Am 20.01.22 um 01:23 schrieb Michael Peddemors via mailop:
Received: from 45-79-16-32.ip.linodeusercontent.com (HELO 
in.constantcontact.com) (45.79.16.32)
    by fe3.cityemail.com with SMTP
    (f72f79fe-7953-11ec-b9b5-5f141a28f7b3); Wed, 19 Jan 2022 10:16:48 -0800

I presume fe3.cityemail.com is part of your own e-mail infrastructure and thus 
trustworthy.

The SMTP client 45.79.16.32 is/was apparently under control of the spammer, nothing else in the e-mail header can be trusted. It's all a big bunch of crap to throw you off track.

Most likely, neither google nor constantcontact have ever been involved in this e-mail. That doesn't make them good guys, not at all, but sending abuse reports in their direction only creates more noise in their abuse systems, whether they try to handle it or not.

As Mark said, the linode customer was cancelled, and that's all that needed to 
be done.

Cheers,
Hans-Martin

As a software developer, I'm tempted to just write tools to analyze e-mail headers, so spam victims could disregard anything not written by trustworthy MTAs, but when I look at real spam messages I see how hard some mail systems make this task, and my temptation goes down the drain very quickly.

_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to