DMARC Spoof Detection, Failed Authentications
About this Project
▶Sh4meful tracks IP addresses caught sending unauthorized email, detected through DMARC report analysis across millions of authentication records.
Every entry here is an IP address that failed both SPF and DKIM authentication checks for domains I monitor. In most cases, that means someone (or something) used the domain name without permission; a signature pattern of email spoofing, phishing, spam, and other abusive mail activity.
The dataset is drawn from DMARC aggregate reports and represents a fraction of a larger corpus spanning millions of messages. Each record shows what failed and where: the source IP, its network, its geography, and limited metadata from the authentication event. Determining intent, whether a failure is hostile or incidental, requires context beyond what DMARC provides, but the patterns speak clearly enough at volume.
Not every failure is malicious. Some legitimate services (email security gateways, spam filters, phishing analysis platforms) break authentication as a side effect of message inspection or forwarding. I track these confounders separately and hide them by default, though they remain available for review. Much of that traffic is benign infrastructure noise. Some isn't.
Elements of this dataset and supporting models will eventually be open-sourced on GitHub. (More)
8,010
2,394
904
13,522
Failures
Showing 1-10 of 8,010 failures, affecting 13,522 messages| Date ▼ | Source IP | Country | City | Network | Messages |
|---|---|---|---|---|---|
| 4/15/2026 | US United States | Fremont | 1 | ||
| 4/15/2026 | DE Germany | 1 | |||
| 4/15/2026 | ES Spain | Barcelona | 1 | ||
| 4/15/2026 | KZ Kazakhstan | Karaganda | 1 | ||
| 4/15/2026 | RU Russia | Ivanovo | 1 | ||
| 4/15/2026 | JM Jamaica | 1 | |||
| 4/15/2026 | RU Russia | 1 | |||
| 4/15/2026 | RU Russia | Ufa | 1 | ||
| 4/15/2026 | BR Brazil | Sinop | 1 | ||
| 4/14/2026 | US United States | North Charleston | 1 |
DMARC Activity
Most Active Networks by Spoof Volume (30 days)
Top networks by failed message volume over the last 30 days.
UZTELECOM
HINET-NET
VIETTEL-VN
spaceshipnetworks
RIPE
KORNET-KR
GPON_FTTH_SERVICES
IP2000-ADSL-BAS
CORPORACION FIBEX TELECOM, C.A.
CMNET
GOOGLE-CLOUD
Claro NXT Telecomunicacoes Ltda
TELESISTEMA S.R.L.
IDNIC-SENGKED-ID
AT-88-Z
Most Active IPs by Spoof Volume (30 days)
Top IP addresses by failed message volume over the last 30 days.
IP Intelligence Report for 193.253.101.87
IP Intelligence Report for 203.69.214.238
IP Intelligence Report for 181.177.12.111
IP Intelligence Report for 62.60.130.215
IP Intelligence Report for 103.163.161.182
IP Intelligence Report for 171.237.177.68
IP Intelligence Report for 136.117.85.113
IP Intelligence Report for 41.90.144.117
IP Intelligence Report for 157.15.66.101
IP Intelligence Report for 138.204.192.69
IP Intelligence Report for 190.120.255.5
IP Intelligence Report for 222.255.152.62
IP Intelligence Report for 122.185.40.86
IP Intelligence Report for 218.157.120.60
IP Intelligence Report for 196.202.46.10
IP Intelligence Report for 1.169.73.174
IP Intelligence Report for 190.143.29.45
IP Intelligence Report for 188.9.157.66
IP Intelligence Report for 61.220.94.221
IP Intelligence Report for 177.0.250.136
Top Threat Countries
- China - Email Spoofing Analysis
- United States - Email Spoofing Analysis
- Russia - Email Spoofing Analysis
- Germany - Email Spoofing Analysis
- India - Email Spoofing Analysis
- United Kingdom - Email Spoofing Analysis
- France - Email Spoofing Analysis
- Brazil - Email Spoofing Analysis
- Japan - Email Spoofing Analysis
- Canada - Email Spoofing Analysis
- Netherlands - Email Spoofing Analysis
- Australia - Email Spoofing Analysis
- South Korea - Email Spoofing Analysis
- Italy - Email Spoofing Analysis
- Spain - Email Spoofing Analysis
- Turkey - Email Spoofing Analysis
- Poland - Email Spoofing Analysis
- Ukraine - Email Spoofing Analysis
- Mexico - Email Spoofing Analysis
- Argentina - Email Spoofing Analysis