<Li> A feedback loop subscriber can be selected as a target by a mailbox provider after receiving an end - user report . Users should be aware of their provider's policy . </Li> <Li> The abuse POC of an authenticated domain who handled the reported message . DomainKeys Identified Mail (DKIM) is the usual authentication protocol, but Sender Policy Framework (SPF) can be used in the same way . A mailbox provider choice . </Li> <Li> The abuse POC for the IP address of the last relay . Some skill is required to properly locate such data . This is the default choice for a mailbox provider whose server had received the abusive message (before the recipient reported it) and annotated the relevant IP address . There are various sites who maintain POC databases, such as Network Abuse Clearinghouse (by name), Abusix (by IP address (number)), and more . There is also a hierarchy of delegations at the relevant Regional Internet registry (RIR), and each corresponding Whois record may include a POC, either as a remark or as a more specific database object, e.g. an Incident response team . </Li> <P> The first three methods provide for full email addresses to send reports to . Otherwise, target abuse mailboxes can be assumed to be in the form defined by RFC 2142 (abuse@example.com), or determined by querying either the RIR's whois databases--which may have query result limits--or other databases created specifically for this purpose . There is a tendency to mandate the publication of exact abuse POCs . </P>

What does report as spam mean on whatsapp