That's ok Suresh. We down-under are frequently victim of wider subnet blockades due to American (in particular, as a party we communicate with a lot) prejudices about larger subnets with smaller chunks routed to other APNIC member countries such as China and Korea. So I suppose it's all fair :-)

On my (private, personal) MTA I have several /24's (and bigger) permanently blocked due to the SNR being almost entirely, well, N. I can only assume that Shane has performed a similar analysis in order to take that particular response - or that the response is temporary.

When I saw Benoit's post I did look at some of the particularly nasty spam-run my company had this morning, unfortunately a different /24 (in an adjacent /16) and only a small proportion of the total spam-run originated from that particular IP range. Still it helps emphasise that there's an awful lot of compromised end-user-IP-addresses in the US, and even more "Legit" enterprises that are tacitly (or not) allowing spammy behavior to go on under some sort of 'guise' of legitimacy.

One recent example I saw came out of 'en25.com' but when searching my inbox for an example, I discovered that Twitter appear to be a legitimate customer of their services. :(

Resorting to IP range blocks is always a mixed-bag, but as long as providers who do so remain aware of the impact and responsive to any genuine false-positives that result, it is a far more 'useful' response than pretty much anything available to 'foreign' network operators.

Mark Foster
Wellington, New Zealand


On 1/06/2016 3:14 p.m., Suresh Ramasubramanian wrote:
With multiple million legitimate users of one of the largest broadband 
providers in the USA also mailing through the /24.

Brilliant, I must say.  You must enjoy hearing false positive reports from your 
users.

--srs

On 01-Jun-2016, at 8:02 AM, Shane Clay <sh...@caznet.com.au> wrote:

We're seeing the same and have also blocked that /24.

Regards,


Shane Clay    |    Director, Senior Engineer
www.caznet.com.au
Phone    08 8464 0052
211 / 147 Pirie Street, Adelaide SA 5000



-----Original Message-----
From: mailop [mailto:mailop-boun...@mailop.org] On Behalf Of Benoit Panizzon
Sent: Tuesday, 31 May 2016 11:41 PM
To: mailop@mailop.org
Subject: [mailop] Massive Spamrun from Cox Net: 68.230.241.0/24

Hello

At the moment we see a very large amount of emails containing Microsoft Office 
Documents containing malware, all originating from IP Addresses in the Range: 
68.230.241.0/24

We therefore blocked that range.

Anyone else? Maybe a Cox.Net Email Admin reading this list?

-BenoƮt Panizzon-
--
I m p r o W a r e   A G    -    Leiter Commerce Kunden
______________________________________________________

Zurlindenstrasse 29             Tel  +41 61 826 93 00
CH-4133 Pratteln                Fax  +41 61 826 93 01
Schweiz                         Web  http://www.imp.ch
______________________________________________________

_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop
_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop
_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop


_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

Reply via email to