Jump to content


  • Content Count

  • Joined

  • Last visited

Everything posted by gnarlymarley

  1. gnarlymarley

    SpamCop on cPanel - do-able?

    I suspect you might be able to do that with the following but the manual is not completely clear on how: blacklist_from [] Since I run my own name server, I setup my own black list there such as: *.170.blacklist.local. IN A *.170.blacklist.local. IN TXT "blocked whole range 20200802"
  2. gnarlymarley

    Three Ways to Report spam

    SCBL means SpamCop Blocking List or SpamCop Black List. Also, for me google says it is "Southern Collegiate Baseball League".
  3. gnarlymarley

    Parsing truncated

    Interesting, I had submitted a copy to my account without mailhosts and it appears to have worked. https://www.spamcop.net/sc?id=z6644191965z228c8ee5751b9ef3fba5a127fdc8818fz When I try to submit with mailhosts, I get the same pause (yes, I know I don't have your mail hosts.) https://www.spamcop.net/sc?id=z6644192306zf677ca6824be06de2a49d01b38114656z This would almost indicate maybe the double dot hostname problem. Hang on, maybe try changing the two dots as below to a single and try submitting again. Received: from DESKTOP-JQ04P8P..home
  4. gnarlymarley

    Parsing truncated

    Nothing immediately stands out for me, but I do see an IPv6 address: whois.ripe.net found abuse contacts for 2a01:4f8:211:2c54::2 = abuse@hetzner.de Might be good to get the deputies looking at this at deputies[at]admin[dot]spamcop[dot]net.
  5. gnarlymarley

    OVH.Net spam ?

    Nope, I am saying that it came from is the source, but user/owner of the computer tied to that IP probably didn't send the message themselves. They "let" someone else use their computer because they didn't patch it. Spammers love it when they can use someone else's cameras, routers, computer, refrigerator, or other IOT device to send their stuff so they don't get caught. Keep reporting these as we at least need to get them to patch or fix the problem. If it is a person that has let someone else use their machine, they need to deal with the problem.
  6. gnarlymarley

    OVH.Net spam ?

    Nope, I am saying that OVH customers were probably hacked. The spammer is just using the Newegg hostname to try to get past spam filters. (Some people who get a spam report that supposedly came from their discount it and ignore it because they "didn't send it".)
  7. gnarlymarley

    OVH.Net spam ?

    Two decades ago, spammers were advertising the wrong hostname to get past blocking filters. When spam filtering kept getting them, some of them went to using their real hostname of the computer they had hacked. I think most of the OVH spammers might be the "fly by night" salesman, where the OVH computers are not patched. I think that by the time we file a report, they may have already abandoned the machine.
  8. gnarlymarley

    Russian spam can't be reported

    I am not sure if this is the issue because I have a juno account on my mailhosts with 179 webhosts and I don't have any problems with it. Looking at your tracking URL, the Received: lines appear to be out of order. Received: from outlook by outlook Received: from exhangelabs by reliablemail Received: from exhangelabs by exchangelabs Received: from exhangelabs by outlook Received: from reliablemail by reliabledns Received: from reliableedns by reliabledns In searching the forums, the first thing that popped up was an outlook issue: https://www.spamcop.net/fom-serve/cache/122.html Are you using outlook? (Apparently there don't have issues with outlook express, only outlook.)
  9. I would suggest you start with deputies[at]admin[dot[spamcop[dot]net. They will be able to analyze it.
  10. Ricardo_63, this "Received:" line should be added by the receiving email server. And should not be disabled by any spammer. Though RFC2882 might be confusing, RFC5321 explains this well in section 3.7.2, where your ISP should be adding that line. 3.7.2. Received Lines in Gatewaying When forwarding a message into or out of the Internet environment, a gateway MUST prepend a Received: line, but it MUST NOT alter in any way a Received: line that is already in the header section. Another way to think of it, is if your ISP refused to put this line on your email, then they must provide another way for you to get the information via a phone call or log access. If they refused to tell you the sending IP and helo hostname, then the offending email must be counted as spam send "by your email provider".
  11. gnarlymarley

    Is there a SpamCop Outage

    This is the problem with internet islands where you can travel from your house to either island, but you cannot travel directly from one island to another. This is where your ISP is working, but your VPN's ISP would not have been talking to SpamCop's ISP. When someone at those ISP found out there was a problem, they could fix it. This is why the problem started happening by itself and would have fixed itself. (Most of my internet traffic goes through about five different ISPs between my computer and the server.)
  12. I do find it interesting that the whois entry says "ArubaCloud UK Cloud Services" based out of London, UK. If the email address doesn't work for you, then you might want to try https://www.aruba.it/en/report-abuse.aspx.
  13. gnarlymarley

    SpamCop on cPanel - do-able?

    I am not familiar with cPanel, but I am with SpamAssassin. I currently have version 3.4 and there is a a rule in it called RCVD_IN_BL_SPAMCOP_NET that brings in block list functionality. I was looking at and the version 2.6 appears to have the rule in it. Later versions all seem to have it. Is this the type of integration you are looking for? I am not sure if you have a special score for it or would be using the default score.
  14. From what I see on your tracking URL, there are some missing Received lines. I see you have the Received and by sections, but no from section. Received: by smtp50.i.mail.ru with esmtpa (envelope-from <investor@bit.com>) I would expect to see a like such as the following where it has the from: Received: from [IP.add.re.ss] (helo=server.name.org) by smtp50.i.mail.ru with esmtpa (envelope-from <investor@bit.com>) SpamCop uses the part between the from and the by to determine the message source.
  15. Most ISPs don't go in and decode the base64. For those that do or might, I just decode it, strip out my address, and then reencode it. This might be a good feature to have and there are perl modules that can decode/encode it.
  16. gnarlymarley

    Spammers using web "middleman" URLS (tb42trk.com)

    I believe they are called URL shorteners. How they work, is a person can type/paste in a URL into the shorteners site and get a shortened link. Visiting the shortened link passes a 302 or a 301 redirect and your browser will be redirected directly to the longer URL. During the redirect, the shortener tracks the usage. Shorteners were started because links (such as forum post) can be quite long. http://forum.spamcop.net/topic/11594-my-url-shortener-website-is-spamvertised-what-to-do/ http://forum.spamcop.net/topic/10541-resolve-redirections-of-url-shrinking-url-redirection-services/
  17. gnarlymarley

    Russian spam can't be reported

    The only problem I can see is the missing date and something weird with the third received line. But then you probably have this resolved by now with the mailhosts tab.
  18. I had a similar one but it seems the rdns redirect is bouncing, so mine went back to hotmail. It appears the idea behind this might be so SpamCop can sent to the related abuse department. It appears that SpamCop may have worked directly with the Microsoft abuse department on this part of the code. Tracking URL: https://www.spamcop.net/sc?id=z6640795915z6babc4f58dd1fd8e9d6265ff6ca18ce3z
  19. We need to have SpamCop automatically detect when an entire IP range is transferred from one registrar to another. Right now, there are a lot of manual updates being put in to get the reports to the correct destination. This should be automated so that the correct whois entries can be detected without manual human intervention. Routing details for [refresh/show] Cached whois for : search-apnic-not-arin@apnic.net I refuse to bother search-apnic-not-arin@apnic.net. Using search-apnic-not-arin#apnic.net@devnull.spamcop.net for statistical tracking. Using last resort contacts search-apnic-not-arin#apnic.net@devnull.spamcop.net I believe this is what it would detect in the code. ReferralServer: whois://whois.apnic.net
  20. gnarlymarley

    Sendgrid reports dev'nulled?

    It would say something like bounces if they are rejecting the report. This looks like it was manually turned off. My suspicion is a deputy turned off their reports. I think sendgrid if went in with their ISP account and turned off reports, we could get a message that "ISP does not wish to receive reports". You can try a deputy at deputies[at]admin[dot]spamcop[dot]net.
  21. gnarlymarley

    Is there a SpamCop Outage

    I wonder if the off button is not working since it appears to only work for a little bit on restart. I wonder if you would be able to do something like a traceroute through the VPN. Here is my thought, back in May I experience an ISP issue on IPV4 where this forum became an island. During that same time, other people on this topic were able to get to the forum just fine. It maybe possible that verizon or some other ISP is still having issues, but ones that only affect certain internet destinations. I imagine it works on startup until the opera VPN has a chance to connect. If you could do a traceroute both through the opera VPN and also when it is disabled, you might be able to see where the problem is. (When I had my problem for a few weeks, I did notice that there was a 15 min time window during the day when it would work normally.)
  22. gnarlymarley

    Is there a SpamCop Outage

    maybe not the problem, but a possibility. If I recall correctly, there used to be a setting in opera that would allow bidirectional usage of other people's internet. I think it was there to enable a faster download of other people on your same ISP to use their cache to download webpages faster. If this option was enabled, maybe it could have contributed to the issue.
  23. The IPv6 ranges returned from the lacnic whois is being properly detected. It appears that most of the whois servers return inet6num, but lacnic seems to be returning inetnum. For documentation, the IPv4 seems to be coming back as NetRange for all whois. It would appear that lacnic is going to stay with this as they have used this since they started on IPv6. Can we have the code in the whois section be able to pick up lacnic's IPv6 range? The tracking URL that was fixed by the deputies on 24 Feb but have screenshot of before fix: https://www.spamcop.net/sc?id=z6618132220z787713e4d45691f5d7d62752a3a7f109z Forum post from 2013: http://forum.spamcop.net/topic/13290-gmail-spam-from-ipv6/ Forum post from 2018: http://forum.spamcop.net/topic/30227-cannot-find-ip-range-in-whois-outputno-reporting-addresses-found-for-200112f0601a902000150/ Whois refresh page:
  24. gnarlymarley

    Cannot find ip range in whois output

    one possible option would be to do a regex swap when the whois is pulled into the cache such as: s/inetnum/inet6num/
  25. gnarlymarley

    blocklist removed

    One note is that you can try is to do a local lookup and see if it is cashed in the blocklist by your local DNS. Another thing to note is that a few decades back, there were some email providers that mistakenly blamed the spamcop blacklist for blocking email when in fact, it was their own blocklist they were using. nslookup -type=any If the IP is not on the blocklist, but is still blocked, it is likely the email provider has setup a badly configure rbl entry in the receiving email server.