Jump to content

gnarlymarley

Memberp
  • Posts

    839
  • Joined

  • Last visited

Posts posted by gnarlymarley

  1. I believe I know the how this works. I am sure you probably already checked for a webmail to be able to access it. I have a forwarder email address I setup in 1997 that soon after I was no longer able to login, now being stuck permanently as is. Normally I would try to find a webmail or an old link that might allow the password change. As others have suggested, sign up for the free reporting account and report every one. If you enable mailhosts, for both your email accounts, it should report the spammer's IP.
  2. Do they actually have your password? If you look at the Received headers of the emails closely, they will usually be coming from a different server that is not your actual server. You should verify if the emails are actually coming from your account or if they are forged and fake. Knowing where they are coming from should tell you where you will need to change your password at.

    If it is the CES mail password, I would suggest you start here:
    https://www.spamcop.net/fom-serve/cache/66.html
  3. Since I own my own server, I was able to use SpamAssassin to filter for those emails. Now the scammers/spammers try to send me this junk three or four times from each IP. I would get the attempts from about a dozen IPs and then they would stop for a few weeks. I report every one that makes it through my spam filter and they stop soon afterward.
  4. Sounds like this might be the case of somebody misconfiguring their RBL setup.

    This is probably what they have:
    FEATURE(`dnsbl', `spamcop.mimecast.org', `"spam blocked see: http://spamcop.net/bl.shtml?"$&{client_addr}')dnl

    This is what it really should be:
    FEATURE(`dnsbl', `spamcop.mimecast.org', `"spam blocked see: http://mimecast.org/bl.shtml?"$&{client_addr}')dnl

    https://www.spamcop.net/fom-serve/cache/294.html
  5. Like RobiBue says sometimes admins setup their server to blame the SpamCop blocklist by pointing their line to another blocklist, but then have the message return something else.

    FEATURE(`dnsbl', `bl.SomeOtherGroup.com', `"spam blocked see: http://spamcop.net/bl.shtml?"$&{client_addr}')dnl

    https://www.spamcop.net/fom-serve/cache/294.html

    This would appear to be the case, so you would need to contact the particular admin for the server you are trying to send to and ask them why they are blocking.
  6. The two Received header lines don't seem to line up. Usually they don't use an IP after the "by". What is after the by below should match before the "by" one the line above. My guess would be 10.206.128.73 is actually the atlas yahoo server. They should be using the domain and not a 10.0.0.0/8 IP. It might be good if you were to login with a webmail to see if the headers are the outlook client or if it is a yahoo/aol server issue.

    Received: from 127.0.0.1 by atlas-production.v2-mail-prod1-gq1.omega.yahoo.com pod-id atlas--production-gq1-69c878588f-lqv2b.gq1.yahoo.com with HTTP; Sat, 31 Dec 2022 03:34:10 +0000

    Received: from 93.115.96.156 (EHLO uness5.liveisgood.shop) by 10.206.128.73 with SMTP; Sat, 31 Dec 2022 03:34:10 +0000
  7. Mine says that too. (It also comes up for previously reported reports that are older than a day.) I remember when it was 72 hours (to accomodate the weekend) and they dropped it to 48 hours. It was 48 hours in October, so not sure if this is one thing they changed during the server "upgrade" on 18 Oct 2022.
  8. Good luck on the fix. Looks like the second link has a temporary solution.

    https://forum.spamcop.net/topic/45578-broken-captcha-in-signup-page/

    https://forum.spamcop.net/topic/29780-captcha-problem-on-registering/
×
×
  • Create New...