Is comcastbusiness.net Safe?

Untrusted by WOT

Website security score

42%
WOT’s security score is based on our unique technology and community expert reviews.
Is this website claimed?
No
Community reviews
★ 2.5
WOT’s algorithm
49%
Child Safety
N/A

What does the community say?

Leave a review

How would you rate this website from 1 to 5?
starempty-star
starempty-star
starempty-star
starempty-star
starempty-star
Share your feedback and help the communityReviews must consist of at least 15 charactersChoose the tags that best describe this website
Malware or Viruses
Poor customer service
Phishing
Scam
Potentially illegal
Misleading or unethical
Privacy Risk
Suspicious
Hate, discrimination
Spam
Potential unwanted program
Ads / Pop-ups
Adult Content
Incidental nudity
Gruesome or shocking
Cancel
Post Review
2.5
starstarhalf-starempty-starempty-star

Based on 6 reviews

Sort by:
Newest
***** (Comcast Business / comcastbusiness.net sustains IP addresses rated up to "critical" for the amounts of spam sent during a 30 day period. CBL-listed, compromised IP addresses.)
Helpful
Involved in the spreading of an huge quantity of UCE/UBE messages. This domain is infected (or NATting for a computer that is infected) with a spam-sending botnet, most likely Necurs. Necurs generally sends large volumes of Dyre/Dridex/Locky malware, fake pharmaeutical or pornography/dating scams. It was last detected at ***** 06:00 GMT (+/- 30 minutes)
Helpful
☠ Spamvertized STOOGE Site ☛ Spam Distributors, Email Harvesting, Tracking & Redirection. ☛ Site is associated with or sending Mass UCE Spam. ☛ Spammed site pose Possible Illegal Phishing/ID Theft Scams. ☛ Site uses Shortened/Obscured Redirection URLs to HIDE the true web address. ☛ User beware. Do not become their next victim. *<*-*>* The intended and deceitful practice of sending Unsolicited Commercial Email (UCE), Unsolicited Bulk Email (UBE) is not consistent with how a "legitimate and reputable company" would/should do business. *<~>* Common illegal and deceitful practices include: forging the email header, forging the "To" email address, omitting or "munged" the email "To" address and obscuring the website/domain URL (obfuscated the HTML links) and using Shortened URLs to HIDE their true web address. (•ิ_•ิ) Why would you trust a company that needs to knowingly send Illegal Mass UCE Spam? Which of course sounds nothing like how a legitimate and reputable company would/should do business! (•ิ_•ิ) Always remember the basic rules about Scammers/Spammers: ❶ Scammers/Spammers always lie. ❷ If a Scammers/spammer says they aren't lying, see rule 1. ☠ Spamming Stooge Host: hxxp://hnicorp.com ☠ Spamming Stooge Host: hxxp://comcastbusiness.net ☠ Received: from 50-195-72-180-static.hfc.comcastbusiness.net From: ***** ☠ Sent Using IP: *****
1
Every person who has Comcast Business Class as an ISP has a reverse DNS in this range. Apparently, at least 6 of those people are hackers or have set up phishing sites. They should be reported to Comcast, who would almost certainly terminate the accounts and pursue legal action against the offending parties. There's no need to "throw out the baby with the bathwater" and mistrust ALL Comcast ISP customers. That's a bit extreme.
2
Spammers - send spam with phishing emails
3
Hacker Alarm Mar 17 23:24:45 h2094448 postfix/smtpd[30893]: connect from 74-95-89-172-WashingtonDC.hfc.comcastbusiness.net[74.95.89.172] Mar 17 23:24:45 h2094448 postfix/smtpd[30893]: warning: 74-95-89-172-WashingtonDC.hfc.comcastbusiness.net[74.95.89.172]: SASL LOGIN authentication failed: authentication failure Mar 17 23:24:46 h2094448 postfix/smtpd[30893]: warning: 74-95-89-172-WashingtonDC.hfc.comcastbusiness.net[74.95.89.172]: SASL LOGIN authentication failed: authentication failure Mar 17 23:24:46 h2094448 postfix/smtpd[30893]: warning: 74-95-89-172-WashingtonDC.hfc.comcastbusiness.net[74.95.89.172]: SASL LOGIN authentication failed: authentication failure Mar 17 23:24:46 h2094448 postfix/smtpd[30893]: warning: 74-95-89-172-WashingtonDC.hfc.comcastbusiness.net[74.95.89.172]: SASL LOGIN authentication failed: authentication failure Mar 17 23:24:46 h2094448 postfix/smtpd[30893]: warning: 74-95-89-172-WashingtonDC.hfc.comcastbusiness.net[74.95.89.172]: SASL LOGIN authentication failed: authentication failure Mar 17 23:24:47 h2094448 postfix/smtpd[30893]: warning: 74-95-89-172-WashingtonDC.hfc.comcastbusiness.net[74.95.89.172]: SASL LOGIN authentication failed: authentication failure Mar 17 23:24:47 h2094448 postfix/smtpd[30893]: warning: 74-95-89-172-WashingtonDC.hfc.comcastbusiness.net[74.95.89.172]: SASL LOGIN authentication failed: authentication failure Mar 17 23:24:47 h2094448 postfix/smtpd[30893]: disconnect from 74-95-89-172-WashingtonDC.hfc.comcastbusiness.net[74.95.89.172] The next Hacker Attack: Mar 26 13:26:00 h2094448 postfix/smtpd[12736]: connect from 173-162-239-69-NewEngland.hfc.comcastbusiness.net[173.162.239.69] Mar 26 13:26:05 h2094448 postfix/smtpd[12736]: disconnect from 173-162-239-69-NewEngland.hfc.comcastbusiness.net[173.162.239.69] Mar 26 13:26:07 h2094448 postfix/smtpd[12736]: connect from 173-162-239-69-NewEngland.hfc.comcastbusiness.net[173.162.239.69] Mar 26 13:26:07 h2094448 postfix/smtpd[12739]: connect from 173-162-239-69-NewEngland.hfc.comcastbusiness.net[173.162.239.69] Mar 26 13:26:09 h2094448 postfix/smtpd[12740]: connect from 173-162-239-69-NewEngland.hfc.comcastbusiness.net[173.162.239.69] Mar 26 13:26:10 h2094448 postfix/smtpd[12741]: connect from 173-162-239-69-NewEngland.hfc.comcastbusiness.net[173.162.239.69] Mar 26 13:26:11 h2094448 postfix/smtpd[12742]: connect from 173-162-239-69-NewEngland.hfc.comcastbusiness.net[173.162.239.69] Mar 26 13:26:12 h2094448 postfix/smtpd[12736]: warning: 173-162-239-69-NewEngland.hfc.comcastbusiness.net[173.162.239.69]: SASL LOGIN authentication failed: authentication failure Mar 26 13:26:12 h2094448 postfix/smtpd[12744]: connect from 173-162-239-69-NewEngland.hfc.comcastbusiness.net[173.162.239.69] Mar 26 13:26:13 h2094448 postfix/smtpd[12745]: connect from 173-162-239-69-NewEngland.hfc.comcastbusiness.net[173.162.239.69]
3
Check If You’ve Been CompromisedConnect with Google to scan your browsing history.
Connect with Google
As seen on
By signing in, you agree to data collection and use as described in our Terms Of Use and Privacy Policy
alternative-placeholder

About WOT

We reviewed more than 2 Million website and counting. WOT is a lightweight extension designed to help you browse quickly and securely. It will clean your browser, speed it up, and protect your private information.

Is this your website?

Claim your website to access WOT’s business tools and connect with your customers.
Claim This Website
This site uses cookies for analytics and personalization. By continuing, you agree to our cookie policy.
Accept