Hi,
Return-path: <
webmaster@dirks-computerecke.de>
Received: from h7n2fls31o875.telia.com ([213.66.41.7])
by vscan-c.ucl.ac.uk with smtp (Exim 4.20)
id 1ATfZs-0000Nd-9Q
for
decamp@math.ucl.ac.uk; Tue, 09 Dec 2003 10:58:52 +0000
Mostly the IP owner is not given...now it is....
anyway...i traced the IP 213.66.41.7
This is the only clue you have...and the only one that is always correct
because this is the IP used by the spammer...
This is the RIPE Whois server.
The objects are in RPSL format.
Rights restricted by copyright.
See
https://www.ripe.net/ripencc/pub-servic ... right.html
inetnum: 213.66.0.0 - 213.66.255.255
netname: TELIANET
descr: Telia Network services
descr: ISP
country: SE
admin-c: TR889-RIPE
tech-c: TR889-RIPE
status: ASSIGNED PA
notify:
backbone@telia.net
mnt-by: TELIANET-LIR
changed:
amar@telia.net 20010404
changed:
aca@telia.net 20020109
source: RIPE
route: 213.64.0.0/14
descr: TELIANET-BLK
origin: AS3301
mnt-by: TELIANET-RR
changed:
rr@telia.net 20010405
source: RIPE
role: TeliaNet Registry
address: Telia Network Services
address: Carrier & Networks
address: Box 10707
address: SE-121 29 Stockholm
address: Sweden
fax-no: +46 8 4568935
e-mail:
ip@telia.net
e-mail:
registry@telia.net
e-mail:
dns@telia.net
e-mail:
backbone@telia.net
admin-c: AA90-RIPE
tech-c: AA90-RIPE
tech-c: LK221-RIPE
tech-c: YL39-RIPE
tech-c: IC106-RIPE
tech-c: ACA-RIPE
tech-c: UL302-RIPE
tech-c: EC1084-RIPE
tech-c: JS7984-RIPE
tech-c: OE207-RIPE
tech-c: EER2-RIPE
tech-c: RR6890-RIPE
tech-c: PJ2540-RIPE
tech-c: IF264-RIPE
tech-c: LS483-RIPE
tech-c: AF145-RIPE
tech-c: AA1220-RIPE
nic-hdl: TR889-RIPE
notify:
mntripe@telia.net
mnt-by: TELIANET-LIR
changed:
fia@telia.net 20020319
changed:
eva@telia.net 20020821
changed:
eva@telia.net 20031014
source: RIPE
Just send the complete mail to
abuse@telia.net and if this is not correct then
to the others listed. (dns) most provider do us the abuse@domain name...
In their log they can trace back the point who did do it...
and with the new EU law on spamming more people should report those....
Also i check sometimes
https://213.66.41.7 in case its a script sending emails...
Regards,
OPtimizer