Knowledge base
1000 FAQs, 500 tutorials and explanatory videos. Here, there are only solutions!
Understanding spam traps (Spamtrap / Honeypot)
This guide explains what spamtrap email addresses are.
Spamtrap, honeypot
A spamtrap, also known as a honeypot, is a tool used to detect and catch spammers. It is essentially an email address or system that is created with the purpose of attracting unwanted messages, such as spam.
How a Spamtrap Address Works
A spamtrap address works by attracting spam and identifying the senders of unwanted emails. Here's how it can happen:
- Creation of the spamtrap address: An email address is created specifically to act as a spam trap; it is usually configured to not receive legitimate communication
- Concealment of the address: The spamtrap address is hidden or obscured so that it is not visible to legitimate users, but only to spammers; this can be done by placing it on hidden web pages, in forums inaccessible to the public, or making it invisible to humans (e.g., using white text on a white background)
- Collection by spammers: Spammers use automated techniques to extract email addresses from various sources, such as websites, forums, social networks, or stolen address lists; during this process, they may inadvertently or intentionally include spamtraps in their lists
- Reception of spams: When a spammer sends a message to a spamtrap address, it is captured and recorded; since the address is not used for legitimate communication, any mail received is considered unwanted
- Detection of spammers: When a spamtrap receives spam, it triggers an alert for email service providers like Infomaniak; they can then identify the sender of the spam by examining the message headers or information related to the source IP address
- Actions against spammers: Once a spammer is identified through a spamtrap address, measures can be taken to block or filter their unwanted messages; Infomaniak may add the spammer's IP address to a blacklist, implement stricter anti-spam filters, or take other actions to protect their users
Link to this FAQ: