IP Address Inspector
The Project Honey Pot system has detected behavior from the IP address consistent with that of a mail server and dictionary attacker. Below we've reported some other data associated with this IP. This interrelated data helps map spammers' networks and aids in law enforcement efforts. If you know something about this IP, please leave a comment.
|First Received From||approximately 7 years, 1 month, 4 weeks ago|
|Last Received From||within 4 years, 8 months, 1 week|
|Number Received||347 email(s) sent from this IP|
|Dictionary Attacks||8 email(s) sent from this IP|
|First Received From||approximately 6 years, 1 month, 3 weeks ago|
|Last Received From||within 4 years, 9 months, 5 weeks|
419 Attachment email from IP 126.96.36.199, using 3 Yahoo IP's. including above IP, as relays:
Is me Mary Jones
Mary J (firstname.lastname@example.org)
This is the same Spammer, frequently reported to email@example.com (until their recent reporting format change to "ARF", that doesn't allow explanations), who regularly uses 3 Yahoo accounts to relay Spam emails to obfuscate his actual location. Yahoo shares full culpability for the proliferation of this Spammer's emails, in that Yahoo employs scanning software (rather than humans capable of making a judgement call) not programmed to recognize Yahoo's involvement unless the originating IP is a Yahoo address, allowing the Yahoo accounts to remain open to relay even more Spam. In failing to supply subscribers with an adequate means of closing these Yahoo accounts, which violate the Can Spam Act of 2003, Yahoo is itself in violation of Sec6(a)(3)(A) of said Act, as well as guilty of aiding/ abetting violation of said Act by allowing the Spammer to use Yahoo facilities for obfuscation of his location and proliferation of his Spam after notification of such actions.
December 31 2010 10:10 AM