Shame on you, stupid spammers.. Sh4meful  DMARC Spoof Detection

IP Address: 2a01:111:f400:7e88::702

This page shows DMARC authentication failure data for this IP address. Learn more about this data.

Geolocation Information
Country:
US United States
Region:
Iowa
City:
Des Moines
Coordinates:
41.6015, -93.6127
WHOIS Information
Network Name:
UK-MICROSOFT-20060601
Owner:
ORG-MA42-RIPE
Reverse DNS:
mail-dm6nam10on20702.outbound.protection.outlook.com
Last updated: 2/5/2026

Analysis

This IP was observed generating a single DMARC authentication failure on September 12, 2024. With only one data point, the event is better read as a single suspicious observation than a sustained campaign. Every message observed from this source failed both SPF and DKIM verification. Receiving mail providers applied a quarantine disposition, routing messages to spam or junk folders.

The reverse DNS record (mail-dm6nam10on20702.outbound.protection.outlook.com) confirms this is a Microsoft 365 or Exchange Online relay address. Authentication failures from Microsoft's mail infrastructure typically reflect a legitimate sender whose SPF or DKIM alignment is broken, either through a misconfigured connector, a shared-tenant sending path, or a forwarder routing through Microsoft's infrastructure. Deliberate spoofing from Microsoft's own relay IPs is possible but uncommon; a misconfiguration investigation is the more likely productive first step.

Geolocation places the host in Des Moines, United States, on infrastructure operated by ORG-MA42-RIPE. Abuse-reporting channels in this jurisdiction are generally responsive, and reports to the network operator can result in timely remediation.

The address is registered to ORG-MA42-RIPE (UK-MICROSOFT-20060601), an enterprise network operator. Concentrated authentication failures on enterprise address space can indicate either a compromised internal host being used as an unauthorized sending relay, or an organization knowingly or unknowingly operating as a spam source.

Across the wider UK-MICROSOFT-20060601 network, 55 distinct IPs have been associated with 68 authentication failures over 73 observed messages, spanning 4 countries. Most observed IPs on this network contribute to the failure count, suggesting the range as a whole warrants elevated scrutiny.

For IPv6 addresses, per-address blocking provides minimal protection. Cloud providers and large networks typically allocate a full /64 prefix (containing approximately 18 quintillion addresses) to each customer. An attacker assigned a /64 can rotate through effectively unlimited addresses within the same prefix at no cost. Blocking should target the /48 or /64 prefix rather than the individual address.

If your domain appears in the From header of mail from this address, start with a misconfiguration investigation before assuming spoofing. Microsoft's infrastructure is used by many legitimate senders, and auth failures here most often reflect a broken SPF include chain, a DKIM signing gap on a shared sending path, or a forwarding rule that breaks alignment. Verify that your authorized senders on Microsoft are correctly publishing SPF and signing with DKIM before concluding the activity is malicious.

Your DMARC policy posture matters more than any IP-level response here. The enforcement action applied to this mail indicates your policy is already providing protection. Maintaining p=reject across all your domains closes the gap for attackers who manage partial alignment. Domains that remain at p=none long-term tend to be impersonated repeatedly, because the cost to the attacker of attempting is effectively zero.

Blocking this individual address has limited durability: an attacker can rotate to another address in the same /24 subnet at effectively zero cost. More durable responses include monitoring aggregate DMARC reports so new sources are visible as they emerge, tightening SPF to remove overly permissive include chains or +all mechanisms, and ensuring DKIM is signing every legitimate outbound stream so alignment failures are unambiguous. The formal abuse contact for ORG-MA42-RIPE is listed in ARIN WHOIS records, and timely remediation is achievable through that channel.

Failures Detected from this IP
Showing 1-1 of 1 failures, affecting 1 message
External Reputation Lookups

Look up this IP in external threat intelligence and reputation databases (opens in new tab):