== Demon Internet joins the webmail hall of shame Selected headers of a just-received advance fee fraud spam: Received: from lon1-mail-2.visp.demon.net ([193.195.70.5]) by ... Received: from lon1-mailstore-2.visp.demon.net (lon1-mailstore-2-port0.visp.demon.net [192.168.217.133]) by lon1-mail-2.visp.demon.net (MOS 3.5.8-GR) with ESMTP id CTM15721; Sat, 17 Sep 2005 04:55:21 +0100 (BST) Received: from 216.139.176.61 by lon1-mailstore-2.visp.demon.net (MOS 3.5.8-GR) with HTTP/1.1; Sat, 17 Sep 2005 04:55:21 +0100 From: Queensley Rhoda Subject: CONGRATULATION,YOU ARE A WINNER!! X-Mailer: Mirapoint Webmail Direct 3.5.8-GR 216.139.176.61 has been listed as part of [[SBL16836|http://www.spamhaus.org/SBL/sbl.lasso?query=SBL16836]] since *June 1st, 2004* as an advance fee fraud spam source. It's also in a number of other DNS blocklists. In September of 2005, more than a year later, Demon is still perfectly willing to accept outgoing webmail from it and as a result be part of spamming us. I am especially angered and saddened at Demon Internet joining the [[webmail hall of shame|WebmailBadSources]] because there once was a time when Demon was a shining example of high quality, geek friendly, clued in ISP. If there is *any* ISP that should know better, I would have thought it was Demon Internet. Time to teach our mail scanner how to determine IP origin information for yet another webmail source that is making us do their work for them. (I am not ready to refuse all email from Demon, which is my default reaction to webmail providers who make me do their work for them these days. It's tempting, though.)