I generally use website ipTRACKER (http://www.iptrackeronline.com/email-header-analysis.php) to determine the origins of Spam and fraudulent email, and if the ISP is in the United States, I usually email them. I’d like to think that its part of being a good Net citizen. However, recently, I’ve come across a number of Spam emails whose headers generate a strange error message from ipTRACKER and cause it to not decode the header. This is not a transitory error; the same header produces the error anytime. I can’t help but suspect that the senders have gimmicked the header to do this. Can anyone wiser in the ways of Net protocols help me in understanding what is going on?
The error message reads: Fatal error: Allowed memory size of 33554432 bytes exhausted (tried to allocate 72 bytes) in /home/iptracke/public_html/includes/parsemail.php on line 122
Below is a sample of a header that causes the problem.
Thanks for helping to educate me.
====================
Return-Path:
Received: from mx01.vgs.untd.com (mx01.vgs.untd.com [10.181.44.31])
by maildeliver02.vgs.untd.com with SMTP id AABMUEDCHAA8NBRA
for (sender );
Thu, 28 Apr 2016 06:12:39 -0700 (PDT)
Authentication-Results: mx01.vgs.untd.com; DKIM=NONE
Received-SPF: None
Received: from mail.drewfoam.com (mail.drewfoam.com [199.106.157.13])
by mx01.vgs.untd.com with SMTP id AABMUEDCGAP6CTK2
for (sender );
Thu, 28 Apr 2016 06:12:38 -0700 (PDT)
Received: from 130.231.155.155 ([203.110.167.86]) by mail.drewfoam.com with Microsoft
SMTPSVC(6.0.3790.4675);
Thu, 28 Apr 2016 08:10:52 -0500
From: PayPal
Subject: Suspicious activity
MIME-Version: 1.0
Message-ID:
Content-Type: multipart/mixed; boundary=”aa4c9fd931628fd79f7c4ed3f5c40aec”
To: Undisclosed-recipients:;
Date: Thu, 28 Apr 2016 06:12:38 -0700 (PDT)
X-UNTD-BodySize: 46895
X-UNTD-SPF: None
X-UNTD-DKIM: NONE
X-ContentStamp: 5:2:3519474621
X-UNTD-Peer-Info: 199.106.157.13|mail.drewfoam.com|mail.drewfoam.com|members@verifier.com
X-UNTD-UBE:-1