On 03/12/2014 03:07, Matthias Leisi wrote: 

> On Tue, Dec 2, 2014 at 3:19 PM, LuKreme <krem...@kreme.com> wrote:
> 
>> On Dec 1, 2014, at 10:28 PM, Ted Mittelstaedt <t...@ipinc.net> wrote:
>>> This is assuming of course that your instantly blocking everything from a 
>>> sender that happens to email a honeypot.
>> 
>> Right. That i the *point* of a honeypot. The only thing going to a honeypot 
>> is going to be a spammer.
> 
> Not necessarily. At dnswl.org [1], we use spamtraps as one input source to 
> determine the trustworthiness of an IP - to list (and at what score) or if 
> not to list. 
> 
> A single spamtrap hit over an extended period of time for a system with a 
> high magnitude does not say much. And it's different if it's an ISP 
> mailserver or an "email marketing provider".

I see no difference, if I never have, never will, use say
deletet...@ausics.net and its used as a trap address (actually used as
examples in some of my pages/blog etc), *anyone* who sends to that
address, has got it via means of scraping, it clearly means it was taken
from a webpage, or a mailing list archive, if *anyone* sends *anything*
to that address it is unsolicited mail - spam, so that IP sender is
blacklisted and placed in a DNSBL as well because there is no possible
legitimate reason to send to that address, and reputation, trust - my
arse, again, no valid or legitimate reason to send to that trap address,
its sole purpose in life is to catch those who spam, if one person sees
it, they *will* be doing it to many many many others. 

Noel 

PS 

(for the spammers, since we know you scum read this list - that example
is only 1 of 7 trap addresses over a couple of domains I use, exempt it,
I'll still catch you out) 

 

Links:
------
[1] http://dnswl.org

Reply via email to