Weird. Did you ask Jim about it?
Weird. Did you ask Jim about it?
I forgot to mention — the sending address for the email was “webmaster@freerepublic.com” and the link in the email does point to FR.
Ignore it, do not respond
Was the password correct?
ID scam, gleaned from your cookie cache.
When you hover over freerepublic.com’s URL in the email does the destination URL match the URL displayed?
Most likely someone with a handle like Bob_G or the like requested the password to be sent, and it pulled up your account instead. It does not offer a verification (Do you mean Bob?) for example before sending. If it finds a match, it mails.
Doubt there’s anything to worry about.
If gleaned password is correct, beware you have a keystroke logger attached to your computer and need to clean your computer and reset all your passwords.
Navy Network Information Center (NNIC)....
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Perhaps some low-level goon at the NSA just having a boring day, so he decides you should be pwned.
I goggled the address: navy cyber forces
You should know how to look at the source text of an email. Anyone can type in (a href=”www.evilsite.com”)http://www.freerepublic.com (/a) in an email.
(Mine is defanged for display purposes).
Someone entered your screen name into our lost password feature. It sends the password for the account to the registered email address, so no harm done. My guess is the someone involved uses “Bob” as a handle on other sites and he was looking to see if he’s already registered here with that name.
Go to whatismyip.com and check what your IP address is.
If it is 138.162.0.42 then you most likely accidently sent yourself a password hint/reminder (clicked forgot my password link.)
Because your username is bob it’s more likely that it was some robot (or human) trying to access your account.
I would
nslookup freerepublic.com
or at least
ping freerepublic.com
and see what IP address you get for freerepublic.com ...
The IP address your PC thinks freerepublic is at should be 209.157.64.200
Just the NSA checking in................
Follow it all the way through and I’ll see y’all later.
http://whois.arin.net/rest/rdns/162.138.in-addr.arpa.
Delegation Name 162.138.in-addr.arpa.
Nameservers UPBD0FDA02.CSD.DISA.MIL
UPHB0FDA06.CSD.DISA.MIL
GUV10M01.MONT.DISA.MIL
UPHB0FDA05.CSD.DISA.MIL
UPBD0FDA01.CSD.DISA.MIL
UTINDO02.CSD.DISA.MIL
GUV10M02.MONT.DISA.MIL
Last Updated 2012-09-25
RESTful Link http://whois.arin.net/rest/rdns/162.138.in-addr.arpa.
See Also Networks with authority over this delegation.
It contained the names and strings of gobbledygook about WHOIS and international such-and-such; I must correct any erroneous information in my account it warned. (what other kind of data will be there? I wondered) A link was provided which was not where I have the account.
But the information it had is public. I have not paid extra to keep it private. Obviously the FR data should be private.
So from time to time I get crap like that.
Bob, you’ve got a common username that someone just clicked the recover password tool. Jim is correct on this. If I were you I would change your associated email address password to something more secure while you’re at it. /Tin foil hat mode - whoever triggered the password tool on the site might already have access to your email and wanted access to your FR account. /end tin foil hat mode.