Am 20.01.22 um 01:23 schrieb Michael Peddemors via mailop:
Received: from 45-79-16-32.ip.linodeusercontent.com (HELO
in.constantcontact.com) (45.79.16.32)
by fe3.cityemail.com with SMTP
(f72f79fe-7953-11ec-b9b5-5f141a28f7b3); Wed, 19 Jan 2022 10:16:48 -0800
I presume fe3.cityemail.com is part of your own e-mail infrastructure and thus
trustworthy.
The SMTP client 45.79.16.32 is/was apparently under control of the spammer, nothing else in the e-mail header can be
trusted. It's all a big bunch of crap to throw you off track.
Most likely, neither google nor constantcontact have ever been involved in this e-mail. That doesn't make them good
guys, not at all, but sending abuse reports in their direction only creates more noise in their abuse systems, whether
they try to handle it or not.
As Mark said, the linode customer was cancelled, and that's all that needed to
be done.
Cheers,
Hans-Martin
As a software developer, I'm tempted to just write tools to analyze e-mail headers, so spam victims could disregard
anything not written by trustworthy MTAs, but when I look at real spam messages I see how hard some mail systems make
this task, and my temptation goes down the drain very quickly.
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop