Spam Sting

from the get-'em dept

DSLReports set up a little sting operation to catch a spammer, and the results were fairly interesting. They had a hidden page set to generate a random email address, and they recorded the IP address of everyone who hit that page – so they could match the IP address with the specific random email address. They very quickly (8 hours) started receiving spam from someone who accessed the page. Though, they have the evidence of where the person came from (on the @Home network, now run by Cox), @Home and now Cox haven’t cared enough to do anything. However, they point out that setting up a similar “sting” operation could be done pretty easily. Perhaps someone should tell the FTC about this – and see if they’re really serious about going after spammers.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...