Jump to content


  • Content Count

  • Joined

  • Last visited

Everything posted by gnarlymarley

  1. This would sure be easier to read if we had the tracking URL. If I see this correctly, then it appears that the email was forwarded through Since I am not familiar with this IP, I will take the route of it possibly okay. Another SpamCop user can take that one on. From what I see, the order of the headers are "Our-IP" and then This would mean that probably used your router to send the email. If we assume that it did come from your IP, then I would guess you already checked the server logs. The next thing I would check is your NAT router and make sure did not get hacked. I have had email seen plenty of email come directly from routers, where it completely bypasses the email server.
  2. If you can, please report every email that you receive that is actual spam, which will allow the spamcop blocklist to have all IPs listed. Also, spamtraps only use mole reporting. See below why spamcop only blocks on reported IPs. When a sufficient number of spams are reported, spamcop automatically adds it to the blocklist. Now, to make sure false-positives are not added, spamcop uses a special formula to verify that only actual spammer's IPs are added to the blocklist. This means that it will take more than one report to have the IP listed on the blocklist. I believe the issue is that folks who send legitimate email do not want to have their IP listed. This can cause issues if spamcop just started randomly adding IPs to their block list. Because of this, I maintain my own block list along side of spamcop, where I can and do block whole subnets from repeated spammers. But before I add the whole subnet to my personal blocklist, I have to check and verify that there is no legitimate emails and that there are no IPs that should not be blocked. *.128.80.bl 3600 A
  3. The goal of spamcop is to help us (receivers of spam) to get an ISP to do something about their troublesome clients. If that fails, then just block the IP address until those responsible at that ISP decides to do something about those problematic clients. The goal of the munging is to prevent spammers from finding out who is reporting them. Most spammers do not use a mail server and therefore they are not able to figure out who to retaliate against. The spamcop report contains the ID that the mail server put on it, so the true ISP will be able to see who the email was sent to, who logged in (authenticated to) the mail server, and then do something about it. Edit: What is meant by mole reporting is that the report never goes to the ISP administrators, nor to the suspected spammer. It only is used for statistics and populating the blacklist.
  4. gnarlymarley

    No source IP address found

    I usually see this when the spammer is using my local email provider. Since spamcop is external to my email provider, I have to use the "report spam" button to get it sent to the postmaster to deal with. Before the report spam buttons and back around when spamcop began, we used to forward those emails to abuse@[relatedISP].com.
  5. Interesting that the both the command-line version as well as the "Display Data" link show this as plain text. It sure does confuse the parser. I wonder why RIPENCC has changed the data? https://www.spamcop.net/sc?action=showcmd;cmd=whois
  6. Years ago when I first saw multiple providers doing this, I started opening up the source and copying. Nowadays, I have setup my own email server and forward all email to spamcop through that server. I find that when I can control who blocks, it is much easier. If you have a second email account, you can setup that in thunderbird and forward to spamcop using that connection.
  7. Actually, I would agree with Lking as you will see the same issue with quick reporting as you see with normal reporting. I believe the issue is somewhere between earthlink and spamcop mail servers, before you even get to the spamcop code. Quick reporting uses the same mail servers that normal reporting uses. I am guessing that once the problem is resolved, you "should" get all the delayed message coming in. Since I was able to send stuff in successfully, I would tend to believe the issue lies on the earthlink outbound email side.
  8. So far, I have never seen an issue between mailhosts and the returning acknowledgement from forwarded spam. My question is when you login, do you see a line right above where you manually submit where it says to "report unreported spam"? I am thinking the issue might be some sort of delay with the inbound mail server and accepting reports. From what I have seen, if you spam makes it to the mailhosts section of the code, you will see it right above the form on the manual submit page. If the unreported link is missing from that section, then your email is not making it to the spamcop code and the issue could be with your outbound email servers. I has forwarded something this morning (around six and a half hours ago) and did get the acknowledgement back, so that part should be working. For quick reporting, you just change the "submit" portion of your special (and should always be hidden) submit link to "quick". You might also need to see the attached.
  9. yeah. I also noticed that your report has a double dot in the hostnames. I wonder if spammers have figured out to fool SpamCop. It very well could be related to the following post since it appears to be stopping around the same point. http://forum.spamcop.net/topic/17040-only-first-three-lines-of-report-showing/
  10. gnarlymarley

    comcast as an isp reporting problems

    Sounds like you might need to have mailhosts setup. https://www.spamcop.net/fom-serve/cache/397.html mailhosts is to prevent all of your local servers (which forward email from one to the other) from being listed in the reports.
  11. gnarlymarley

    Only first three lines of report showing

    Interesting that the hostname starts with a dot in the submissions where it stops at: View entire message Parsing header:
  12. gnarlymarley

    Only first three lines of report showing

    I am not sure if hiccup is the right word. Whenever I look at your tracking link, as well as a few of my own, they all show errors. It seems to be an issue that is rare, but consistent. I submitted one a few days ago and have not heard back yet. Maybe they were upgrading the system while you were trying to originally submit.
  13. gnarlymarley

    .2 month still the same mail.

    You might want to edit your post to remove your special reporting email address that I am not supposed to know. as for the error, I usually get that when the email I am reporting is not an attachment when forwarding. see https://www.spamcop.net/fom-serve/cache/166.html. Of course, this could be anything from forwarding and not as an attachment to your spam filter removing the attachment.
  14. gnarlymarley

    Unroutable IP address in tracert?

    This does not have much to do with actual reporting, but probably should be answered. No DNS spoofing. This is nothing more than an ISP who has started using the private address in their routers, but forgot to block it on their borders. We have been seeing private addresses more since the IPv4 runout occurred a few years ago. Also, you forgot about line #14 which is also a private address. For me, I just usually block these private addresses on my border firewall. I am sure if you were able to dig further you would probably see that line #13, #15, #16, and #17 are also private address, but they actually blocked those. Now if you start to see the same IP repeated in multiple lines, you would probably know that they are NAT'ting their private addresses.
  15. gnarlymarley

    A spam seems to have gotten SpamCop stuck

    Seems to me this might be a parser error as it stops on the double period. Hopefully, the deputies are will be seeing this. If not, then might be good to get Don on this at service[at]admin.spamcop.net. Host www..w3.org (checking ip)
  16. The reply email (with subject of something like "[SpamCop] Errors encountered") should have some headers near the bottom. Since this email was not able to submit the spam, it does not contain a tracking URL. The bottom of the email should contain the message or part of it that was attempted to be submitted. If it only has part, you can compare the " Content-Type" to see if your sent email has the same boundary tag. Usually when I had issues in the past, it was due to my mail client not aways sending it as an attachment. If you are not able to figure this out, my email from years ago, suggested to email the service address to get more information. Please check your email for an explanation or email service@admin.spamcop.net for more information. I would not be surprised if cPanel is doing some sort of spam filtering and randomly removing attachments for you.
  17. I found this thread that talks about cPanel removing attachements after you forward. This this spot on the cPanel where you have to allow attachments to head to users. I am not sure why anyone would make attachment filter a default. https://forums.cpanel.net/threads/forward-all-mail-with-attachments.388212/
  18. gnarlymarley

    Email from q.com blocked.

    I went to http://www.spamcop.net/w3m?action=checkblock&ip= and got the following not listed in bl.spamcop.net My guess is that someone was using smtp.q.com to send actual spam, it got reported, and now the issue is resolved. When spammers use legitimate email services, it usually gets solved much quicker with the affending party being kicked off.
  19. gnarlymarley

    Some One created spam Review on Glassdoor

    All spamcop does for us users is to report spam back to the original administrator. I would tend to agree with InvisiBill. As for the issue at stake, I cannot click that "flag as inappropriate" button as the entry was not sent to me. The only person that can morally click the "flag as inappropriate" button is jazz25.
  20. gnarlymarley


    I am not sure I entirely understand the question. What I see is a email that came from and the email speedy.com.ar has given authorization through a spf check. What happened is that was involved to send the email. If that IP is behind a NAT, then any number of hosts (which use that NAT) could have been used to send the email, including the NAT router itself. What we do know is that any of these devices could have been hacked or else the email was sent by a legitimate person. I am guessing that this is what you meant by possible forgery. Also, if you have any ties to, it might be in your best interest to check for hacking to prevent further usage of that IP by spammer jerks.
  21. gnarlymarley

    Have we figured out who this spam gang is?

    Without the IP, there is not much we as users of the spamcop service can do. Spammers are attacking more than just port 25. I have seen spam come directly from a router, which does not have the SMTP service. It would appear that spammers are trying to hack and use anything that can get their message through.
  22. gnarlymarley

    False Spamadvertising Report

    The "report" that was sent by SpamCop that contains the link (previously mentioned is other's posts) would have been sent to the data-center that has suspended your account. This means you will need to work directly with the data-center for both the update to spamcop and to get them to give you your account back.
  23. gnarlymarley

    Is SPAMcop dead (please)?

    There have been a number of receiving systems in the past that have copied the blocklist error message about the block coming from spamcop. This can be confusing as one would immediately suspect spamcop when the blocklist came from something like spamhaus instead.
  24. gnarlymarley

    Message exceeds 50000 bytes.

    outlook.com is a microsoft website. In my humble opinion, microsoft and other hosting companies do not care about their site being used in someone else's spam. You might see other sites in there that might care more, Most of the folks that I have seen that care are the ones that control the SMTP side of spam. This is in part why I believe spamcop does the truncation of email.
  25. I used to see this error with the spamcop front end proxy servers. Last time I got this, I dropped an email to the deputies.