www.netwizardseo.com.au/> www.netwizardseo.com.au
SCAM ALERT: An individual named Simon Brandon is posing as the account person for Netwizard Design & Hosting Australia, and sending fraudulent invoices. He is using these fake emails: ***@***.*** ***@***.***> and ***@***.*** ***@***.***> falsely claiming that our bank account has changed, and offering fake website plans and services.
Our company does not operate in India and we do not have any Indian support person. Any email or domain containing netwizarddesigns.com or netwizarddesigns is not related to our company.
Please be aware that our bank details remain unchanged. We only use our domain-based emails for all financial transactions. If you’re unsure, you may send an email to ***@***.*** ***@***.***> or to ***@***.*** ***@***.***> . For credit card payments over the phone, please contact our main line at 1300 638 949. Stay cautious and report any suspicious activity.
From: Phishing Database ***@***.***>
Sent: Thursday, 16 January 2025 10:44 AM
To: Phishing-Database/Phishing.Database ***@***.***>
Cc: Netwizseo ***@***.***>; Mention ***@***.***>
Subject: Re: [Phishing-Database/Phishing.Database] False Positive | https://www.chaparral.com.au (Issue #1025)
Verification Required
@Netwizseo <https://github.com/Netwizseo> , thank you for submitting a false positive report! To help us verify your ownership of the affected domain(s), please complete the following steps:
1. Set a DNS TXT record for the domain(s) listed in this issue with the following details:
* Record Name: _phishingdb
* Record Value: antiphish-41bee23ea476eb2dc26600833b04294a9f98de55
Your Verification ID: antiphish-41bee23ea476eb2dc26600833b04294a9f98de55
2. Wait for DNS propagation (this may take a few minutes to a few hours).
3. Reply to this issue once the TXT record has been set.
Important Notes
* Verification does not guarantee whitelisting. The Phishing.Database team will review your report after verifying ownership, but the decision to whitelist depends on further investigation and analysis.
* If the record cannot be set or you need alternative methods of verification, please contact us at ***@***.*** ***@***.***> - preferably from the domain's official email address.
How to Check the TXT Record ?
You can verify that the TXT record is properly set using:
* Online tools like Google's Dig Tool <https://toolbox.googleapps.com/apps/dig/> or MXToolBox TXT Lookup <https://mxtoolbox.com/TXTLookup.aspx> .
* The command line:
* dig TXT _phishingdb.example.com
Thank you for your cooperation! We will address your issue as soon as possible after verification.
The Phishing.Database Project Team.
—
Reply to this email directly, view it on GitHub <#1025 (comment)> , or unsubscribe <https://github.com/notifications/unsubscribe-auth/BOIQUDTUSSK5FIW6XUHZ6EL2K4MGXAVCNFSM6AAAAABVISZB7OVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDKOJUGM2TKOBYHE> .
You are receiving this because you were mentioned.Message ID: ***@***.***>
…--
This email has been checked for viruses by AVG antivirus software.
www.avg.com
|
is example.com the false positive?? Update the issue to follow our template, then we move on to the next step note to self (@spirillen)
|
False Positive - https://www.chaparral.com.au
Best Regards,
Netwizard SEO team
Netwizard Design SEO
Ground Floor 215 Bell St, Preston, Victoria 3070
Level 32, 101 Miller Street, North Sydney, NSW 2060
P: 1300 638 949
F: 03 9020 2030 / 02 8355 7360
Email: ***@***.***> ***@***.***
W: <http://www.netwizarddesign.com.au/> www.netwizarddesign.com.au
<http://www.netwizardhosting.com.au/> www.netwizardhosting.com.au
<http://www.netwizardseo.com.au/> www.netwizardseo.com.au
SCAM ALERT: An individual named Simon Brandon is posing as the account person for Netwizard Design & Hosting Australia, and sending fraudulent invoices. He is using these fake emails: ***@***.*** ***@***.***> and ***@***.*** ***@***.***> falsely claiming that our bank account has changed, and offering fake website plans and services.
Our company does not operate in India and we do not have any Indian support person. Any email or domain containing netwizarddesigns.com or netwizarddesigns is not related to our company.
Please be aware that our bank details remain unchanged. We only use our domain-based emails for all financial transactions. If you’re unsure, you may send an email to ***@***.*** ***@***.***> or to ***@***.*** ***@***.***> . For credit card payments over the phone, please contact our main line at 1300 638 949. Stay cautious and report any suspicious activity.
From: spirillen ***@***.***>
Sent: Thursday, 16 January 2025 12:52 PM
To: Phishing-Database/Phishing.Database ***@***.***>
Cc: Netwizseo ***@***.***>; Mention ***@***.***>
Subject: Re: [Phishing-Database/Phishing.Database] False Positive | https://www.chaparral.com.au (Issue #1025)
is example.com the false positive??
image.png (view on web) <https://github.com/user-attachments/assets/514eb419-fe2a-4c8e-b480-c7ead16c7663>
Update the issue to follow our template, then we move on to the next step
—
Reply to this email directly, view it on GitHub <#1025 (comment)> , or unsubscribe <https://github.com/notifications/unsubscribe-auth/BOIQUDXX353V2GEGANAUYZD2K43H5AVCNFSM6AAAAABVISZB7OVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDKOJUGUZTEMRQG4> .
You are receiving this because you were mentioned.Message ID: ***@***.***>
…--
This email has been checked for viruses by AVG antivirus software.
www.avg.com
|
I'll ask you once again to update the issue, to match the requested question. I didn't spend several days building the issue template, because it doesn't matter. It is designed, so you can extract the right data by API calls |
What are the subjects of the false-positive (domains, URLs, or IPs)?
Why do you believe this is a false-positive?
This is a clean website. It is a legal and legitimate carpet manufacturing business operating in Australia. Please remove it from your phishing list.
How did you discover this false-positive(s)?
VirusTotal
Where did you find this false-positive if not listed above?
This is listed in Virus Total
Have you requested a review from other sources?
I have requested a review from...
Do you have a screenshot?
Screenshot
Additional Information or Context
I have also noticed that...
The text was updated successfully, but these errors were encountered: