Jump to content

All Activity

This stream auto-updates

  1. Yesterday
  2. Any email provider worth their salt can whitelist a contact or email sender so it bypasses any and all blocklists they use. Most blocklists hit the IP/s not a email address. whitelisting puts a email address ahead of all IP blocklists.
  3. I prefer downloading my emails using either html raw or an imap client to get the original email that doesn't change all the links to the "outlook protection".
  4. Good luck with that. Last time I checked, Microsoft was using NetRange: 52.96.0.0 - 52.115.255.255 and NetRange: 40.74.0.0 - 40.125.127.255. With their MTA's scattered throughout. What is really needed is for Microsoft to get rid of spammers hosted on their systems.
  5. Last week
  6. Email receivers can easily whitelist any sender email address (sometimes a contact with email provider), which will then bypass any and ALL blocklist that ISP uses.
  7. @Geeksultant & others: The party 'blocking' your mail is *your* email provider. Any good eMail provider will use a weighting mechanism, combing multiple blocklists that, in the preponderance of evidence, results in an 'Accept', 'Warn', or 'Block'. The 'Warning' conditional acceptance is usually by either altering the Subject line (e.g. by adding 'Possible spam') or by sending the eMail to the spam folder. It is up to each individual recipients (your) eMail provider to make this determination. For any blocked messages, you might want to check the status of your current, Microsoft/Outlook eMail MTA: https://whatismyipaddress.com/blacklist-check And, just as a point of reference, here is a count of the 11 spams I have seen in the past half-day: 2 Listed at AUTHBL.dq.spamhaus.net 2 Listed at dnsbl.dronebl.org 3 Listed at b.barracudacentral.org 3 Listed at bl.spamcop.net 3 Listed at cbl.abuseat.org 3 Listed at iadb.isipp.com 4 Listed at SBL-XBL.dq.spamhaus.net 7 Listed at bl.mailspike.net 7 Listed at dnsbl-1.uceprotect.net You will note that SpamCop is right in the middle of the hits count. So don't go blaming an individual BL provider. And that is why a good eMail provider uses multiple BL's in a weighted configuration. If it's only one hit, it's probably not true spam. But more, ???
  8. sounds like porn spam. To attack such porn sites you need to find the registrar, SpamCop doesn't just finds the IP of the Website. If there is no registrar then you need to tell the IP owner, otherwise they cannot act. Also usually these porn sites are phishing for credit cards and blackmail. You need to send a complaint to the Feds if the Site is registered in USA "phishing-report[AT]us-cert[DOT]gov" in windows I use this free program to find a Registrar https://www.gena01.com/win32whois/ Also if porn report as Child abuse most do not have on file the the pictures are over 18 (legal requirement) My boiler plate for Child porn is below, Don't worry about what the registrar may say, this is a matter for the FED's to decide And you have notified the Registrar which means they are then compliant as pedophiles if and when the FED acts. Child porn phishing spammer spammer pictures under 18 or made to look under 18 NO PROOF OF AGE available! SENT TO MINORS 2257 Regulations (C.F.R. Part 75), part of the United States Code of Federal Regulations, require producers of sexually explicit material to obtain proof of age for every model they shoot, and retain those records. Federal inspectors may at any time launch inspections of these records and prosecute any infraction. "unless the websites “perform reasonable age verification methods” — in short, requiring users to show government ID to prove they are 18 or older." No working unsubscribe
  9. Good luck with that, what you going to do about the spam-traps that don't let you know and just bit-bin the listed IP's for maybe months. Also your "clients" can easily whitelist your sender email address, which will bypass any blocklist that ISP uses. Strange that your "clients" are not doing that don't you think? Have you even asked them to? Simple process for a ISP email provider to setup their own spam-trap, a lot more horrifying than SpamCop's SCBL. Already I have a pwned Gmail account which was being flooded by office365, just pushing the "PHISHING" in spam folder and now nothing, Gmail not told anyone but Ofice365 IP are now not even now seen hitting my spam folder. And I don't report them through SpamCop.
  10. I just got some spam in an Outlook account, and so the links in the email had the safelinks.protection.outlook.com stuff that Microsoft adds. I would have expected that SpamCop would ignore that bit, and work on the URL that is the final destination, but that doesn't seem to be the case as the Resolving link obfuscation section of the parser just did https://kor01.safelinks.protection.outlook.com/?url=http%3A%2F%2Ftwingirls.fc2web.com%2Ff.html&data=05%7C02%7C%7Caf6894b1776842d009de08dc4d780dc8%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638470425300444050%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=m6xTFDXrk4S1eM%2Ft8xAI1kBSSdK51Zl6rNiO1D0axZ4%3D&reserved=0 Percent unescape: https://kor01.safelinks.protection.outlook.com/?url=http%3A%2F%2Ftwingirls.fc2web.com%2Ff.html&data=05%7C02%7C%7Caf6894b1776842d009de08dc4d780dc8%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638470425300444050%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=m6xTFDXrk4S1eM%2Ft8xAI1kBSSdK51Zl6rNiO1D0axZ4%3D&reserved=0 Percent unescape: https://kor01.safelinks.protection.outlook.com/?url=http%3A%2F%2Ftwingirls.fc2web.com%2Ff.html&data=05%7C02%7C%7Caf6894b1776842d009de08dc4d780dc8%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638470425300444050%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=m6xTFDXrk4S1eM%2Ft8xAI1kBSSdK51Zl6rNiO1D0axZ4%3D&reserved=0 and then the Tracking link section did https://kor01.safelinks.protection.outlook.com/?url=http%3A%2F%2Ftwingirls.fc2web.com%2Ff.html&data=05%7C02%7C%7Caf6894b1776842d009de08dc4d780dc8%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638470425300444050%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=m6xTFDXrk4S1eM%2Ft8xAI1kBSSdK51Zl6rNiO1D0axZ4%3D&reserved=0 No recent reports, no history available Unescaped: https://kor01.safelinks.protection.outlook.com/?url=http://twingirls.fc2web.com/f.html&data=05|02||af6894b1776842d009de08dc4d780dc8|84df9e7fe9f640afb435aaaaaaaaaaaa|1|0|638470425300444050|unknown|twfpbgzsb3d8eyjwijoimc4wljawmdailcjqijoiv2lumziilcjbtii6ik1hawwilcjxvci6mn0=|0|||&sdata=m6xtfdxrk4s1em/t8xai1kbssdk51zl6rnio1d0axz4=&reserved=0 Host kor01.safelinks.protection.outlook.com (checking ip) = 52.102.12.172 Resolves to 52.102.12.172 Routing details for 52.102.12.172 [refresh/show] Cached whois for 52.102.12.172 : abuse@microsoft.com Using best contacts sewr@senpluspluseop.onmicrosoft.com Microsoft isn't responsible for the likely dodgy site twingirls[dot]fc2web[dot]com, so there doesn't seem to be much point telling them about it, so should I be reporting those links? It would be much more sensible if SpamCop could report to the owner of twingirls[dot]fc2web[dot]com, so is there a reason why it's not doing that? Thanks
  11. SpamCop vs MS.. I see Spamcop losing this battle. Simply put I have clients that have reached out and I have spoken with the clients using Spamcop and most are looking at removing spamcop. When your spamfilter blocks your business emails because it uses a outdated flawed method to block spam it becomes useless. Spamcop is basically making itself useless
  12. Why is it my or for that matter SpamCop's problem that Microsoft365 are allowing masses of fraudster spammers, as well as naïve users to bomb email accounts out of existence? Otherwise known as a DoS attacks most accounts are shut down by the receiving ISP, this has happened to numerous people often destroying their business and income. As I said SpamCop has no control over who uses their BlockList There are other blocklists that are less forgiving than SCBL and won't let the sender know they are blocked. That is what you are complaining about, CISCO and others like I suspect Gmail, Hotmail, Yahoo will not even tell the sender, they just bit-bin their IP/s Most companies selling email accounts set up protection against IP's that DoS attack sometimes whole countries, infact some allow one to block whole countries IP range.
  13. SpamCop is owned by Cisco Systems, Inc. You could have checked the copyright on https://www.spamcop.net/
  14. One thing to note is that the email was voluntarily blocked by the recipient's server. The people receiving the email setup SpamCop's block list on their server. SpamCop didn't directly block the email from O365. If SpamCop were to remove the entry from the block list, the recipient would then add their own that bypasses the Spamcop block list.
  15. "You need to tell your customers that have your free to spammers Microsoft 365 throwaway account IP's getting blocked , for the receiving ISP to stop using the SpamCop Block list" That's a ridiculous statement. Why? Because those of us that are having this issue, of inbound emails that are legitimate from O365, we are not complaining about "Free Throwaway Account Users", but longtime, legitimate O365 corporate users. Many of the emails being blocked, are coming from multi-billion dollar clients and partners of mine, that have thousands, and even tens of thousands of O365 email users/accounts under their domain. They are the ones being blocked by SpamCop because they block entire IPs and subnets, not individual spam emails. I use a product called spam Reader that integrates with my Outlook and filters spam. It does a great job. 99% efficient. It does, once in a while, filter out a legitimate email. But guess what? I can review the spam folder contents, find that email and unblock it. With SpamCop, I have no such ability. It either all or nothing.
  16. Punish the innocent for the actions of the guilty Blocking entire IPs, or subsets of IPs, or ranges of IPs, such as O365 outbound SMTP servers that have a high volume of spam, is not stopping the spam, it's only blocking legitimate emails from those IPs from getting to their legitimate intended recipients. It's akin to my mailman not delivery any of my mail because one of the items is a marketing insert. It's the same as having everyone taking their shoes off at the airport because some idiot 20 years ago tried to use his shoes for something other than their intended purpose. Bulk blocking is not the answer here. Block the emails themselves that are spam, provide the recipient the ability to review said spam, and decided for themselves if it's spam or not. My business is losing thousands of dollars a day by legitimate emails being blocked without recourse to recover those emails. My partners and clients, many use O365, and their email coming into my business are bouncing back because my hosting company uses SpamCop. I've asked, multiple times to be removed from SpamCop, but to no avail. I now have to spend more money to most likely move my email to O365 itself to ensure I don't miss getting emails and possibly legal services to recover what I've lost. Maybe SpamCop is owned by Microsoft and this is a ploy to drum up more O365 customers? Very possible in this crooked world we live in today. My 2 cents worth. Be glad I didn't type out my 10 cents worth.
  17. Earlier
  18. As Lking suggest you are using a Microsoft shared IP for Office365 a spam-trap should not ever confirm or deny that it is being hit! SpamCop AFAIK is the only one that does the vast number of others will not, So it will not be listed only by SpamCop. SpamCop only blocks for 24 hours after spam stops hitting SCBL, the others probably bit-bin after tripped for weeks if not months. You need to make sure your email list is not full of poisoned/spam-trap email addresses. But even if your email address is clean, does not mean others using Office365 shared IP's are Ideally you need to send from a dedicated IP
  19. As can be seen at https://www.spamcop.net/w3m?action=blcheck&ip=40.107.220.133 This is up from 7 hrs shortly after your first post. This means the IP continues to send email to spam traps. No one here can help you fix that. If you do not have a dedicated IP for your outgoing email, that is between you and your ISP.
  20. I love reading all about the spam and prevention techniques. (I'm a geek) We work hard to implement and monitor our email delivery i.e. dkim,sft, delivery reports. and if we were to do any email at scale I would probably setup a subdomain for my campaigns so as to not effect the primary domain rank and primary intake email delivery . but in this case it's our main intake email only that's flagged by spancop. that's what has me puzzled. Thanks for the input.
  21. https://www.spamcop.net/w3m?action=checkblock&ip=40.107.220.133 Causes of listing System has sent mail to SpamCop spam traps in the past week (spam traps are secret, no reports or evidence are provided by SpamCop) SpamCop users have reported system as a source of spam less than 10 times in the past week photo https://ibb.co/0FTk6PQ Microsoft is giving free trials for Microsoft365 Not sure if its spammers using it or naïve beginners learning email marketing? There are numerous "spam traps" out there, SpamCop is the only one that allows one to know its blocked until the spam flood stops. Most Major email providers have their own blocklists generated by placing poisoned email address's on websites, newsgroups, etc. Poisoned email address are obtained/gathered by web BOT's called web spiders scraping off email addresses! They just don't tell you, you are blocked, Bit-Binning or spam bucketing them instead. Don't buy email addresses, learn about double opt-in (MailChimp) and create your own! Learn about spam-traps
  22. Did you follow the link? and see the email was blocked because: Also notice that: If there are no reports of ongoing objectionable email from this system it (your IP) will be delisted automatically in approximately 7 hours. To your request, generally there are two possible causes for the IP address used by your email service being listed on SCBL: 1) Your email list includes addresses scraped from the internet that point to spam traps, or 2) your email service shares an IP address with another users who have sent emails to spam traps. Based on your post, your client uses an email service which uses SCBL to filter their incoming email. If your client wishes to receive your email in spite of being listed as a source of spam, they may be able to white list the IP address used by your email service. It is strongly suggested that you scrub your email list to assure only double-opt-in email addresses are included. After assuring you are not sending spam talk to your ISP to avoid sharing an out going IP with others who do send spam.
  23. Looking for assistance to stop my email from being blocked by spamcop to a single client. I do have additional message header information Response email: mail.rewebdesign.net rejected your message to the following email addresses: info@stepbystep3d.com sending to support@mpembed.com Your message couldn't be delivered because it's suspected of being spam. For best practices when sending email, refer to the guidelines found here: https://aka.ms/EmailingBestPractices. mail.rewebdesign.net gave this error: Decision Engine classified the mail item was rejected because of IP Block (from outbound normal IP pools) -> 554 5.7.1 Service unavailable; Client host [40.107.220.133] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?40.107.220.133
  24. I had missed that he mentioned it being flaky. However, this one seems pretty consistent to me: Every time I've pulled up the tracking URL, SpamCop says it's not routable. However, every time I try to go to the site myself, it redirects me another page that complains about my java scri_pt being disabled. I tried both just before writing this, thinking by now any cached DNS probably expired. It's almost like they're tricking SpamCop somehow, but I don't know if that's possible in this scenario.
  25. Spamcop is using cached whois for 146.19.143.126 : noc@baxet.ru
  26. Here's a link to Mark Monitor webhosting site: "https:// www{DOT}markmonitor{DOT}com/abuse-policy/" They seem legit and even state that you can file a complaint by phone. This will probably be my next step.
  27. Thanks for the info. I ran a lot of them through the Win32whois app and it appears that most all show Registrar Abuse Contact Email: mailto:abusecomplaints@markmonitor.com So I forward all spam email from <randomstring>.onmicrosoft.com to abusecomplaints@markmonitor.com (along with the current email list) and I report them to spam.com and spam.org. I've not seen any reduction in spams yet. Once in a while, perhaps once per week I get a reply from MS stating that the email violated their rules and the account has been eliminated (or something like that). As of today, I'm up to 500 saved spams from MS and 198 spam reports to MS. Am I wasting my time? The most annoying thing is that I get around 3 replies per day from MS and they all say "Send it to junk@office365.microsoft.com". EVERY spam from MS goes to that email address! Are they so stupid that can't determine that? Grrrrrrr!
  28. anyone8, as per Lking mentioned some of these domains are flaky. What I do is to keep the tracking URL and then go back to it a few minutes later to see if SpamCop would pick up the IP. Sometimes waiting and refreshing works for flaky domains.
  1. Load more activity
×
×
  • Create New...