Suped

How can I stop a relentless spammer who switches domains and sends via Google Workspace?

Matthew Whittaker profile picture
Matthew Whittaker
Co-founder & CTO, Suped
Published 10 Jul 2025
Updated 16 Aug 2025
6 min read
Dealing with a relentless spammer who constantly switches domains, especially one leveraging legitimate services like Google Workspace, can be incredibly frustrating. It feels like a game of whack-a-mole, where every time you block one domain, two more pop up. Traditional methods of blocking often fall short because the sender's identity is always changing.
The key to combating this persistent nuisance lies in a multi-faceted approach, combining robust email authentication for your own domain, diligent reporting, and understanding the attacker's tactics. You need to pivot from reactive blocking to proactive defense and continuous monitoring of your email infrastructure.

Understanding the threat

Spammers often choose platforms like Google Workspace because they offer perceived legitimacy and can bypass basic spam filters that might flag emails from less reputable senders. When a spammer switches domains, they're typically just registering new disposable domains and configuring them to send through a mail service, sometimes even a compromised Google Workspace account. Their goal is to stay one step ahead of blocklists and filtering rules, making it difficult to pinpoint a single source to shut down.
This tactic is a form of spoofing, where they make it seem like the email is coming from a legitimate source, even if it's not. They're not truly "using" your Google Workspace account, but rather sending messages that appear to originate from Google's infrastructure, often without proper authentication setup for their own changing domains. This lack of proper SPF, DKIM, and DMARC configuration on their part is something you can use to your advantage.
Understanding their modus operandi, which often involves rapid domain churn and reliance on the reputation of large providers, helps in developing more effective countermeasures than simply blocking individual addresses or domains. It requires looking at the broader picture of email authentication and abuse reporting.

Taking action: Reporting and authentication

Your first line of defense is consistent reporting. If the spam is coming via Google Workspace, report it directly to Google's abuse team. They have mechanisms for advanced phishing and malware protection and can take action against Workspace accounts being misused. While they may not immediately shut down the spammer, consistent reports contribute to a pattern of abuse that can lead to account suspension.
Simultaneously, ensure your own domain has robust email authentication in place. This includes correctly configured SPF and DKIM records, and crucially, an enforced DMARC policy. DMARC tells recipient servers what to do with emails that fail authentication and appear to be from your domain, preventing spammers from spoofing your email address. While this won't directly stop them from sending *their* spam, it protects your brand's reputation.
Transitioning your DMARC policy from p=none to p=quarantine or p=reject is a critical step. This instructs recipient servers to either quarantine (send to spam) or reject (block entirely) any email claiming to be from your domain but failing SPF or DKIM authentication. This directly undermines spammers who try to leverage your domain's perceived legitimacy, or simply use tactics that look like they are from your domain. For further assistance, a DMARC record generator can help you set this up correctly.

Target

Action

Expected Outcome

google.com logoGoogle Workspace
Report spam directly via Gmail's Report Spam feature.
Potential account suspension for the spammer over time.
Domain registrar
Identify the registrar via a WHOIS lookup and report abuse.
Domain suspension or takeover, disrupting spam campaigns.
Hosting provider
If a dedicated IP is used, report to their hosting provider's abuse desk.
IP blocklisting or suspension of hosting services.
Relevant blocklists
Spammer's IPs or domains added to public blocklists.

Strengthening your defenses

Beyond reporting, implement strong filtering rules within your own email environment. While individual domains might change, spammers often reuse content, subject lines, or even specific URLs within their messages. Look for common patterns that you can use to create rules that move these emails directly to your spam folder. These client-side or server-side rules (if you manage your own mail server) can provide a personalized shield against the immediate annoyance.
Another layer of defense involves understanding email blocklists. While individual domains might evade immediate listing, if the spammer uses consistent IP ranges or infrastructure, those can eventually land on a public blacklist. Regular blocklist monitoring can help you identify if any of the spammer's infrastructure has been listed, which can improve your filtering rules.

Leveraging email headers for clues

Every email carries a wealth of information in its headers, which can be invaluable when dealing with persistent spammers. These headers contain the full path the email took, including originating IP addresses, mail servers, and authentication results like SPF, DKIM, and DMARC. Analyzing these can sometimes reveal the actual sending infrastructure or the upstream provider that the spammer is using, which might not be immediately obvious from the From address. This knowledge empowers you to report abuse to the correct entity beyond just Google Workspace, such as the actual domain registrar or hosting provider. For more details on this, learn how to troubleshoot spam placement.

Ongoing vigilance

Effective spam combat is an ongoing process that requires continuous vigilance. Regularly monitor your email accounts and use tools like Google Postmaster Tools for insights into your domain's reputation and any unusual activity. While Postmaster Tools primarily focuses on your outgoing email, understanding its dashboards can indirectly help you see if your domain is being widely spoofed, which is a common tactic for spammers.
The constant domain switching by spammers means that direct, static blocking measures will always be reactive and often ineffective in the long run. The power lies in making your own email ecosystem more resilient to their tactics, and making it harder for them to successfully deliver their spam. Consistent reporting, though tedious, does contribute to a cumulative effort that can eventually lead to service providers taking action against repeat offenders.

Short-term relief

  1. Manual Filters: Blocking individual sender addresses or domains as they appear.
  2. Constant Updates: Requires daily vigilance and rule adjustments.
  3. Limited Effectiveness: Spammers often bypass these quickly by changing domains.

Long-term solution

  1. DMARC Enforcement: Protects your own domain from being spoofed by spammers.
  2. Consistent Reporting: Builds a case with ESPs and registrars for abuse.
  3. Domain Reputation: Improves your domain's trust and deliverability.

Reclaiming your inbox

Combating a relentless spammer who frequently switches domains and leverages platforms like Google Workspace is undeniably challenging. It’s a battle of attrition, but by fortifying your own email defenses with strong authentication, diligently reporting abuse to the relevant authorities, and maintaining a proactive stance, you can significantly reduce their impact. The goal isn't just to block them, but to make their efforts increasingly ineffective and costly, ultimately reclaiming your inbox.

Views from the trenches

Best practices
Implement a strict DMARC policy (p=reject) on your own domain to prevent spoofing of your email identity.
Consistently report spam to the relevant email service providers and domain registrars, providing detailed headers.
Analyze full email headers to identify sender infrastructure, originating IPs, and the actual sending service for reporting.
Common pitfalls
Relying solely on blocking individual sender email addresses or domains, which spammers easily bypass.
Failing to enforce DMARC on your own domain, leaving it vulnerable to being spoofed for malicious purposes.
Underestimating the persistence and technical agility of dedicated spammers who continuously adapt their tactics.
Expert tips
Monitor your domain's reputation using tools like Google Postmaster Tools for unusual spikes in spam complaints.
Consider utilizing advanced threat intelligence services that track known spammer infrastructures and IPs beyond basic blocklists.
Maintain a robust internal spam filter configuration that can adapt to changing spam patterns beyond simple sender rules and use a
Marketer view
Marketer from Email Geeks says: Dealing with spammers who constantly switch domains and sender identities, often utilizing services like Google Workspace, makes traditional blocking incredibly challenging.
July 23, 2021 - Email Geeks
Marketer view
Marketer from Email Geeks says: Analyzing the email headers of persistent spam messages is crucial to identify the originating mail platform and determine the appropriate abuse reporting channels for the spammer's hosting or email service provider.
July 23, 2021 - Email Geeks

Frequently asked questions

DMARC monitoring

Start monitoring your DMARC reports today

Suped DMARC platform dashboard

What you'll get with Suped

Real-time DMARC report monitoring and analysis
Automated alerts for authentication failures
Clear recommendations to improve email deliverability
Protection against phishing and domain spoofing