Shame on you, stupid spammers.. Sh4meful  DMARC Spoof Detection

IP Address: 165.212.64.22

This page shows DMARC authentication failure data for this IP address. Learn more about this data.

Geolocation Information
Country:
US United States
Region:
Connecticut
City:
Danbury
Coordinates:
41.3908, -73.4483
WHOIS Information
Network Name:
SILVERSKY-INC-USANET
CIDR:
165.212.0.0/17
Owner:
USA.Net Inc
Org ID:
USANET-1
Address:
3015 Carrington Mill Boulevard, Suite 400, Morrisville, NC 27560
Reverse DNS:
gwo2.mbox.net
Last updated: 2/5/2026

Analysis

This IP has generated DMARC failures across 9 messages over a long period from March 25, 2025 to March 11, 2026. The low volume sustained over time suggests infrequent or low-priority abuse activity. Every message observed from this source failed both SPF and DKIM verification. Receiving mail providers took no enforcement action beyond reporting, indicating the sending domain's DMARC policy is set to p=none.

The reverse DNS record resolves to gwo2.mbox.net. Whether this represents legitimate mail infrastructure depends on whether the hostname aligns with the domains this address is claiming to send on behalf of.

Geolocation places the host in Danbury, United States, on infrastructure operated by USA.Net Inc. Abuse-reporting channels in this jurisdiction are generally responsive, and reports to the network operator can result in timely remediation.

The address is registered to USA.Net Inc (SILVERSKY-INC-USANET), an enterprise network operator. Concentrated authentication failures on enterprise address space can indicate either a compromised internal host being used as an unauthorized sending relay, or an organization knowingly or unknowingly operating as a spam source.

Across the wider SILVERSKY-INC-USANET network, 5 distinct IPs have been associated with 22 authentication failures over 27 observed messages, spanning 1 country. Most observed IPs on this network contribute to the failure count, suggesting the range as a whole warrants elevated scrutiny.

If your domain appears in the From header of mail from this address, treat it as probable spoofing. Verify that your SPF record does not authorize this host, directly or through nested include mechanisms, and that no DKIM selector you publish has been issued to it. If both checks come back clean, the receiver's none enforcement action is doing its job.

Your DMARC policy posture matters more than any IP-level response here. A p=none policy provides visibility but no enforcement, meaning mail is reported but not blocked. Moving to p=quarantine and then p=reject closes the gap for attackers who manage partial alignment. Domains that remain at p=none long-term tend to be impersonated repeatedly, because the cost to the attacker of attempting is effectively zero.

Blocking this individual address has limited durability: an attacker can rotate to another address in the same /24 subnet at effectively zero cost. More durable responses include monitoring aggregate DMARC reports so new sources are visible as they emerge, tightening SPF to remove overly permissive include chains or +all mechanisms, and ensuring DKIM is signing every legitimate outbound stream so alignment failures are unambiguous. The formal abuse contact for USA.Net Inc is listed in ARIN WHOIS records, and timely remediation is achievable through that channel.

Network Topology

Failures Detected from this IP
Showing 1-8 of 8 failures, affecting 9 messages
Date โ–ผ Messages
3/11/2026 1
2/25/2026 1
12/17/2025 1
12/3/2025 1
11/19/2025 2
5/13/2025 1
3/27/2025 1
3/25/2025 1
External Reputation Lookups

Look up this IP in external threat intelligence and reputation databases (opens in new tab):

Nearby IPs

Other IPs in the 165.212.64.0/24 range observed failing DMARC:

165.212.64.21 (6 failures), 165.212.64.25 (5 failures), 165.212.64.24 (2 failures), 165.212.64.31 (1 failure)