Shame on you, stupid spammers.. Sh4meful  DMARC Spoof Detection

IP Address: 50.207.167.103

This page shows DMARC authentication failure data for this IP address. Learn more about this data.

Geolocation Information
Country:
US United States
Region:
Michigan
City:
Bloomfield Hills
Coordinates:
42.5851, -83.287
WHOIS Information
Network Name:
CCCH3-4
CIDR:
50.128.0.0/9
Owner:
Comcast Cable Communications, LLC
Org ID:
CCCS
Address:
1800 Bishops Gate Blvd, Mt Laurel, NJ 08054
Reverse DNS:
mail.ekenmar.com
Last updated: 2/5/2026

Analysis

This IP has generated DMARC failures across 6 messages over a long period from December 10, 2024 to October 9, 2025. The low volume sustained over time suggests infrequent or low-priority abuse activity. Every message observed from this source failed both SPF and DKIM verification. Receiving mail providers applied a reject disposition, refusing delivery outright.

The reverse DNS record (mail.ekenmar.com) suggests the host is configured as mail infrastructure. In the context of authentication failures, this most often indicates either a misconfigured legitimate sender or a compromised mail server being used to relay abuse.

Geolocation places the host in Bloomfield Hills, United States, on infrastructure operated by Comcast Cable Communications, LLC. Abuse-reporting channels in this jurisdiction are generally responsive, and reports to the network operator can result in timely remediation.

The address belongs to Comcast Cable Communications, LLC, a residential ISP. Mail originating directly from residential IP space is almost never legitimate: ISPs block outbound port 25 for consumer customers, and residential addresses that do emit SMTP traffic are typically compromised devices in a botnet, including home routers, IoT devices, or infected personal computers.

Across the wider CCCH3-4 network, 3 distinct IPs have been associated with 10 authentication failures over 10 observed messages, spanning 1 country. Most observed IPs on this network contribute to the failure count, suggesting the range as a whole warrants elevated scrutiny.

If your domain appears in the From header of mail from this address, treat it as probable spoofing. Verify that your SPF record does not authorize this host, directly or through nested include mechanisms, and that no DKIM selector you publish has been issued to it. If both checks come back clean, the receiver's reject action is doing its job.

Your DMARC policy posture matters more than any IP-level response here. The enforcement action applied to this mail indicates your policy is already providing protection. Maintaining p=reject across all your domains closes the gap for attackers who manage partial alignment. Domains that remain at p=none long-term tend to be impersonated repeatedly, because the cost to the attacker of attempting is effectively zero.

Blocking this individual address has limited durability: an attacker can rotate to another address in the same /24 subnet at effectively zero cost. More durable responses include monitoring aggregate DMARC reports so new sources are visible as they emerge, tightening SPF to remove overly permissive include chains or +all mechanisms, and ensuring DKIM is signing every legitimate outbound stream so alignment failures are unambiguous. The formal abuse contact for Comcast Cable Communications, LLC is listed in ARIN WHOIS records, and timely remediation is achievable through that channel.

Failures Detected from this IP
Showing 1-6 of 6 failures, affecting 6 messages
Date โ–ผ Messages
10/9/2025 1
10/2/2025 1
9/25/2025 1
9/11/2025 1
12/19/2024 1
12/10/2024 1
External Reputation Lookups

Look up this IP in external threat intelligence and reputation databases (opens in new tab):