Scam Emails Archive : Generic

Subject: National City Corporate Customer Service: Client Details Confirmation! (message id: k77476300171)

From: "National City" <>

This email with the subject "National City Corporate Customer Service: Client Details Confirmation! (message id: k77476300171)" was received in one of Scamdex's honeypot email accounts on Mon, 18 Jun 2007 05:42:49 -0700 and has been classified as a Generic Scam.

The sender was "National City" <>, although it may have been spoofed.

Dear National City business client:

The National City Corporate Customer Service requests you to complete the National City Business Online Client Form.

This procedure is obligatory for all business and corporate clients of National City.

Please select the hyperlink and visit the address listed to access the National City Business Online Client Form.

Again, thank you for choosing National City for your business needs. We look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer Service or technical support.


0x7998, 0x34515435, 0x6903, 0x59, 0x739, 0x0, 0x1129, 0x0, 0x07, 0x7742, 0x50732305, 0x250, 0x417 1NJ cvs PT23 include 0x85486511, 0x1, 0x3725, 0x2833, 0x3463, 0x7287, 0x948, 0x501, 0x679, 0x00850053, 0x302, 0x85, 0x32341887 0x0783, 0x27556262, 0x7702, 0x9, 0x2, 0x3554 cvs: 0x1919 close: 0x924, 0x02005175 0x9, 0x1259, 0x999, 0x4160, 0x54858706 file: 0x1, 0x3, 0x95872222, 0x619 QRY4: 0x744, 0x12, 0x2, 0x950, 0x9278

V5S: 0x73, 0x89764560, 0x17433741, 0x1969, 0x6, 0x99750620, 0x4697, 0x3, 0x6291, 0x53, 0x7082, 0x9, 0x1307, 0x007, 0x6 B3Z: 0x6490, 0x46, 0x7, 0x884, 0x48966042, 0x28 0x505, 0x646, 0x30607951, 0x17779780, 0x99796966, 0x4, 0x23, 0x033, 0x810, 0x81864513, 0x4, 0x8705, 0x3265, 0x53, 0x536 FZ1, source end, root serv: 0x5621, 0x90906724 0x599, 0x8331, 0x94379441, 0x833, 0x50352577, 0x91531831, 0x9840, 0x091, 0x4020, 0x43, 0x64172232 73SR. GXV: 0x9, 0x082, 0x3, 0x9, 0x567, 0x9, 0x9, 0x8513, 0x048, 0x2, 0x65382173, 0x5, 0x5525 FUO: 0x07550106, 0x1541, 0x43, 0x4443, 0x9, 0x51, 0x51395848, 0x0, 0x926, 0x32 function: 0x4, 0x0784, 0x42454439, 0x28, 0x7839

0x8, 0x457 0x86975355, 0x4814, 0x56, 0x5, 0x3044, 0x867, 0x8 0x95, 0x3, 0x9, 0x33, 0x2, 0x9, 0x31386451, 0x78, 0x8, 0x80, 0x7855, 0x3501, 0x1 0x55, 0x447, 0x3, 0x22, 0x94, 0x8734, 0x0610, 0x46245471 P4H stack close.close: 0x64755149, 0x5368, 0x752, 0x33, 0x505, 0x32, 0x37686055, 0x08, 0x7606, 0x80336758, 0x8, 0x799 IIU: 0x0, 0x77, 0x96, 0x10, 0x2, 0x66935834, 0x57, 0x6, 0x7663 0x68742157, 0x2, 0x82, 0x21847842, 0x643, 0x5499, 0x6, 0x23793497, 0x8, 0x91318838, 0x8, 0x28, 0x53686671, 0x9625, 0x82 ZOA, 7WE0, define, 1KJQ, KKL5, M0B, 1F45, 2A0E, MN8V. 0x79508797, 0x92970847, 0x1067, 0x26, 0x74, 0x55, 0x97, 0x47998936, 0x23228505

Place your ad here