Jump to content

ronbaby

Members
  • Content Count

    2
  • Joined

  • Last visited

Community Reputation

0 Neutral

About ronbaby

  • Rank
    Newbie
  1. Thank you everyone. All the replies have provided me with good and useful information. I did/do want to know more about each spam that is causing that certain subset of Spamcop BL listings of interest to me, but I see that Senderbase is at least publishing the reverse DNS for the IPs that actually are seen to send something, which is good. I am an information addict however and I'd like to see more, like in particular the "metadata" for the spams that trigger Spamcop BL listings. You know, like in particular the HELO/EHLO strings and the envelope sender addresses, or perhaps at least just the domain part of the envelope sender addresses. But having said that I can well and truly understand how such additional disclosures could perhaps be gamed by spammers as a means of outing Spamcop's spamtraps. And none of us wants that. Well, none of us good guys anyway.
  2. I suppose that this might perhaps be an FAQ, but I haven't been able to find the answer in any of the Spamcop FAQ files I've looked in, so I'll just ask. I would like to check to see if there are any single IPv4 addresses within a given range that are currently listed on the Spamcop blocklist. What is the proper way to do this? Note that I am _not_ either the owner or the administrator of the IP address range in question, but I still do want to get the information for analysis. (No, I am not a spammer. I am an anti- who is trying to do research on certain blocks that I feel are exceptionally "dirty".) Obviously, I could just write a trivial little scri_pt that would generate each of the IP addresses in the range in turn and then I could also write another trivial little scri_pt that would check each one of those individual IP addresses, in turn, against bl.spamcop.net, but that does seem rather horribly inefficient, and if the block is big... say like fer instance a /16 or something like that... then I feel that I would be needlessly taxing Spamcop's DNS resources if I did it this way (which would involve making 65536 separate individual DNS lookups against bl.spamcop.net). So basically, is there a proper, recommended, and _polite_ way of checking an entire block against the blacklist, I mean, ya know, even if the party who wants the info is not the owner of the block in question? Also and separately I'd like to know what additional information Spamcop provides to the general public about individual entries in/on the Spamcop blacklist. Specifically, if I have an address, A.B.C.D and I have checked and seen that it is in fact currently listed on the Spamcop BL, then what information about the causes for that listing can I, an interested third party, get from Spamcop about those causes? Can I see the spam message that caused or or maybe even a redacted version thereof? If so, where and how would I find that?
×