-
-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
False Positive | https://2m.ma/ar/ #1029
Comments
Verification Required@OMAYMAETTABAI, thank you for submitting a false positive report! To help us verify your ownership of the affected domain(s), please complete the following steps:
Important Notes
How to Check the TXT Record ?You can verify that the TXT record is properly set using:
Thank you for your cooperation! We will address your issue as soon as possible after verification. The Phishing.Database Project Team. |
Dear Phishing.Database Project Team,
I have successfully added the DNS TXT record as requested for domain
verification. Here are the details:
*Record Name:* _phishingdb
*Record Value:* antiphish-0b5bd9ba7eb5dc9a21d9b6a47f0dd312f2ead497
[image: Capture d’écran 2025-01-17 à 11.51.14.png]
Please let me know if any further steps are required on my end.
Best regards,
…On Thu, 16 Jan 2025 at 16:10, Phishing Database ***@***.***> wrote:
Verification Required
@OMAYMAETTABAI <https://github.com/OMAYMAETTABAI>, thank you for
submitting a false positive report! To help us *verify* your ownership of
the affected domain(s), please complete the following steps:
1.
Set a *DNS TXT record* for the domain(s) listed in this issue with the
following details:
- *Record Name*: _phishingdb
- *Record Value*: antiphish-0b5bd9ba7eb5dc9a21d9b6a47f0dd312f2ead497
*Your Verification ID*:
antiphish-0b5bd9ba7eb5dc9a21d9b6a47f0dd312f2ead497
2.
Wait for DNS propagation (this may take a few minutes to a few hours).
3.
Reply to this issue once the TXT record has been set.
Important Notes
- *Verification does not guarantee whitelisting*. The
Phishing.Database team will review your report after verifying ownership,
but the decision to whitelist depends on further investigation and analysis.
- If the record cannot be set or you need alternative methods of
verification, please contact us at ***@***.*** - preferably
from the domain's official email address.
How to Check the TXT Record ?
You can verify that the TXT record is properly set using:
- Online tools like Google's Dig Tool
<https://toolbox.googleapps.com/apps/dig/> or MXToolBox TXT Lookup
<https://mxtoolbox.com/TXTLookup.aspx>.
- The command line:
dig TXT _phishingdb.example.com
Thank you for your cooperation! We will address your issue as soon as
possible after verification.
*The Phishing.Database Project Team.*
—
Reply to this email directly, view it on GitHub
<#1029 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ARYXVYHD7ZIJROIK47YBAC32K7DU5AVCNFSM6AAAAABVJ25MOSVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDKOJVHE4DCNRXGE>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
--
Omayma Ettabai
Chef de Projet Technique
Mobile: +212 668985772 l omaymaettabai@ ***@***.***>gmail.com
|
Dear, I’m following up on my previous message regarding the DNS TXT record verification for https://2m.ma/ar/. Could you kindly let me know if any further steps are needed from my side? Thank you for your attention. Best regards, |
An utterly absurd contradiction, I must say. CloudFlare does not provide security; rather, they do the opposite by decrypting all established connections to harvest personally identifiable information (PII) from your visitors. This action strips them of their fundamental human rights, freedoms, and any semblance of democracy. Before you pen such drivel again and propagate misleading claims that infringe upon human rights, I suggest you take a moment to familiarise yourself with the privacy statements and acceptable use policies in the contracts. I won't go further on this topic until I see a HTTP code 410 or in lack thereof by a misconfiguration in the server 404 curl -IL https://2m.ma/ar
HTTP/2 403
date: Sun, 02 Feb 2025 15:12:42 GMT
content-type: text/html; charset=UTF-8 HTTP 403, can never be other than a, On the best say, this could be down for a split second targeted my request methods. Potentially Inactive Status Codes: https://github.com/Phishing-Database/Phishing.Database?tab=readme-ov-file#potentially-inactive-status-codes HTTP response status codes 410 Gone
|
What are the subjects of the false-positive (domains, URLs, or IPs)?
2m.ma : https://2m.ma/ar/
Why do you believe this is a false-positive?
I believe this is a false-positive because our website, 2m.ma/ar/, is a legitimate news and media platform for the second television channel in Morocco. We have thoroughly reviewed the site, and it does not contain any suspicious content or malware.
How did you discover this false-positive(s)?
VirusTotal
Where did you find this false-positive if not listed above?
N/A
Have you requested a review from other sources?
I have also contacted Cloudflare, which provides security and performance services for our website, to review this false-positive detection. As the site owner, I have conducted a thorough internal review to ensure no malicious content is present.
Do you have a screenshot?
https://drive.google.com/file/d/1k5OUfXPHN4vSAYCjPZdns3HxowYBi8uH/view?usp=sharing
Additional Information or Context
I have also noticed that...
The text was updated successfully, but these errors were encountered: