• Advisory services
  • Consultations
  • Network and technology policies
  • Network and technology service docs
  • Using Jisc community
  • Network and technology service docs
  • Domain name registration
  • How to sign up
  • Janet Support Manual
  • Janet CSIRT
  • Back-up services
  • eduroam
  • Backup Web Hosting
  • Certificate Service
  • Connection timeline
  • Eligibility
  • Janet 3G Buyer's Guide
  • Janet 3G eduroam interoperablity authentication methods
  • Janet Mail Services
  • Janet Network Charges
  • Janet Reach
  • Janet Videoconferencing Feedback results
  • Primary connections
  • Supporting Business Continuity
  • Business and Community Engagement (BCE) using Janet
  • Cost
  • Interconnect connections
  • Connecting student accommodation
  • Customer-owned routing equipment
  • Obtaining a Janet IP Address Range
  • Terms for the Provision of the Janet Service
  • Upgrading your existing bandwidth and Janet router
  • Fault reporting
  • IP address assignment
  • Janet Aurora
  • Janet Netsight
  • Janet txt
  • Routers
  • Network set-up
  • Guest access
  • Network time service
  • Training
  • Contact
  • Primary Nameserver Service
  • Secondary Nameserver Service
  • Vscene
  • Janet CSIRT
  • About CSIRT
  • Technical advice
  • Reporting abuse
  • Security advice
  • Reporting abuse
  • Reporting abuse originating from Janet
  • Reporting abuse if you are a Janet user
  • Reporting spam or other e-mail abuse
  • Reporting port or address range scanning
  • Reporting Denial of Service attacks

Reporting spam or other e-mail abuse

Download as PDFDownload as PDF

Abuse from Janet addresses or domains

See the general guidance Reporting abuse originating from Janet for notes on which domains and IP addresses are part of Janet.

Please remember that almost everything in an instance of e-mail abuse is untrue and deliberately misleading. The appearance of a Janet domain or IP address in a message does not on its own make it certain that Janet or any Janet organisation is responsible.
Working out where responsibility lies is a detailed and difficult task. Tools are available, but even these are not entirely reliable.

What to include in your report

The most valuable information is one or more message headers. The header is the set of lines sent at the top of a message, but not always shown on the screen unless you ask to see them.
It contains some information that you will easily see (lines beginning “From:“, “To:“. “Subject:“. “Date:“);
but also many other lines normally less interesting (those beginning “Received:“, “Message-ID:” or “X-Originating-IP:” are particularly important).
“Date:” is not the same as “Sent:“; it will include timezone information possibly indicating where in the world the message came from.

To see the message header you may have to take some particular action depending on your e-mail program or service, such as:

  • Right-click on a message summary line and select “Options“;
  • Right-clickon a message summary line and select “Properties“;
  • Press the “BLAH BLAH” button;
  • Choose “Display full header information“;
  • Choose “Message Headers“, “Advanced“;
  • Choose “View message source“.

Copy and paste the message header into your report to Janet CSIRT.

Including the rest of the message should be easier; “Forward” or copy and paste are usually good enough.

You may wish to add some information that is not in the message itself, such as:

  • How many messages you had like this one;
  • When the abuse began and ended;
  • Details of any damage the message has done to you or your network (it may have carried a worm or virus, for example).

To get your report to Janet CSIRT see the general guidance Reporting abuse originating from Janet, which also explains how we will respond.

Abuse of Janet from outside

If you belong to a Janet organisation and you have suffered e-mail abuse such as UBE, viruses or harrassing messages, please note the advice in Reporting abuse if you are a Janet user. Normally users should refer first to their local IT support or network staff.

The information required is the same as that described above where the abuse may have originated within Janet, but it not always easy to decide where to send the report. You should normally decide on the basis of the IP addresses involved, rather than the apparent source e-mail addresses or domains; but even IP addresses can be misrepresented (abuse message headers commonly include additional false “Received:” lines intended to make correct reporting harder).