: Spam Warrior :
: Lately (as in the past few months [Ed.: Summer
2001]), I've been receiving literally gobs
: of spam. It's not your ordinary spam (although I get a little of that
: too). These are spam/viruses, most notably the Hybris worm, on which
: there's some excellent
information online.
: However, I'm attempting to fight back using what tools
are available.
: The interactive portion of this piece is that I'm going to walk you
: through what I'm doing (i.e. you're going to do it too).
: Here's a list of the date, IP, carrier and country from
which I've received
: a spam/virus over the course of a few days in July.
7.12 |
211.3.232.66 |
Japan Telecom |
Japan |
7.12 |
200.203.141.82 |
Brazil Telecom |
Brazil |
7.12 |
148.221.152.131 |
Telefonos de Mexico |
Mexico |
7.12 |
217.227.30.7 |
Deutsche Telekom AG |
Germany |
7.12 |
202.108.44.206 |
Chinanet-BJ of China Telecom |
China |
7.13 |
212.23.253.116 |
Colt Telecom AG |
Switzerland |
7.14 |
213.132.137.246 |
TVD Internet |
Belgium |
7.15 |
202.96.154.20 |
Chinanet Guangdong Province of China Tel. |
China |
7.15 |
213.6.250.93 |
MobilCom Cityline GmbH |
Germany |
7.15 |
63.144.65.127 |
Qwest Communications |
USA |
7.15 |
202.158.92.211 |
PT. Cyberindo Aditama |
Indonesia |
7.15 |
164.77.129.11 |
??? |
??? |
: [Update] I'm also maintaining a more
complete log of all IP spamming me to date.
: Alright, let's get to work!
: Getting started :
: You'll need to find the IP address of an email you want
to trace. If you're
: on a Windows machine and/or using Outlook Express, this step is very
: dangerous. As far as I know, there's no way to get the originator's
IP
: without openning an email. Since I'm on a Mac, I'm pretty safe from
: most virii.
:The first thing you want to do is to display the full
header that came with
: the email.
: Handily enough, I just now received another Hybris worm
for me to use
: as an example. The Spam Gods must be smiling on me today!
Hybris.gif
: I'm using Eudora, so I've displayed the full message
header by toggling
: the "Blah Blah Blah" button. In Outlook, select the message
and choose
: Edit > Properties. Not sure how to do it in Netscape.
: I've highlighted the important information. In blue
we have the originator's
: server name (the domain name entry) and the IP address. In yellow
we
: have the message ID that the server acc.haverford.edu used to log
the
: message transmission.
: (You might have noticed that I've now received 30 attachments named
: "enano porno.exe" !)
: Stalking the Spammer :
: With the originator's IP address in hand, we hop over
to
: http://samspade.org to do the dirty
work. You can do this from your own
: computer, but samspade provides many handy tools with a web-interface.
samSpade_start.gif
: I first conduct a Whois query, an IP block query and
a Tracerout. The Whois
: query returns ownership information that sometimes contains information
: about who owns the server that transmitted the email (which is typically
the
: culprit's ISP's computer unless the asshole is running his own mail
server).
: The IP Block returns information about who owns the range of IP addresses
: into which our spammer falls. This is crucial for making contact upstream
of
: the sender. Finally, the Traceroute provides a transcript of machines
that
: lie between SamSpade.org and the target IP address.
: Let's see what comes up from
the queries.
|