Jump to content


  • Content count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About klappa

  • Rank

Recent Profile Visitors

1,226 profile views
  1. klappa

    Spamcop cannot find source IP

    This will never be resolved. I am grateful for the quick replies i get from the Spamcop devs. But this seems to be running into a black hole. I wished i was more experienced like others in this thread but unfortunately i am not.
  2. klappa

    ocn.ad.jp spam

    I too constantly get fed phishing mails from this provider. They always ignore my reports and other as well it seems.
  3. klappa

    Spamcop cannot find source IP

    Does any ISP/Host/CERT organisation take these broken Spamcop reports seriously when one have to break out the Recieve line from the headers and write them down in the comments instead? Greateful for your input! It's very irritating reporting Spamcop using gmail nowadays. This wasn't the case until half a year ago.
  4. klappa

    Spamcop cannot find source IP

    Yea! Spamcop should fix this! Every spam in gmail get's a parsing error.
  5. klappa

    Spamcop cannot find source IP

    After I removed the Received line. Otherwise it wouldn't Parse because of that IPv6 address. I've gotten different sources of spam. The only common denominator is the IPv6 which isn't the same but still a IPv6 address that breaks the parsing.
  6. klappa

    Spamcop cannot find source IP

    Yea it works but does hosting abuse contact or whatever know that i cut the Received line? Those this hinder my report in any way? Should i also cut the Received line when sending to respective country CERT team? See above! Yes of course but are those really spoofed emails? See example further below. Not me either. No IPv6 address. Yea! I find it hard that their spoofed. Spamcop should look into this. This is another example recently. https://www.spamcop.net/sc?id=z6463778214zf147ed5be59ed72799a5c27ca55d9301z
  7. klappa

    Spamcop cannot find source IP

    I've got a dozen of these lately. What should i do. Spamcop can't parse the Received line because of this. I have to manually remove it everytime. How can cutting the spoofed headers make them stop coming? I have been receiving them more and more lately. I think Spamcop can't handle the IPv6 addresses. And by removing that line they will throw the spamcop reports away. Just one example https://www.spamcop.net/sc?id=z6463677494z6787eae14e20923a407b18dde5b5fc64z
  8. klappa

    Spamcop cannot find source IP

    Yea! Still continuing getting this spam with the fake ipv6 address. Now they even faked it in the Received line. Should i snippet out that too and type it in the comment section?
  9. klappa

    Any major event regarding spam?

    There was a big dump with 80million leaked e-mail addresses a few months ago.
  10. klappa

    Spamcop cannot find source IP

    How do i provide the tracking URL? Spamcop won't even process the spam since it can't find the source IP.
  11. Recently i've got several phishing spam e-mails where Spamcop has problem finding the source IP. It has a IPV6 address. Parsing header: host 2002:a17:902:968e:0:0:0:0 (getting name) no name 0: Received: by 2002:a17:902:968e:: with SMTP id n14-v6mr17341432plp.21.1519125092798; Tue, 20 Feb 2018 03:11:32 -0800 (PST) No unique hostname found for source: 2002:a17:902:968e:0:0:0:0 Possible forgery. Supposed receiving system not associated with any of your mailhosts Will not trust this Received line. Mailhost configuration problem, identified internal IP as source Mailhost:Please correct this situation - register every email address where you receive spam No source IP address found, cannot proceed. Here's the full e-mail header. Delivered-To: x Received: by with SMTP id 35csp5053975qgd; Tue, 20 Feb 2018 03:11:32 -0800 (PST) X-Google-Smtp-Source: AH8x224K8EtTlH91SvD5EnHpHEDVS/HuvBrl3NjoqwAlh53HQcCPMB5F6HAiTiutJMNxFVkMaAD8 X-Received: by 2002:a17:902:968e:: with SMTP id n14-v6mr17341432plp.21.1519125092798; Tue, 20 Feb 2018 03:11:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519125092; cv=none; d=google.com; s=arc-20160816; b=zY8+LATQ6rtkMmZafX3BoHX+x9gLlAgJ0JBI60ZSnh3Wzn4DJp2zfSktOPpi65Yq7n SGFg6QDpIgMut9h6rR5roEu+GChwUzy1R6EC8UGQkhz4aqDUhKcMQbYyo/Pj5Ce8bJLk WktKF6lklIAxippTa5FhwFhQlzFGqvGpHL3lySBtiZVpv9EJ4oBxlqDz8h53bSPEDEzF YaRxniWGNETCO/z7524HW5ztD08HWYEczKbLSDW031FYSPZF3K8cPCvK+Ci0z4snimVi aRaqAUG9tNBTg1s7EoWUAEcfL1G+9hNEtT9YoZStToD6i7P59j59S5Bctbk287jiaRz+ Crzg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:subject:message-id:reply-to :from:date:arc-authentication-results; bh=XgHhSVkGXCeZrEbTJfxFlQ+NGi30OMh5lUpaPwhKx/0=; b=NGtXFOsFUxir8lCCaLXCY7k4Tbe6YMhbTGlU7TUD34t++VgyI/KL6Ge/+ZAd4H72yV HGR4TiVpn2y/lHSRtBLOeF9PbxKE+okLkDPw9Zt7l5P/40YJpHelBkgoeC+7DGDtYNCI UdHRUKXxk3midNHI2OZgkz18LYHJ6ZX90BMZMmfaADPfxlxULo1j/mtBzzqV6CzIuRP2 Bd6PIbO9wWp7aCqfyyHCcAvtH13o2Wgn4DK5Znmam0zP56ft5jg+r3Lz9uR4RmdpYF5a I3IyIEKXlHcc32yd2yByMQ1RlWwSr4tFzTfsOJqBNC0ODM46v1lBorXHqalmPtiBWivD s7aA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of www.@royal.ocn.ne.jp designates as permitted sender) smtp.mailfrom=WWW.@royal.ocn.ne.jp Return-Path: <WWW.@royal.ocn.ne.jp> Received: from mbkd0226.ocn.ad.jp (mbkd0226.ocn.ad.jp. []) by mx.google.com with ESMTP id f6si7228610pgn.336.2018.; Tue, 20 Feb 2018 03:11:32 -0800 (PST) Received-SPF: pass (google.com: domain of www.@royal.ocn.ne.jp designates as permitted sender) client-ip=; Authentication-Results: mx.google.com; spf=pass (google.com: domain of www.@royal.ocn.ne.jp designates as permitted sender) smtp.mailfrom=WWW.@royal.ocn.ne.jp Received: from mf-smf-ucb027c3 (mf-smf-ucb027c3.ocn.ad.jp []) by mbkd0226.ocn.ad.jp (Postfix) with ESMTP id 532CDD07339; Tue, 20 Feb 2018 20:11:15 +0900 (JST) Received: from ntt.pod01.mv-mta-ucb022 ([]) by mf-smf-ucb027c3 with ESMTP id o5p9emuQ1jyDio5pKee0FW; Tue, 20 Feb 2018 20:11:15 +0900 Received: from vcwebmail.ocn.ad.jp ([]) by ntt.pod01.mv-mta-ucb022 with id CzBE1x00F2ud8JZ01zBESa; Tue, 20 Feb 2018 11:11:14 +0000 Received: from mzcstore292.ocn.ad.jp (mz-fcb292p.ocn.ad.jp []) by vcwebmail.ocn.ad.jp (Postfix) with ESMTP; Tue, 20 Feb 2018 20:11:14 +0900 (JST) Date: Tue, 20 Feb 2018 20:11:14 +0900 (JST) From: Dr James Wadas <WWW.@royal.ocn.ne.jp> Reply-To: Dr James Wadas <janepilot3@gmail.com> Message-ID: <384029775.6673075.1519125074670.JavaMail.root@royal.ocn.ne.jp> Subject: REPLY TO HER QUICK MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-2022-JP Content-Transfer-Encoding: 7bit X-Originating-IP: [] Urgent Attention This is my second time I am sending you this notification, simply contact jane hillary the pilot with your contact information and your nearest airport to land, so that she can deliver the Package worth ($9.5 Million USD) as she just landed in your country now but misplaced your information, she will give you more details when you re-confirm details. Your personal code to the box is XLA21492014SD. NB indicate this code to the diplomat jane hillary, so that she can know that you are the rightful owner of the box. Contact her with the information listed below Name.... jane hillary Email....(janepilot3@gmail.com) Phone....._(608)7138825 Reconfirm your current information as requested below Beneficiary Name.......... Country................. City..................... Current address........... Nearest airport........... Direct phone number....... I.d copy................ Best regard Dr James Wadas
  12. My housepet spammer which spams me with spam containing sexual date invitations from women (which is obviously fake) never stopss no matter how many spamcop reports i make. The IP's involved never shows on Spamcops blacklists despite being blocked by many other blacklists. In all these years Spamcop have been very bad blocking any IP's involved from any spammer i've reported . Why should i pay for a service which doesn't give me a satisfied service? Doing it manually is one thing but how many reports does it have to take until the IP's involved shows up on Spamcops BL? Regarding the spammer he usually use URL shortening services to hide the real domain, that way Spamcop will never catch the real domain and both domain host and registrar of that domain neglects any responsibility since that domain isn't listed in the spam itself and he can happily continue pestering me and many others with dozens of porn mails per day. Now can anyone incline me to continue using Spamcop?
  13. klappa

    CloudFare Problems

    Cloudflare gets paid big sums of money from the spammers for their illegal activity and as long as they don't get any law enforcement on them they will let spammer continue do his things. You can write to
  14. Many spammers use these services to avoid their domain which they advertises in their spam to be avoided by e-mail reporting services like Spamcop. Is there a way around that other than to manually report the target domains? Recently this spammer i have got has used the bitly services to avoid being caught. Unfortunately bitly never seem to take any action against him no matter how many Spamcop reports i send so he can happily continue using them without being suspended. If i report the target domains to the webhosts running them they often don't take any responsibility. Cloudflare often don't do anything other than to blame they often act as a reverse proxy. It's very frustrating!