New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
Yikes. I know a few and it's a secret I guard closely. If someone is giving them out, they're not going to be good for long.
But there are also those publicly known, such as on the pages of RBL lists in the footer.
Generally these are not known to prevent list washing - but some are there just for basic bot scrapers that are public. Here is one: ' [email protected] '
source : http://www.uceprotect.net/en/index.php?m=8&s=0
I have a somewhat related question. How can I inject some email addresses into spammers' mail lists?
@chihcherng Why would you want to do such a thing? To harass the person with the email you want to inject?
I used to call it "mail bomb" but these days I don't think you want to google that string.
I used to detect malware-infected computers with greylisting. For this to work, spammers have to send their spam to mail domains under my control. It's not easy since I don't know how spammers build their mail lists.
its called a "Honeypot"
eg https://www.projecthoneypot.org/ does that on a larger scale.
If you could just look them up in a list, spammers could do that as well. It doesn‘t work that way.
Many seem to just scrap websites and stuff like that for email addresses. (Often with simple regexes.) So, posting that honeypot email somewhere public is probably your best bet.