And another wave today, yet again from CloudFilter.
We spoke with AWS Abuse and they decline all responsibility, claiming
their client is filtering 99.9% of the mail traffic and that's the
best they can do.
We told them that they, AWS, are ultimately responsible for what goes
through their IPs but I don't think they care too much.
I guess we have no choice but to filter stuff from cloudfilter.net
now.
Received: from omta034.useast.a.cloudfilter.net
(omta034.useast.a.cloudfilter.net [44.202.169.33])
by mx.emailarray.com (Haraka) with ESMTPS id
A94A689F-5CF1-4129-BD87-2E608BA5D643.2
envelope-from
(version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384
verify=FAIL);
Wed, 07 Aug 2024 10:24:28 -0400
Received: from eig-obgw-6001a.ext.cloudfilter.net ([10.0.30.140])
by cmsmtp with ESMTPS
id bZ5fsgUIF1zuHbhaVsQNeu; Wed, 07 Aug 2024 14:24:28 +0000
Received: from gator2020.hostgator.com ([50.87.144.40])
by cmsmtp with ESMTPS
id bhaVsB4pGZlJQbhaVsU8Xb; Wed, 07 Aug 2024 14:24:27 +0000
X-Authority-Analysis: v=2.4 cv=DMBE4DNb c=1 sm=1 tr=0 ts=66b3839b
a=ueSkPEc9ueNp9A22YARoSQ==:117 a=zC5AX3HYMT+EoHwkre0kbA==:17
a=yoJbH4e0A30A:10 a=5KLPUuaC_9wA:10 a=M51BFTxLslgA:10
a=r77TgQKjGQsHNAKrUKIA:9 a=nfzXN_1D1vkDWGjo8XUA:9 a=_W_S_7VecoQA:10
a=lqcHg5cX4UMA:10 a=wPNLvfGTeEIA:10 a=vWwkikaltYQp0TN3N84A:9
a=HXjIzolwW10A:10 a=T6a71-JsGAwA:10 a=n9Fe_nV6AAAA:8
a=vXiE34uwAAAA:8
a=mynJFlJUAAAA:8 a=SSmOFEACAAAA:8 a=L3Y5zZzAAAAA:8 a=RqOAJGx8AAAA:8
a=d_t_tmITr0b0QPWdVagA:9 a=n3BslyFRqc0A:10 a=rls1ZAiwvL0A:10
a=wlHTxKAh8-WCeF7hZiUK:22 a=M9YSxTOCAEJbVCuXNoiI:22
a=zVbuR8iKQoxsB8yWCZ44:22
a=CkH0bDIUNILjiUS69-rs:22
Received: from [221.155.150.165] (port=34334 helo=[197.211.61.137])
by gator2020.hostgator.com with esmtpsa (TLS1.2) tls
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
(Exim 4.96.2)
(envelope-from )
Scott
On Tuesday, 06/08/2024 at 13:58 Ken Simpson via mailop wrote:
Hi Scott,
The use of AWS IPs is quite unique. Many receivers treat AWS IPs with
great suspicion, but it's not per se impossible to use them to send
email. You can ask Amazon to remove them from the PBL and with some
forms filled in, Amazon will allow you to deliver email from their
IPs. But handling abuse via the Amazon team is a pain, since it goes
through a level of indirection.
Regards,
Ken
On Tue, Aug 6, 2024 at 10:05 AM Scott Q. wrote:
Well, I'm pretty sure Endurance is a customer of CloudMark, not
Amazon, hence why I was trying to reach them here.
They probably use Amazon IPs because they don't want their really high
quality IPs tainted by these mail customers...
Scott
On Tuesday, 06/08/2024 at 12:37 Ken Simpson via mailop wrote:
Hi Scott,
webhostbox.net [1] is a domain name associated with the Endurance
International Group [2] (now part of Newfold Digital). HostGator,
Bluehost, Site5, and many other older hosting brands are incorporated
under the EIG banner. These older hosts often run ancient installs of
WordPress, Drupal, and other platforms that are easily exploited by
spamming and phishing groups.
The Cloudmark organization is generally responsive to abuse
complaints; however, the cloudfilter.net [3] hosts seem to be owned by
Amazon Web Services, so your best bet might be to send spam reports to
AWS (honestly I'm surprised Proofpoint doesn't use their own IPs for
this):
# whois.arin.net [4]
NetRange: 35.71.64.0 - 35.95.255.255
CIDR: 35.71.64.0/18 [5], 35.71.128.0/17 [6],
35.72.0.0/13 [7], 35.80.0.0/12 [8]
NetName: AT-88-Z
NetHandle: NET-35-71-64-0-1
Parent: NET35 (NET-35-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Amazon Technologies Inc. (AT-88-Z)
RegDate: 2019-04-15
Updated: 2024-02-01
Ref: https://rdap.arin.net/registry/ip/35.71.64.0
OrgName: Amazon Technologies Inc.
OrgId: AT-88-Z
Address: 410 Terry Ave N.
City: Seattle
StateProv: WA
PostalCode: 98109
Country: US
RegDate: 2011-12-08
Updated: 2024-01-24
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email) Without
these we will be unable to identify the correct owner of the IP
address at that point in time.
Ref: https://rdap.arin.net/registry/entity/AT-88-Z
Regards,
Ken
On Tue, Aug 6, 2024 at 6:47 AM Scott Q. via mailop wrote:
If anyone from CloudMark, or if not, ProofPoint is on the list. Your
client webhostbox.net [1] is Spamming like crazy and getting through
your outbound filters. Literally every day thousands and thousands of
phishing messages.
Here's another sample
Received: from omta38.uswest2.a.cloudfilter.net [9]
(omta38.uswest2.a.cloudfilter.net [9] [35.89.44.37])
by mx.emailarray.com [10] (Haraka) with ESMTPS id
0FCEA3A7-F363-4114-AABC-3E17D23B4849.1
envelope-from
(version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384
verify=FAIL);
Tue, 06 Aug 2024 09:15:04 -0400
Received: from eig-obgw-6003a.ext.cloudfilter.net [11] ([10.0.30.151])
by cmsmtp with ESMTPS
id bDoksc7G2umtXbK1mssqkF; Tue, 06 Aug 2024 13:15:02 +0000
Received: from cp-in-20.webhostbox.net [12] ([216.10.240.60])
by cmsmtp with ESMTPS
id bK1jsXHUdV2ivbK1ks7EwD; Tue, 06 Aug 2024 13:15:01 +0000
Maybe up the filtering for this particular client of yours ? They
appear to get compromised easily and don't do much about it.
Thank you!
Scott _______________________________________________
mailop mailing list
[email protected]
https://list.mailop.org/listinfo/mailop
--
Ken Simpson
CEO, MailChannels [13]
Facebook [14] | Twitter [15] | LinkedIn [16] | Help Center
[17]
Our latest case study video: watch here! [18]
--
Ken Simpson
CEO, MailChannels [13]
Facebook [14] | Twitter [15] | LinkedIn [16] | Help Center
[17]
Our latest case study video: watch here! [18]
Links:
------
[1] http://webhostbox.net
[2] https://en.wikipedia.org/wiki/Endurance_International_Group
[3] http://cloudfilter.net
[4] http://whois.arin.net
[5] http://35.71.64.0/18
[6] http://35.71.128.0/17
[7] http://35.72.0.0/13
[8] http://35.80.0.0/12
[9] http://omta38.uswest2.a.cloudfilter.net
[10] http://mx.emailarray.com
[11] http://eig-obgw-6003a.ext.cloudfilter.net
[12] http://cp-in-20.webhostbox.net
[13]
https://www.mailchannels.com/?utm_source=Email%20Signature&utm_medium=Ken%20Simpson&utm_campaign=Website
[14] http://bit.ly/2dnoP3K
[15] http://bit.ly/2ehoWni
[16] http://bit.ly/2dw87lU
[17]
https://mailchannels.zendesk.com/hc/en-us?utm_source=Email%20Signature&utm_medium=Ken%20Simpson&utm_campaign=Help%20Center
[18] https://www.youtube.com/watch?v=psb41xDIL9k
_______________________________________________
mailop mailing list
[email protected]
https://list.mailop.org/listinfo/mailop