What Happens After You List an Item on a Marketplace

clock Apr 16, 2026
pen By Anna Vannisse
Market place

Overview

Online marketplace scams are becoming increasingly common, particularly on platforms where individuals buy and sell directly with each other.

According to Bank Australia, buying and selling scams were the most reported scam type involving financial loss in 2025, with over 9,600 reports resulting in $8.6 million in losses. While many of these scams involve relatively small amounts, often under $300, their impact is significant, especially during ongoing cost-of-living pressures.

A key trend is that scammers are becoming more organised. They often reuse legitimate listings, copy product information, and rely on speed and urgency to catch people off guard. Messaging patterns are frequently scripted and repeated, suggesting coordinated activity rather than individual behaviour.

This isn’t just happening to buyers. Sellers are also being targeted.

I recently started selling a few things on Depop, just clearing out my cupboard.

Straight after posting a listing, I started getting emails. A lot of them.

All from random email addresses, all saying basically the same thing:

“Hey, is your listing still available?”

At first, I was confused why I was getting emails instead of direct messages through Depop. Then another question came up pretty quickly, where did they even get my email address from? I hadn’t shared it anywhere on the platform.

This kept happening every time I posted a new listing, and that’s when I started to recognise a pattern.

Observed Patterns

Across the emails received immediately after listing, a consistent pattern started to emerge. Messages repeatedly copied listing titles word-for-word in both the email headings and the body, with different senders using similar wording. They were arriving within minutes of posting, not over time like you’d expect from real buyers.

Emails referencing the exact listing title, received from multiple senders within minutes of posting

(Emails referencing the exact listing title, received from multiple senders within minutes of posting)

The behaviour also escalated beyond basic enquiries. Emails began to mimic legitimate notifications, including fake “item sold” confirmations and account-related alerts. These were delivered through a mix of third-party platforms such as Calendly, Zcal, Studio.Design, Microsoft Teams, and ClickUp.

Fake “item sold” email sent via Studio.Design, impersonating a Depop transaction notification

(Fake “item sold” email sent via Studio.Design, impersonating a Depop transaction notification)

Fake Depop “sale” notification delivered via ClickUp, prompting account verification

(Fake Depop “sale” notification delivered via ClickUp, prompting account verification)

Fake Depop “account verification” email sent via Calendly, prompting identity confirmation

(Fake Depop “account verification” email sent via Calendly, prompting identity confirmation)

Fake “item sold” email sent via Zcal, impersonating a Depop transaction

(Fake “item sold” email sent via Zcal, impersonating a Depop transaction)

Fake Depop “account flagged” notification sent via Calendly, prompting recovery action

(Fake Depop “account flagged” notification sent via Calendly, prompting recovery action)

Looking deeper into one of these emails reveals another clear red flag. While the message appears to come from “Depop Help (via zcal)”, inspecting the sender details shows a completely unrelated Gmail address listed as the reply-to contact.

“Depop Help” email sent via zcal, with sender details revealing an unrelated Gmail reply-to address

(“Depop Help” email sent via zcal, with sender details revealing an unrelated Gmail reply-to address)

This mismatch between the display name and the actual sender address indicates that the email is not coming from Depop, but from a third-party tool being used to send messages at scale. It also suggests that any replies would be directed to an unrelated personal inbox, rather than an official support channel.

Sender details showing a generic Gmail reply-to address

(Sender details showing a generic Gmail reply-to address)

This type of setup is commonly used in phishing attempts, where legitimacy is implied through branding, but the underlying sender details are completely unrelated.

In some cases, the emails were also sent to multiple recipients at once. In one example, a Calendly-generated message included a visible list of multiple unrelated email addresses within the same notification. The event organiser was also listed as a random Gmail account, rather than an official Depop domain.

Fake “Depop verification” invite sent via Calendly, with a generic Gmail organiser

(Fake “Depop verification” invite sent via Calendly, with a generic Gmail organiser)

Email exposing multiple unrelated recipients, indicating bulk distribution

(Email exposing multiple unrelated recipients, indicating bulk distribution)

In another example, an email claiming to be from “Depop support” was sent via a Shopify email service and addressed to a large group of unrelated recipients simultaneously.

Impersonated “Depop support” email sent from an unrelated domain to multiple recipients

(Impersonated “Depop support” email sent from an unrelated domain to multiple recipients)

This combination of bulk recipients and mismatched sender details indicates mass distribution rather than legitimate one-to-one communication. It is also inconsistent with how Depop communicates with users. Official emails come from verified @depop.com domains, not generic Gmail accounts.

This pattern is not isolated. Similar behaviour has been observed by other sellers, including examples of Microsoft Teams meeting invites sent to multiple recipients simultaneously, reinforcing that this activity is distributed at scale [this example Facebook post].

Taken together, these behaviours suggest something structured and coordinated, rather than genuine user activity. This includes not only fake buyer enquiries, but also impersonation of platform notifications and support communications.

How This Fits Broader Marketplace Scams

This behaviour also aligns with known marketplace scam tactics.

Common patterns include:

These tactics are widely documented across reselling platforms.

Scammers often target new or active listings and attempt to move interactions outside protected environments.

Supporting Evidence from Other Sellers

This behaviour is not isolated to a single experience. Multiple sellers report the same sequence of events after listing items.

Examples include:

Across these examples, the pattern is consistent: listing goes live → emails begin almost instantly

While these are anecdotal, the consistency across independent users reinforces that this is a repeatable pattern rather than isolated incidents.

What This Suggests

One likely explanation is how public marketplace listings are picked up and reused.

Ecommerce data scraping refers to extracting publicly available data such as product titles, pricing, and listing information at scale.

While this is commonly used for legitimate purposes like price monitoring or competitor analysis, the same mechanism can also be used differently.

When a listing goes live, its data can be:

This would explain:

Once this data is collected, it can be fed into third-party tools such as email platforms, scheduling services, or workflow tools. These tools are designed to generate and distribute messages at scale, including automated emails, calendar invites, and system notifications.

This type of approach has been observed in broader phishing campaigns. For example, researchers have identified cases where fake Calendly invitations were used to impersonate legitimate organisations and distribute phishing messages at scale, taking advantage of the trust users place in familiar scheduling tools.
This would explain why messages appear to come from services like Calendly, Zcal, Shopify email systems, or Microsoft Teams, despite not being connected to any real transaction or interaction.

While the exact method used to obtain contact details is unclear, the consistency and timing suggest the activity is driven by automated processes rather than individual users.

Taken together, this strongly suggests the activity is automated rather than manual.

What Platforms Say

These recommendations align directly with the behaviours observed in this case.

Why This Matters

For new sellers especially, this type of activity can be misleading.

It looks like genuine demand, and it creates urgency.

But engaging with these messages can lead to:

Key Takeaways

If you’re selling on marketplaces like Depop:

Final Observation

The speed, consistency, and structure of these messages do not reflect normal user behaviour. They point to automated activity reacting to newly listed items.

More importantly, this highlights a key risk for sellers. Communication that happens outside of the platform cannot be trusted in the same way.

All legitimate interactions – whether it’s messages, payment confirmations, or sale notifications, should happen within the marketplace itself. Emails claiming an item has been sold, your account needs verification, or asking you to take action should always be treated with caution unless they are clearly verified through the platform.

Recognising this pattern is critical. If a message is coming from outside the platform, it is far more likely to be part of an automated scam or impersonation attempt than a genuine interaction.

Follow unphish on LinkedIn to stay ahead of the latest threats targeting your industry.

About unphish

unphish is a threat detection and disruption platform built to identify and take down phishing, scams, and digital impersonation at scale. We combine intelligence-led detection with automated enforcement to help organisations protect their brand, customers, and digital ecosystem.

Create your account