Jump to content

petzl

Memberp
  • Posts

    2,973
  • Joined

  • Last visited

Posts posted by petzl

  1. On 3/5/2024 at 7:27 AM, DowntownScience said:

    Any chance the block is related to an uptick in spam caused by the new DKIM/DMARC requirements for sending to AOL, Yahoo, Gmail, etc?  I could see messages that weren't seen as spam prior, being seen as spam now and increasing the % of spam messages being sent from an individual IP.

    DMARC Policy & Setup Requirements for Google & Yahoo Email | Proofpoint US

    As a Microsoft Partner and 365 Admin let's not pretend that Microsoft 365 is the only offender here.  We receive more spam from Gmail addresses than anything else.  If Microsoft were to require this same thing you'd see Gmail email servers get shut down as well.

     

    Just remembered there is away to get around SpamCop's blocklist
    That's to ask your clients to whitelist you email address.

    Whitelisting bypasses all spam-blocklists,

    if there is no easy way to do this (there should be) they need to request their email provider to set it up

  2. On 2/28/2024 at 9:12 AM, Foggy said:

    haha thank you @petzl, appreciate your insights in this thread and I will keep them in mind organising clients in regards to the spam lists :)

    Just remembered there is away to get around SpamCop's blocklist
    That's to ask your clients to whitelist you email address.

    Whitelisting bypasses all spam-blocklists,

    if there is no easy way to do this (there should be) they need to request their email provider to set it up

  3. 6 hours ago, olddog55 said:

    Good luck with that.  Last time I checked, Microsoft was using NetRange: 52.96.0.0 - 52.115.255.255 and NetRange: 40.74.0.0 - 40.125.127.255.  With their MTA's scattered throughout. 

    What is really needed is for Microsoft to get rid of spammers hosted on their systems.

     

    Any email provider worth their salt can whitelist a contact or email sender so it bypasses any and all blocklists they use.
    Most blocklists hit the IP/s not a email address.
    whitelisting puts a email address ahead of all IP blocklists.

  4. 12 minutes ago, olddog55 said:

    @Geeksultant & others: The party 'blocking' your mail is *your* email provider.

    Any good eMail provider will use a weighting mechanism, combing multiple blocklists that, in the preponderance of evidence, results in an 'Accept', 'Warn', or 'Block'.  The 'Warning' conditional acceptance is usually by either altering the Subject line (e.g. by adding 'Possible spam') or by sending the eMail to the spam folder.

    It is up to each individual recipients (your) eMail provider to make this determination.

    For any blocked messages, you might want to check the status of your current, Microsoft/Outlook eMail MTA:

    https://whatismyipaddress.com/blacklist-check

    And, just as a point of reference, here is a count of the 11 spams I have seen in the past half-day:

          2 Listed at AUTHBL.dq.spamhaus.net
          2 Listed at dnsbl.dronebl.org
          3 Listed at b.barracudacentral.org
          3 Listed at bl.spamcop.net
          3 Listed at cbl.abuseat.org
          3 Listed at iadb.isipp.com
          4 Listed at SBL-XBL.dq.spamhaus.net
          7 Listed at bl.mailspike.net
          7 Listed at dnsbl-1.uceprotect.net

    You will note that SpamCop is right in the middle of the hits count.  So don't go blaming an individual BL provider.  And that is why a good eMail provider uses multiple BL's in a weighted configuration.  If it's only one hit, it's probably not true spam.  But more, ???

     

    Email receivers can easily whitelist any sender email address (sometimes a contact with email provider),
    which will then bypass any and ALL blocklist that ISP uses.

  5. 4 hours ago, atarspam said:

    I just got some spam in an Outlook account, and so the links in the email had the safelinks.protection.outlook.com stuff that Microsoft adds. 

    I would have expected that SpamCop would ignore that bit, and work on the URL that is the final destination, but that doesn't seem to be the case as the Resolving link obfuscation section of the parser just did

    https://kor01.safelinks.protection.outlook.com/?url=http%3A%2F%2Ftwingirls.fc2web.com%2Ff.html&data=05%7C02%7C%7Caf6894b1776842d009de08dc4d780dc8%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638470425300444050%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=m6xTFDXrk4S1eM%2Ft8xAI1kBSSdK51Zl6rNiO1D0axZ4%3D&reserved=0
       Percent unescape: https://kor01.safelinks.protection.outlook.com/?url=http%3A%2F%2Ftwingirls.fc2web.com%2Ff.html&data=05%7C02%7C%7Caf6894b1776842d009de08dc4d780dc8%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638470425300444050%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=m6xTFDXrk4S1eM%2Ft8xAI1kBSSdK51Zl6rNiO1D0axZ4%3D&reserved=0
       Percent unescape: https://kor01.safelinks.protection.outlook.com/?url=http%3A%2F%2Ftwingirls.fc2web.com%2Ff.html&data=05%7C02%7C%7Caf6894b1776842d009de08dc4d780dc8%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638470425300444050%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=m6xTFDXrk4S1eM%2Ft8xAI1kBSSdK51Zl6rNiO1D0axZ4%3D&reserved=0

    and then the Tracking link section did

    https://kor01.safelinks.protection.outlook.com/?url=http%3A%2F%2Ftwingirls.fc2web.com%2Ff.html&data=05%7C02%7C%7Caf6894b1776842d009de08dc4d780dc8%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C638470425300444050%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=m6xTFDXrk4S1eM%2Ft8xAI1kBSSdK51Zl6rNiO1D0axZ4%3D&reserved=0
    No recent reports, no history available
    Unescaped: https://kor01.safelinks.protection.outlook.com/?url=http://twingirls.fc2web.com/f.html&data=05|02||af6894b1776842d009de08dc4d780dc8|84df9e7fe9f640afb435aaaaaaaaaaaa|1|0|638470425300444050|unknown|twfpbgzsb3d8eyjwijoimc4wljawmdailcjqijoiv2lumziilcjbtii6ik1hawwilcjxvci6mn0=|0|||&sdata=m6xtfdxrk4s1em/t8xai1kbssdk51zl6rnio1d0axz4=&reserved=0
    Host kor01.safelinks.protection.outlook.com (checking ip) = 52.102.12.172
    Resolves to 52.102.12.172
    Routing details for 52.102.12.172
    [refresh/show] Cached whois for 52.102.12.172 : abuse@microsoft.com
    Using best contacts sewr@senpluspluseop.onmicrosoft.com

    Microsoft isn't responsible for the likely dodgy site twingirls[dot]fc2web[dot]com, so there doesn't seem to be much point telling them about it, so should I be reporting those links? 

    It would be much more sensible if SpamCop could report to the owner of twingirls[dot]fc2web[dot]com, so is there a reason why it's not doing that?

    Thanks

    sounds like porn spam. To attack such porn sites you need to find the registrar, SpamCop doesn't just finds the IP of the Website.
    If there is no registrar then you need to tell the IP owner, otherwise they cannot act.
    Also usually these porn sites are phishing for credit cards and blackmail.
    You need to send a complaint to the Feds if the Site is registered in USA "phishing-report[AT]us-cert[DOT]gov"
    in windows I use this free program to find a Registrar  https://www.gena01.com/win32whois/
    Also if porn report as Child abuse most do not have on file the the pictures are over 18 (legal requirement)
    My boiler plate for Child porn is below, Don't worry about what the registrar may say, this is a matter for the FED's to decide
    And you have notified the Registrar which means they are then compliant as pedophiles if and when the FED acts.

    Child porn phishing spammer spammer
    pictures under 18 or made to look under 18
    NO PROOF OF AGE available!
    SENT TO MINORS
    
    2257 Regulations (C.F.R. Part 75), part of the United States Code of Federal Regulations, require producers of sexually explicit material to obtain proof of age for every model they shoot, and retain those records. Federal inspectors may at any time launch inspections of these records and prosecute any infraction.
    
    "unless the websites “perform reasonable age verification methods” — in short, requiring users to show government ID to prove they are 18 or older."
    
    No working unsubscribe

     

  6. 5 hours ago, Just Joe said:

    SpamCop vs MS.. I see Spamcop losing this battle.  

    Simply put I have clients that have reached out and I have spoken with the clients using Spamcop and most are looking at removing spamcop.  When your spamfilter blocks your business emails because it uses a outdated flawed method to block spam it becomes useless.  

    Spamcop is basically making itself useless

    Good luck with that, what you going to do about the spam-traps that don't let you know and just bit-bin the listed IP's for maybe months.
    Also your "clients" can easily whitelist your sender email address, which will bypass any blocklist that ISP uses.
    Strange that your "clients" are not doing that don't you think? Have you even asked them to?
    Simple process for a ISP email provider to setup their own spam-trap, a lot more horrifying than SpamCop's SCBL.
    Already I have a  pwned  Gmail account which was being flooded by office365, just pushing the "PHISHING" in spam folder  and now nothing, Gmail not told anyone but Ofice365 IP are now not even now seen hitting my spam folder. And I don't report them through SpamCop.

  7. 14 hours ago, Geeksultant said:

    "You need to tell your customers that have your free to spammers Microsoft 365 throwaway account IP's getting blocked , for the receiving ISP to stop using the SpamCop Block list"

    That's a ridiculous statement.  Why?  Because those of us that are having this issue, of inbound emails that are legitimate from O365, we are not complaining about "Free Throwaway Account Users", but longtime, legitimate O365 corporate users.  Many of the emails being blocked, are coming from multi-billion dollar clients and partners of mine, that have thousands, and even tens of thousands of O365 email users/accounts under their domain.  They are the ones being blocked by SpamCop because they block entire IPs and subnets, not individual spam emails.  I use a product called spam Reader that integrates with my Outlook and filters spam.  It does a great job.  99% efficient.  It does, once in a while, filter out a legitimate email.  But guess what?  I can review the spam folder contents, find that email and unblock it.  With SpamCop, I have no such ability.  It either all or nothing.

    Why is it my or for that matter SpamCop's problem that Microsoft365 are allowing masses of fraudster spammers, as well as naïve users to bomb email accounts out of existence? 
    Otherwise  known as a DoS attacks most accounts are shut down by the receiving ISP, this has happened to numerous people often destroying their business and income.
    As I said SpamCop has no control over who uses their BlockList
    There are other blocklists that are less forgiving than SCBL and won't let the sender know they are blocked.
    That is what you are complaining about, 
    CISCO and others like I suspect Gmail, Hotmail, Yahoo will not even tell the sender, they just bit-bin their IP/s
    Most companies selling email accounts set up protection against IP's that DoS attack sometimes whole countries, infact some allow one to block whole countries IP range.

  8. 3 hours ago, stepbystep3d said:

    I love reading all about the spam  and prevention techniques. (I'm a geek) We work hard to implement and monitor our email delivery i.e. dkim,sft, delivery reports. and if we were to do any email at scale I would probably setup a subdomain for my campaigns so as to not effect the primary domain rank and primary intake email delivery . but in this case it's our main intake email only that's flagged by spancop. that's what has me puzzled.

    Thanks for the input. :)

    As Lking suggest you are using a Microsoft shared IP for Office365 a spam-trap should not ever confirm or deny that it is being hit!
    SpamCop AFAIK is the only one that does the vast number of others will not, So it will not be listed only by SpamCop.
    SpamCop only blocks for 24 hours after spam stops hitting SCBL, the others probably bit-bin after tripped for weeks if not months.
    You need to make sure your email list is not full of poisoned/spam-trap email addresses.
    But even if your email address is clean, does not mean others using Office365 shared IP's are
    Ideally you need to send from a dedicated IP

  9. 2 hours ago, stepbystep3d said:

    mail.rewebdesign.net gave this error:
    Decision Engine classified the mail item was rejected because of IP Block (from outbound normal IP pools) -> 554 5.7.1 Service unavailable; Client host [40.107.220.133] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?40.107.220.133

    https://www.spamcop.net/w3m?action=checkblock&ip=40.107.220.133 
    Causes of listing
    System has sent mail to SpamCop spam traps in the past week (spam traps are secret, no reports or evidence are provided by SpamCop)
    SpamCop users have reported system as a source of spam less than 10 times in the past week
    photo https://ibb.co/0FTk6PQ
    Microsoft is giving free trials for Microsoft365 
    Not sure if its spammers using it or naïve beginners learning email marketing?
    There are numerous "spam traps" out there, SpamCop is the only one  that allows one to know its blocked until the spam flood stops.
    Most Major email providers have their own blocklists generated by placing poisoned email address's on websites, newsgroups, etc.
    Poisoned email address are obtained/gathered by web BOT's called web spiders scraping off email addresses!
    They just don't tell you, you are blocked, Bit-Binning or spam bucketing them instead.
    Don't buy email addresses, learn about double opt-in (MailChimp) and create your own!
    Learn about spam-trapsSpamCop.thumb.png.dfdc52a7c784bb1c9e73f3bbcf5f09f5.png

  10. Suggest you get a browser app that blocks java maybe that is why my browser couldn't connect?
    Java can be dangerous and load malware/virus
    For Opera I use extension "java scri_pt Switch" with ON|OFF"
    One time you could select "notify before allowing Java"?
    SpamCop URL check would not have java either
     

  11. 1 hour ago, anyone8 said:

    Yeah it tracks the source fine, and a couple Facebook links I didn't think I should report. But there's one it doesn't:

    Tracking link: http://www.[removed].com/
    No recent reports, no history available
    Host www.[removed].com (checking ip) IP not found ; www.[removed].com discarded as fake.
    www.[removed].com is not a routeable IP address
    Cannot resolve http://www.[removed].com/

    I [removed] the domain here so the forum wouldn't possibly link to them, but the full URL is in the tracking, at least when I run it.

    Site appears to of already been removed can't be found
    This site can’t be reached

  12. 21 minutes ago, anyone8 said:

    I guess I don't quite understand, as (after reading your reply) both the tracking URL and simply feeding the questionable link to the parser give me the error I started the thread with ("not routable..."). Are we getting different results from the parser, like maybe I have a bad setting somewhere? Thanks!

    just means that the cache was refreshed
    Tracking message source: 2603:10a6:20b:3ae:0:0:0:22:
    Routing details for 2603:10a6:20b:3ae:0:0:0:22
    [refresh/show] Cached whois for 2603:10a6:20b:3ae:0:0:0:22 : abuse@microsoft.com
    Using best contacts sewr@senpluspluseop.onmicrosoft.com

  13. 4 hours ago, ninth said:

    What happens if the links host is aceville and reg/cert gname are scammer friendly...PTE LTD?

    Cloudflare ns brad and anita are hosting gname but they always reckon they are providing security and network services so not responsible for content and bad behavior...all care and no responsibility.

    If they don't have a registrar, then the IP owner needs to react, would help if you showed who the registrar is.
    Cloudflare though requires a web report for abuse
    https://www.cloudflare.com/trust-hub/reporting-abuse/
    Also what type of spam, porn/Phishing/no working unsubscribe  or all three.
    Then consider adding the countries CERT email to complaint.
    https://www.first.org/members/teams/

  14. On 3/9/2024 at 3:33 AM, A Beachy said:

    We are seeing this issue and our staff are getting very annoyed as numerous valid emails are being blocked.  I realize this is a MS issue, but does anyone have an alternative to SpamCop Block list?

    You need to tell your customers that have your free to spammers Microsoft 365 throwaway account IP's getting blocked , for the receiving ISP to stop using the SpamCop Block list. SpamCop never asked them to.
    While your at it tell Gmail to stop using their secret block list, at lest I suspect they do. as I'm not now getting Microsoft 365 spam not even in spam folder? And this address is PWNED
    (love pulling wings off spammers and if possible facing the courts)
    https://www.microsoft.com/en-au/microsoft-365/try 
    Try Microsoft 365 for free
    Sign up for free. Cancel at any time.

  15. 9 hours ago, spamkiller said:

    What can be done to make this stop? 

    You need to find out the Registrar of URL link in spam 
    I use a free Windows APP to find Registrar.
    Whois  program SpamCop only sends to WEB IP which is often ignored unless it's criminal
    https://www.gena01.com/win32whois/
    Would also help if you could send a SpamCop track, found at top of submission page BEFORE you submit report.

  16. Have your "customers" signed up with Double-Opt-IN?
    Or are you using bought email addresses which has obtained poisoned email addresses by scraping them off the internet?
    SpamCop Blocklist (SCBL) is the choice made by  Email providers who choose to use it, SpamCop have never asked them to.
    Just used by word of mouth, not from SpamCop owners.
    Most Major email providers have their own blocklists generated by placing poisoned email address's on websites, newsgroups, etc.
    They just don't tell you, you are blocked, Bit-Binning or spam bucketing them instead.
    SpamCop Blocklist does tell the recipient that the IP is been blocked and what for.
    https://www.spamcop.net/bl.shtml

  17. 1 hour ago, DowntownScience said:

    Any chance the block is related to an uptick in spam caused by the new DKIM/DMARC requirements for sending to AOL, Yahoo, Gmail, etc? 

    Not when they have been tripped only by SpamCop's blocklist (SCBL) with only the spamtrap!
    SpamCop spam-traps being hit means they are using poisoned email addresses with no owner but the SCBL.
    Obtained by scraping Internet web pages for email address's.
    scraping websites with a "web spider" for email addresses
    Not only SpamCop has poisoned email addresses on WebSites suspect Gmail and others do also

  18. 8 hours ago, Lking said:

    @Luis from your post it is not clear to me if the IP address you gave is your outgoing email IP or the IP of the other party.

    As @gnarlymarley stated someone is reporting that IP as sending spam and as long as the spam/spam reports continue, the reported IP will remain on the SpamCop Block List (SCBL). When the spam stops the IP will automatically be removed from the SCBL. However, if spam resumes the IP will again be added to the SCBL.

    You can see the current status of the IP at https://www.spamcop.net/w3m?action=checkblock&ip=40.107.94.90

    You can see additional information at the link https://www.spamcop.net/spamstats.shtml

    Seems to me  Microsoft are failing or have failed at dealing with spam and  most of their IP's are hitting spamtraps also being reported.
    This appears to be affect the non-spam community who share these IP's?

    40.107.94.90 listed in bl.spamcop.net (127.0.0.2)
    If there are no reports of ongoing objectionable email from this system it will be delisted automatically in approximately 18 hours.
    in the past 14.2 days, it has been listed 6 times for a total of 9.0 days
    Other hosts in this "neighborhood" with spam reports
    40.107.93.91 40.107.93.92 40.107.93.93 40.107.93.94 40.107.93.95 40.107.93.96 40.107.93.97 40.107.93.98 40.107.93.99 40.107.93.100 40.107.93.101 40.107.93.102 40.107.93.103 40.107.93.104 40.107.93.105 40.107.93.106 40.107.93.107 40.107.93.108 40.107.93.109 40.107.93.110 40.107.93.111 40.107.93.112 40.107.93.113 40.107.93.114 40.107.93.115 40.107.93.116 40.107.93.117 40.107.93.118 40.107.93.119 40.107.93.120 40.107.93.121 40.107.93.122 40.107.93.123 40.107.93.124 40.107.93.125 40.107.93.126 40.107.93.127 40.107.93.128 40.107.93.129 40.107.93.130 40.107.93.131 40.107.93.132 40.107.93.133 40.107.93.134 40.107.93.135 40.107.93.136 40.107.93.137 40.107.93.138 40.107.93.139 40.107.94.49 40.107.94.91 40.107.94.92 40.107.94.93 40.107.94.94 40.107.94.95 40.107.94.96 40.107.94.97 40.107.94.98 40.107.94.99 40.107.94.100 40.107.94.101 40.107.94.102 40.107.94.103 40.107.94.104 40.107.94.105 40.107.94.106 40.107.94.107 40.107.94.108 40.107.94.109 40.107.94.110 40.107.94.111 40.107.94.112 40.107.94.113 40.107.94.114 40.107.94.115 40.107.94.116 40.107.94.117 40.107.94.118 40.107.94.119 40.107.94.120 40.107.94.121 40.107.94.122 40.107.94.123 40.107.94.124 40.107.94.125 40.107.94.126 40.107.94.127 40.107.94.128 40.107.94.129 40.107.94.130 40.107.94.131 40.107.94.132 40.107.94.133 40.107.94.134 40.107.94.135 40.107.94.136 40.107.94.137 40.107.94.138 40.107.94.139 40.107.95.75

     

  19. 3 hours ago, Foggy said:

    agreed. on paper in Klaviyo things look good, I just have to take mail-tester with a grain of salt at times, this may be one of those where I have to just wait it out and see if the SPAMCOP powers that be deem this account copacetic in the next few months. :)

    Just explaining how I believe SpamCop blocklist BOT works.
    SpamCops blocklist is a spam radar, it uses a algorithm measure against normal email flow, when spam hits its trip point it activates, when spam stops for 24 hours it turns off.  
    When someone like a Microsoft email IP starts hitting spamtraps it takes a very large number of hits and reports to trip it.

    I believe you have a better clue than me to work out how to remove poisoned/spamtrap email address than me,
    don't help if you have a know all, uncooperative client IMO, so good luck.

  20. 20 hours ago, Too Many Spams said:

    Thank you for replying. Here's one of the many SpamCop links: https://www.spamcop.net/sc?id=z6888219156z7fa83fb0e9e999196d33bbac7bfc6e78z

    Yesterday, I received more than 30 emails from the same spammer! It's really getting out of hand. Microsoft, Namecheap, and Cloudflare have done nothing to stop it. The links within the spam emails keep changing. I pretend to unsubscribe and it all redirects to netkeib.com.

     

    Microsoft email accounts are used by spammers as free throwaway email accounts they renew after each spam run
    You need to concentrate on the web site SpamCop only reports to the IP address which will do nothing unless engaged in illegal activity

    The web site here is a porn phishing site don't matter it they look like 90 years old still report them as a child porn if the don't show they are over 18 years of age! Unless you are a pediatrician and want the spam to continue.

    Name:        galfom.com
    IP:        104.21.31.185,         172.67.179.43
    Domain:    galfom.com
    Registrar Abuse Contact Email:  abuse[AT]namecheap[DOT]com
    include email address of US FED's namecheap.com is registered as a American Domain (don't listen to their denial.
    Pooh-Poohing it's not child porn, that's up to the FED's to deicide if they are legal?) 

    They will get your email address list washed by spammers. 
    phishing-report[AT]us-cert[DOT]gov  makes them sweat
    Include notes my boiler plate is - add this to Cloudfare reports also American registered.

    Child porn phishing spammer
    pictures under 18 or made to look under 18
    NO PROOF OF AGE available!
    SENT TO MINORS

    2257 Regulations (C.F.R. Part 75), part of the United States Code of Federal Regulations, require producers of sexually explicit material to obtain proof of age for every model they shoot, and retain those records. Federal inspectors may at any time launch inspections of these records and prosecute any infraction.

    "unless the websites “perform reasonable age verification methods” — in short, requiring users to show government ID to prove they are 18 or older."

    No working unsubscribe

     


     

  21. 9 hours ago, Foggy said:

    thanks @petzland @Lking

     

    my client has the custom Klaviyo footer that includes an unsubscribe link. like most of my clients it was not until the Google/Yahoo deadline did they realise that dedicated domains were important. so most clients got there dedicated domains in November, December and January. in time their longevity on a dedicated domain can clean up their sending reputation if they behave. I have sunset flows in place and clean soft bounces and severely unengaged from accounts quarterly or sometimes bi-monthly. the only issues is a small subset of the clients want single opt-in still.

    image.png.bfeb179f474ab72655af1505a305bee2.png

    To clean up a Sh*t list of poisoned email addresses requires a email  delivery receipt tells you that an email message was delivered to the recipient's mailbox, but not whether the recipient has seen it or read it. A read receipt tells you that a message was opened.
    might help?

  22. On 2/24/2024 at 11:24 AM, Foggy said:

    @petzl "Spoke to soon you may be on a shared IP with some loser not using a Double OPT-IN email list"

     

    nailed it on the head there! the client refuses to do double opt-in, think that is causing all of this? I'd love to use this as another reason/case to prove them that they need it!

    Suggest that your client do a Run  with a working unsubscribe link in messages to not have one makes it illegal under "the spam act"!

    Quote

    The spam Act 2003 also requires that all commercial electronic messages include a functional unsubscribe facility. This means that recipients must be given an easy and effective way to opt out of receiving future messages.

    https://www.findymail.com/blog/how-to-add-unsubscribe-link-to-email/

  23. 5 hours ago, Foggy said:

    @petzl "Spoke to soon you may be on a shared IP with some loser not using a Double OPT-IN email list"

    nailed it on the head there! the client refuses to do double opt-in, think that is causing all of this? I'd love to use this as another reason/case to prove them that they need it!

    It's not illegal to not use double-opt-in.. that's why a vast number of poisoned email address's are stacked into web pages.
    Land lines in Australia have been mostly destroyed by spam callers. Mobiles are very good at stopping them by easy to mark as spam.

  24. On 2/23/2024 at 10:40 AM, petzl said:

    Spoke to soon you may be on a shared IP with some loser not using a Double OPT-IN email list
    SpamCop spam-traps being hit means they are using poisoned email addresses with no owner.
    obtained by scraping Internet web pages for email addresss
     

     

    Bounce.png

    On 2/23/2024 at 9:37 AM, Foggy said:

    @petzl thank you for that note, I am the marketing agency working for the client who sends the bulk of the emails, I am awaiting their reply on the IP and may in fact just have them test as they are more in line with their IP address fluctuations than I am. 

    Roger that as well! 
    "Many times a persons email receiver, has a SH*T list pf IP's that they have a grudge against.
    Then send a fake  SpamCop blacklist as the culprit."

    @Lking thanks for your notes as well. 

    I have the dedicated domain for my client set up properly with DMARC etc all in line with what we need. They've had dedicated domain set up for about six months or more but DMARC has only recently (within last two months) been established. Your spamhaus report that you ran is very helpful, thanks @petzl

    Spoke to soon you may be on a shared IP with some loser not using a Double OPT-IN email list
    SpamCop spam-traps being hit means they are using poisoned email addresses with no owner.
    obtained by scraping Internet web pages for email addresses

    Causes of listing
    System has sent mail to SpamCop spam traps in the past week (spam traps are secret, no reports or evidence are provided by SpamCop)
    Express-delisting is not available
    Listing History
    In the past 87.2 days, it has been listed 15 times for a total of 15.0 days
    Other hosts in this "neighborhood" with spam reports167.89.100.7 167.89.100.8 167.89.100.40 167.89.100.69 167.89.100.76 167.89.100.78 167.89.100.79 167.89.100.82 167.89.100.83 167.89.100.85 167.89.100.86 167.89.100.87 167.89.100.91
     

    Bounce.png

×
×
  • Create New...