Shame on you, stupid spammers.. Sh4meful  DMARC Spoof Detection

IP Address: 95.165.76.29

This page shows DMARC authentication failure data for this IP address. Learn more about this data.

Geolocation Information
Country:
RU Russia
Region:
Moscow
City:
Moscow
Coordinates:
55.7487, 37.6187
WHOIS Information
Network Name:
MGTS-PPPOE
CIDR:
95.165.0.0/16
Owner:
Moscow Local Telephone Network (PJSC MGTS) Moscow, Russia
Reverse DNS:
95-165-76-29.dynamic.spd-mgts.ru
Last updated: 4/19/2026

Analysis

This IP was observed generating a single DMARC authentication failure on April 18, 2026. With only one data point, the event is better read as a single suspicious observation than a sustained campaign. Every message observed from this source failed both SPF and DKIM verification. Receiving mail providers applied a reject disposition, refusing delivery outright.

The reverse DNS record (95-165-76-29.dynamic.spd-mgts.ru) matches a generic ISP address pattern, typical of consumer or small-business connections rather than dedicated mail infrastructure. Mail originating from addresses like this is frequently associated with compromised endpoints, such as home routers, IoT devices, or infected personal computers being used as part of a botnet.

Geolocation places the host in Moscow, Russia, within infrastructure operated by Moscow Local Telephone Network (PJSC MGTS) Moscow, Russia. Sanctions, regional routing policies, and limited abuse-response channels in this jurisdiction mean upstream takedown through the provider is typically slow or unavailable. Receiver-side filtering is the most reliable mitigation.

The address is registered to Moscow Local Telephone Network (PJSC MGTS) Moscow, Russia (MGTS-PPPOE). Enterprise-registered addresses that appear in DMARC failure data are typically either compromised hosts on the organization's network or outbound mail relays that are not properly authorized in the domain's SPF record.

Across the wider MGTS-PPPOE network, 1 distinct IP has been associated with 1 authentication failures over 1 observed messages, spanning 1 country. Activity on this network is sparse in this dataset, suggesting isolated rather than systematic abuse.

If your domain appears in the From header of mail from this address, treat it as probable spoofing. Verify that your SPF record does not authorize this host, directly or through nested include mechanisms, and that no DKIM selector you publish has been issued to it. If both checks come back clean, the receiver's reject action is doing its job.

Your DMARC policy posture matters more than any IP-level response here. The enforcement action applied to this mail indicates your policy is already providing protection. Maintaining p=reject across all your domains closes the gap for attackers who manage partial alignment. Domains that remain at p=none long-term tend to be impersonated repeatedly, because the cost to the attacker of attempting is effectively zero.

Blocking this individual address has limited durability: an attacker can rotate to another address in the same /24 subnet at effectively zero cost. More durable responses include monitoring aggregate DMARC reports so new sources are visible as they emerge, tightening SPF to remove overly permissive include chains or +all mechanisms, and ensuring DKIM is signing every legitimate outbound stream so alignment failures are unambiguous. The formal abuse contact for Moscow Local Telephone Network (PJSC MGTS) Moscow, Russia is listed in RIPE WHOIS records, though response from this jurisdiction is typically slow or unavailable due to regional routing policies.

Failures Detected from this IP
Showing 1-1 of 1 failures, affecting 1 message
External Reputation Lookups

Look up this IP in external threat intelligence and reputation databases (opens in new tab):