Solved

Email Address Tracking...

Posted on 2006-07-20
5
279 Views
Last Modified: 2010-03-19
Dear All,

Every day some one sending me mail saying somthing new and new things by email.
I am always wondering from where they get my email id.
Some day back some one send me mail saying that i am bill gates and want password and all...
But i didn't give because i knew that How Bill
Gates Send me mail :)

So any onehelp me how can i trace the email ?
How can i trace the Location of Email coming from ?

Gen
0
Comment
Question by:mtc_com
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
5 Comments
 
LVL 5

Accepted Solution

by:
Dbergert earned 25 total points
ID: 17147256
even if you could track it... they would probably just spoof the IP anyway...  
you best best is to use a spam filtering solution or client..

you can look at the headers of the email to get some more information, but most likely it is spoofed...
0
 
LVL 6

Assisted Solution

by:e_vanheel
e_vanheel earned 25 total points
ID: 17149642
We have a Barracuda Spam firewall (hardware) - We have blocked over 1,000,000 emails this year alone.  You will more likely then not, not be able to track where the email is coming from like Dbergert said due to many reasons.

What would you do if you could trace where the email is coming from?  What are you trying to accomplish? - stop email from them?  
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Make the most of your online learning experience.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Suggested Courses
Course of the Month6 days, 23 hours left to enroll

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question