2 replies, 2 voices Last updated by Randall Blanchard 2 years, 5 months ago
Viewing 2 reply threads
  • Author
    Replies
    • #50116

      Randall Blanchard
      Participant
      @leftblank15

      Some political organization, supposedly originating in Arizona, KEEPS spamming me, from a “spoofed” e-mail domain, and I would like to be able to block them using my ISP’s “block list” of domains .

      Now, I’m on a 2015 MacBook Pro, running macOS Catalina v10.5.7+Security Update 2021-004, and using its Apple Mail, so I can “View” one of the suspect e-mail’s “Message”s, with “Full Headers”, but I don’t know how to decode the “full header”, so that I can discern the ACTUAL e-mail’s source-domain .

      Can you help ? — I DON’T want to get trapped, into clicking upon one of the e-mail’s “Unsubscribe”-links .

    • #50128

      TeamKomando:John
      Participant
      @264458

      Hello leftblank15,

      Such a great question, below you will find three tools available for helping you decode the message header.

      Mx Toolbox Email header analyzer
      Google Admin toobox Messageheader
      Azure websites Message Header Analyzer

      I hope that helps you accomplish what you are doing.

    • #51352

      Randall Blanchard
      Participant
      @leftblank15

      I accomplished it, (although NOT optimally), by setting a new rule in my Apple Mail, moving the spoofed e-mail to the “Junk”-folder .

Viewing 2 reply threads

You must be a Komando Community member to reply to this post. Sign up or log in.