Ernie B. said:
Look in the header of your mail, find the first IP address
and paste it into the WHOIS window.
The address will be in the form of: "Received: from outbound-
mail.lax.untd.com ([64.136.28.164])" and WHOIS will tell you that
the IP address belongs to juno.com. Your mail server received
the mail from there.
If there is a different IP address below that one then repeat
the process. That will be the IP address that forwarded or
relayed the mail.
Tracing back the IP address beyond the first "received" like is
frequently a waste of time because they are forged.
For example, here is the header from a recent spam I received:
--------------
Return-Path: <
[email protected]>
Received: from [see note 1 below] ([66.168.108.8]) by
your-email-server.com (the version of SMTP
softwere here) with other shit like SMTP id
AAA247; Sat, 2 Jul 2005 06:33:31 -0400
Received: from ham-2101.ruthless.webtv.net (36.107.21.244)
by falsify-2101.rockabye.webtv.net with scan-SMTP;
Sat, 02 Jul 2005 12:25:56 +0100
Date: Sat, 02 Jul 2005 06:32:56 -0500
Message-ID: <
[email protected]>
From: "Tory Charles" <
[email protected]>
To: <
[email protected]>
Subject: RE: your private invitation Gracie
X-Originating-IP: [216.175.86.44]
X-Mailer: Forte Agent 1.91/32.564
---------------
note 1:
What you see in the square brackets is not to be trusted. Frequently
it will be a forged machine.name@domain, or a forged IP address.
Sometimes it will even be the IP address of your own e-mail server (as
was the case in the above example).
The key is what you see in the first Received line. The IP address
(66.168.108.8) must reverse to match what is in the square brackets
immediately preceeding it. In the above case, a reverse lookup
(nslookup) of 66.168.108.8 fails. I'm not aware of any legitamate
e-mail server where a reverse lookup on it's ip address fails. If I
want to know who owns this IP address, I'll go to
www.arin.net and
type it in. In this case it's Charter Communications (not really a
surprise, as they seem to be doing nothing to block port-25 e-mail
sending of infected customer computers).
Because of the inconsistencies in the first Received line, the second
Recieved line is completely bogus and is designed to confuse and
mislead. Lots of other clues that the header has been massively
forged, like seeing "comcast" in the message ID, and seeing yet
another IP address in the "X-originating-IP" line.
If the text in the square brackets of the first Recieved line matched
the IP address in the first line, and if they both indicated a legit
e-mail server (ie "mail.snanet.co.uk" in this case) then I would look
to the second received line for more specific info about the identity
of the source of the e-mail.
In the case of viral e-mails, it is highly unlikely that the e-mail is
being sent through a legit e-mail server (they are all scanning
attachments these days). Viral e-mail is almost always being sent
directly from the infected computer without going through the ISP's
e-mail server, in which case you only need to look at the first
Received line to figure out where it's coming from.