Jump to content

gnarlymarley

Memberp
  • Posts

    837
  • Joined

  • Last visited

Posts posted by gnarlymarley

  1. 16 hours ago, petzl said:

    Well I don't see the "received by"  line 
    Which should be followed with the
    "Received: from"

    Ricardo_63, this "Received:" line should be added by the receiving email server.  And should not be disabled by any spammer.

    On 7/24/2020 at 5:05 AM, Ricardo_63 said:

    That's the point,  where spammers it seems almost step ahead, masking mails without possibility to reported.

    Though RFC2882 might be confusing, RFC5321 explains this well in section 3.7.2, where your ISP should be adding that line.

    3.7.2.  Received Lines in Gatewaying
    
       When forwarding a message into or out of the Internet environment, a
       gateway MUST prepend a Received: line, but it MUST NOT alter in any
       way a Received: line that is already in the header section.

    Another way to think of it, is if your ISP refused to put this line on your email, then they must provide another way for you to get the information via a phone call or log access.  If they refused to tell you the sending IP and helo hostname, then the offending email must be counted as spam send "by your email provider".

  2. On 7/13/2020 at 8:45 PM, petzl said:

    I did nothing this started happening by itself (have now "fixed it") had do go through the myriad of options to find it.

    This is the problem with internet islands where you can travel from your house to either island, but you cannot travel directly from one island to another.  This is where your ISP is working, but your VPN's ISP would not have been talking to SpamCop's ISP.  When someone at those ISP found out there was a problem, they could fix it.  This is why the problem started happening by itself and would have fixed itself.  (Most of my internet traffic goes through about five different ISPs between my computer and the server.)

  3. I am not familiar with cPanel, but I am with SpamAssassin.  I currently have version 3.4 and there is a a rule in it called RCVD_IN_BL_SPAMCOP_NET that brings in block list functionality.  I was looking at 

     and the version 2.6 appears to have the rule in it.  Later versions all seem to have it.  Is this the type of integration you are looking for?  I am not sure if you have a special score for it or would be using the default score.

  4. On 7/22/2020 at 7:35 AM, Ricardo_63 said:

    Here is your TRACKING URL - it may be saved for future reference:
    https://www.spamcop.net/sc?id=z6642947923z6d9895034f835eced8ac22b50e215d41z

    From what I see on your tracking URL, there are some missing Received lines.  I see you have the Received and by sections, but no from section.

    Received: by smtp50.i.mail.ru with esmtpa (envelope-from <investor@bit.com>)

    I would expect to see a like such as the following where it has the from:

    Received: from [IP.add.re.ss] (helo=server.name.org) by smtp50.i.mail.ru with esmtpa (envelope-from <investor@bit.com>)

    SpamCop uses the part between the from  and the by to determine the message source.

  5. On 7/13/2020 at 12:17 PM, EkriirkE said:

    My email is still visible.  Note the first example is targeted at me directly for reporting them subject "You make compliant on Spamcorp my.visible.email erville?..." with a confusing body that pieces together a personalized message:

    Most ISPs don't go in and decode the base64.  For those that do or might, I just decode it, strip out my address, and then reencode it.  This might be a good feature to have and there are perl modules that can decode/encode it.

  6. 6 hours ago, jprogram said:

    Apparently, those are all owned by Google. So how do they work and what are those sites called?

    I believe they are called URL shorteners.  How they work, is a person can type/paste in a URL into the shorteners site and get a shortened link.  Visiting the shortened link passes a 302 or a 301 redirect and your browser will be redirected directly to the longer URL.  During the redirect, the shortener tracks the usage.  Shorteners were started because links (such as forum post) can be  quite long.

    http://forum.spamcop.net/topic/11594-my-url-shortener-website-is-spamvertised-what-to-do/

    http://forum.spamcop.net/topic/10541-resolve-redirections-of-url-shrinking-url-redirection-services/

  7. On 7/4/2020 at 1:32 PM, Sven Golly said:

    The source IP appears to be: 82.147.70.59 which goes back to a Russian provider.

    The only problem I can see is the missing date and something weird with the third received line.  But then you probably have this resolved by now with the mailhosts tab.

  8. I had a similar one but it seems the rdns redirect is bouncing, so mine went back to hotmail.  It appears the idea behind this might be so SpamCop can sent to the related abuse department.  It appears that SpamCop may have worked directly with the Microsoft abuse department on this part of the code.

    Tracking URL: https://www.spamcop.net/sc?id=z6640795915z6babc4f58dd1fd8e9d6265ff6ca18ce3z
     

    Quote

    Tracking message source: 157.56.9.192:
    Routing details for 157.56.9.192
    [refresh/show] Cached whois for 157.56.9.192 : abuse@microsoft.com
    Using best contacts abuse@microsoft.com
    Using rdns to route to correct Microsoft department
    host 157.56.9.192 (getting name) no name
    failed, using default abuse@hotmail.com
    abuse@hotmail.com redirects to report_spam@hotmail.com

     

  9. On 6/30/2020 at 2:16 PM, jhg said:

    Can anyone at SC shed some light on why sendgrid is devnulled?

    It would say something like bounces if they are rejecting the report.  This looks like it was manually turned off.  My suspicion is a deputy turned off their reports.  I think sendgrid if went in with their ISP account and turned off reports, we could get a message that "ISP does not wish to receive reports".  You can try a deputy at deputies[at]admin[dot]spamcop[dot]net.

  10. On 7/9/2020 at 3:12 PM, petzl said:

    Opera is still doing this but comes right mystically?
    Turning VPN off has no effect
    Possibly another WIN10 feature,
    Goes back to normal by closing browser and restarting?

    I wonder if the off button is not working since it appears to only work for a little bit on restart.  I wonder if you would be able to do something like a traceroute through the VPN.  Here is my thought, back in May I experience an ISP issue on IPV4 where this forum became an island.  During that same time, other people on this topic were able to get to the forum just fine.  It maybe possible that verizon or some other ISP is still having issues, but ones that only affect certain internet destinations.  I imagine it works on startup until the opera VPN has a chance to connect.  If you could do a traceroute both through the opera VPN and also when it is disabled, you might be able to see where the problem is.  (When I had my problem for a few weeks, I did notice that there was a 15 min time window during the day when it would work normally.)

  11. On 7/7/2020 at 2:31 PM, petzl said:

    Seems Opera Browsers won't connect
     FireFox works no trouble

    maybe not the problem, but a possibility.  If I recall correctly, there used to be a setting in opera that would allow bidirectional usage of other people's internet.  I think it was there to enable a faster download of other people on your same ISP to use their cache to download webpages faster.  If this option was enabled, maybe it could have contributed to the issue.

  12. On 6/24/2020 at 11:11 PM, fnsp_stastny said:

    Oh, I'm sorry I forgot to write IP.

    One note is that you can try is to do a local lookup and see if it is cashed in the blocklist by your local DNS.  Another thing to note is that a few decades back, there were some email providers that mistakenly blamed the spamcop blacklist for blocking email when in fact, it was their own blocklist they were using.

    nslookup -type=any 3.56.87.193.bl.spamcop.net

    If the IP is not on the blocklist, but is still blocked, it is likely the email provider has setup a badly configure rbl entry in the receiving email server.

  13. On 6/24/2020 at 3:05 AM, Jericho said:

    I also noticed that my average reporting time never drops below 4 hours, no matter how fast I submit my reports.

    I probably have a million plus reports of the past few decades that sure keep my average up.

     

    On 6/27/2020 at 10:52 PM, Jericho said:

    Why are the IPs not included in the Spamcop blocking lists?

    I believe I saw the term snowshoe spamming. that explains this.  I have about a thousand of my own spamtrap email accounts and one thing I noticed is that the IP never seems to be repeated.  If you look at what Lking sent above, the spammer is doing that do they will not get listed.  Can be amazing how many IP blocks are out there that they can use with this "hopping" method.

  14. On 6/23/2020 at 7:01 PM, el_gallo_azul said:

    I use Yahoo! Mail, since I want to be able to always access my email (irrespective of location and available hardware), and I can't find any "Forward as attachment" option.

    I don't see the "Forward as attachment" as an option in the webmail version.

    On 6/23/2020 at 7:01 PM, el_gallo_azul said:

    Do you happen to know if "Forward as attachment" actually just attaches a text file of the full email header?

    That is basically what it is, so you can save the "raw message"  as a notepad txt file and then attach it to a new message.  Or else you can use something like the thunderbird email client that forward as an attachment.

  15. On 6/19/2020 at 2:14 AM, Hanco said:

    Separately, noticed a significant uptick in 419 Scammer emails. They often have a US phone number on them so I report the number to the FTC. I also call it (my number withheld) and if it sounds like the guy was asleep I repeat every few minutes at my leisure, put on a voice, ask stupid questions, generally really waste their time. I might be a sadist in this respect...I don’t feel at all guilty about doing it 😂

    My phone company has a special number that I can call that will disable callerID.  Hopefully you also have this option to block callerID enabled, so they are not able to retaliate to your number. if they can see the callerID....

  16. On 6/19/2020 at 10:03 AM, KNERD said:

    I guess I will need to look at spam Assassin.

    Either that or maybe see if your mail server supports special filtering rules.  Before I went to spamassassin, I was doing weird helo accept/deny rules as well as maintaining my own blocklist.

     

    On 6/19/2020 at 10:03 AM, KNERD said:

    Maybe time for a campaign to ARIN to have their IP addresses revoked? Do they even do that?

    They can revoke the IP address for policy violations but that doesn't always stop the spammer.  The ISP's ISP should be checking that their customers are using valid ranges.  I had one in Europe that has assumed two class C networks without being assigned them.  It took a few months for them to stop using them.

  17. 5 hours ago, rdorsch said:

    Hmm....I think that helped to recover it, I clicked on "Parse" to recover it:

     https://www.spamcop.net/sc?id=z6633595354za3c7f1c70eca174576d1527014496a1dz

    Rainer,

    This appears to be only the URL specified and not coming directly from your server.  Running it through google translate, it appears to be the normal whois email address testing.  Sounds like they are sending out spam to attempt to send a bill to random domains to try to extort money.  Been a while since I got one of those.

    (I think what petzl is talking about is where I have seen IP cameras and routers get hacked and the spam sent from there, but this does not appear to be coming directly from your server.  If it was coming directly from your server, I would check the server and any devices that might be sharing the same IP for possible intrusions.)

  18. It would appear that the forum only does http.  From what I can tell, the hosting is done on cloudflare.net.  So as long as that is the SSL cert, then you can login using https.  I would advise against sharing this password with other places.  I found the following, so I am not sure if there are plans in the works to fix this.  Maybe submit a new feature request?

     

  19. On 5/19/2020 at 12:05 PM, Spamnophobic said:

    OK I know we have been here before, but could somebody examine my tracking url:

    https://www.spamcop.net/sc?id=z6634628358z460dafae0c54205ace1fe027dc2ff311z

     perhaps forum seniors or SpamCop staff can suggest how to get these new ones reported?

    Okay, I am confused with the tracking URL.  It seems to be the message you tried to report is one that was sent directly to your submit address.  I see the vmx and the app009.  Are you trying to report a spam from someone that sent it directly to your submit address?  (I am glad your submit address was replaced by an x in here as I don't want to know what it is.)  If your submit address is in the wild, I would suggest you contact deputies[at]admin[dot]spamcop[dot]net.

  20. 19 hours ago, rdorsch said:

    I found that my domain was mentioned in the spam email,

    I had a similar situation happen to me about two decades ago with an admin from a well known education institution confusing the internal links of the spam as the source of the spam.  This is why I prefer to report just the source instead of the links inside.  If I see any on my reports that might be valid (innocents caught in the crossfire), I uncheck those.

  21. 17 hours ago, Appleseed said:

    Outlook put stuff to headers. If you want to report messages from Outlook, you have to start copy paste from the last "Received: from" line in message source and ignore all outlooks stuff before that.

    For me, if I copy the message to notepad first and maximize the window and then copy all again, I don't seem to have a problem.  There appears to be a really long line added that has weird line breaks if copied straight across.

  22. 3 hours ago, displayname said:

    why can't i just forward (not as attachment)? its the same content formatted differently, but will make huge difference to users: instead of doing 1 step (forward to address) we have to do 5:

    Forwarding as an attachment contains some hidden lines that track message source.  When forwarding (not as attachment) those tracking lines are lost.  This is why SpamCop requires it to be an attachment.  The lines that get lost when forwarding not as an attachment are the "Recevied:" lines as defined by RFC2076.

×
×
  • Create New...