I think a lot of the thought is that "everyone" uses Comcast, Google,
Microsoft, Yahoo, etc. for the client side and the other side of the coin is
Mailgun, SendGrid, Mandrill, SES, etc. The concept of there being a server with
a few hundred users sending a few hundred message
ec1
>
> https://answers.microsoft.com/en-us/outlook_com/forum/all/messages-reported-as-250-queued-for-delivery-but/f451cda5-ba7d-45ff-b643-501efe2413dc
>
> https://answers.microsoft.com/en-us/outlook_com/forum/all/sendgrid-says-emails-delivered-but-customers-with/62de80ab-c006-4507-
info%2fmailop&data=01%7c01%7cmichael.wise%40microsoft.com%7c93fad3f60c784b14c55d08d2b484afae%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=zKUtbAc5dlB2YoC4OLX%2bZOeJfsBh4UAHPkY68hZW70s%3d
>
>
> --
> Marc Perkel - Sales/supportsupp...@junkemailfilter.com
> http://www.junkemailfilter.com
> Junk Email Filter dot com415-992-3400
>
>
> ___
> mailop mailing list
> mailop@mailop.org
> http://chilli.nosignal.org/mailman/listinfo/mailop
>
>
--
Luke Martinez
SendGrid Deliverability Consultant
520.400.5693
___
mailop mailing list
mailop@mailop.org
http://chilli.nosignal.org/mailman/listinfo/mailop
pplications.
Any outsourced "encrypted" mail provider is not going to be able to do as good
a job at this particular requirement, regardless of how competent they are, as
an in-house implementation just because of the integration with existing web
content. That in-house implementatio
ree cloud providers, Amazon, Azure,
and GoogleCloud.
And SendGrid shared bulk email platform is REALLY seeing an uptick in
malware being sent from their infrastructure.
And yeah, catfishing is still a thing, the small twitter sized 'I am
lonely and looking for a good man'. Usual sources, ya
Some attached spamples - all of them are exploiting the same flaw I
reported a *month *ago.
Attacker sends a message via Klaviyo, Sendgrid, SFR, etc to their own email
address, then massively replays that message via whatever IP addresses
under their control.
It doesn't matter that t
er side of the coin is
> Mailgun, SendGrid, Mandrill, SES, etc. The concept of there being a server
> with a few hundred users sending a few hundred messages a day in aggregate
> seems lost.
>
>
>
> -
> Mike Hammett
> Intelligent Computing Solutions
>
> Midwest Int
wise%40microsoft.com%7c93fad3f60c784b14c55d08d2b484afae%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=aDGXUYFMEZUZDQpWX3lpE6E6ghEHUizAxMk9pWtSY%2bI%3d
>> Junk Email Filter dot com
>> 415-992-3400
>>
>>
>> ___
>> mailop mailing list
>> mailop@mailop.org
Hi All,
Going into another weekend, and there is a lot of activity out there.
* Amazon EC2 spam on the increase again
* SendGrid Abuse still ongoing
* Similar patterns emerging in other ESP's
* Increase in VPS activation for malware Spam
* Cutwail increases on Chinese IP Space
* E
Add just the headers from a single abuse email here on the thread..
sanitize as needed.. seems that they of course can only use part of the
information as a forgery (eg SendGrid headers)
I think this is an attack vector that was seen back even a few months
ago, however that type of an attack
It appears that Jarland Donnell via mailop said:
>-=-=-=-=-=-
>
>Good news! They’ve been responding to abuse complaints. Favorably, I might add.
I've been sending ARF spam reports to them for years about every spam
they send me and the spam just keeps coming.
While I can somewhat believe that th
Hi all,
Hoping to get out of the office early today, start of the long weekend,
but remember, that's when the 'bad guys' like working.. but wanted to
get an update out before I go...
This week, it has still been about the really bad problem over at
SendGrid/Twilio
> On 23 Jan 2021, at 22:56, Ángel via mailop wrote:
>
> On 2021-01-22 at 18:24 +, Laura Atkins via mailop wrote:
>> I think it’s a great idea. We’ve even discussed putting a RFC
>> together listing this as best practice but have not found the time to
>> do it. Updating / superseding 2142 o
n allow that to get email from multiple repositories. (or to say it
better, get all their communication from multiple processors)
IMHo...
-- Michael --
PS, the turkey was great.. Biggest weekend trend was bot traffic, and a
new Azure based spammer.. And the regular AWS spammer.. mklbm
fo:
>
>
>
> Mar 17 16:30:31 squid postfix/smtp[26744]: EB6401C4127: to=<
> darkpixe...@outlook.com>, relay=mx4.hotmail.com
> <https://na01.safelinks.protection.outlook.com/?url=http%3a%2f%2fmx4.hotmail.com&data=01%7c01%7cmichael.wise%40microsoft.com%7c1ad1c59689ad4329debe08d34ec39d82%7c72f988b
.beefland.ir
137.74.191.165 (M) 1 cm5.beefland.ir
Plus of course the usual brand of snowshoe spammers using their networks.
Still seeing abusive patterns/exploits/fake account phishing and
spammers from SendGrid/Mailgun at excessive levels this last week or two.
Brazil/Argentina still
ected. The From: domain must point to the
public key just like ARC and DKIM.
Each sender has a reputation of some sort. The receiving server can choose
to initialize it at any level.
There could be bootstrap reputation services that receivers trust, similar
to the web of trust, to allow you to buy
. Maybe
not yet, but in the future. If it is on premise or in the cloud, they don't
care. To do that they took over Port25. You are forced to get updates due to
the fact that you need security updates.
Some ESPs have started to implement their own mta (Sendgrid, haven't kept tabs
I'm going to preface this email by saying that I do, in fact, run an
abuse desk. I'm the director of the policy enforcement team for my
employer, an ESP that everyone knows. I'm not going to mention them by
name because anything that I say here is based upon my own thoughts,
opinions, and experienc
timeout 7659
198.2.139.173 timeout 19254
198.2.183.175 timeout 7916
198.2.184.49 timeout 613
198.2.185.185 timeout 449
SendGrid, Inc. (SENDG-12)
149.72.139.128 timeout 4673
167.89.106.34 timeout 4440
167.89.31.62 timeout 10619
167.89.80.88 timeout 4641
167.89.87.136 timeout 16405
198.37.146.176 tim
om/?url=https%3a%2f%2fchilli.nosignal.org%2fcgi-bin%2fmailman%2flistinfo%2fmailop&data=01%7c01%7cMichael.Wise%40microsoft.com%7ce04a4ddabd6547db338d08d34ec6e3a0%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=b6o0MisyG2mlFBU6XdgRd%2fqPm3qiUPWT3uU8%2fSdvgUg%3d>
--
[https://drive.google.com/uc?id=0B4yks7mm243zU3NTbDh0djhLd0k]
Luke Martinez
SendGrid Deliverability Consultant
520.400.5693
___
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop
all scale impact, mostly related to EU recipients (German in particular
as UCE Protect is German based). I also remember that back in a day similar
issue was related to Sendgrid and their IP space - that was also discussed
on Word to the Wise blog - they stated that the impact was super small.
Rega
for
inboxing and don't know how much to separate themselves from negative
reputation elements.
I don't have any exact brand examples we've seen in recent weeks but
previously these were job sites, daily deals and, of course, financial
"advice" brands that ran into these
in recent weeks but
> previously these were job sites, daily deals and, of course, financial
> "advice" brands that ran into these issues. Most of which don't last long
> with SendGrid.
>
> *Jacob Hansen*
> Senior Delivery Consultant | Expert Services
> jacob.han.
>mistakes.
>>>
>>>
>>>
>>>
>>>
>>> On Thu, 14 Apr 2016 at 07:53 G. Miliotis
>>> wrote:
>>>
>>>> On 13/4/2016 22:28, Brandon Long via mailop wrote:
>>>> > if you have sufficient volume and your mail a
ael Peddemors via mailop <
mailop@mailop.org> wrote:
> Add just the headers from a single abuse email here on the thread..
> sanitize as needed.. seems that they of course can only use part of the
> information as a forgery (eg SendGrid headers)
>
> I think this is an attack ve
trivial to detect.
This does seem to be related to a new round of CPE and GPON compromises,
and yes the weekend numbers were much higher than normal.
But overall it was a high volume spam weekend. *Cough* SendGrid/MailGun
Lot's of DediPath and OVH spam as well.
But some ISP's have to go c
rYCD0qtNO491F2cmq2qsMSgSqqPwbXoiCNEegG8FoiwLeBMcbdCqTQZb/S/gk13BhEIHFfu9tng3n70tLqNwfsVF3aVWc7xsaOw0fFkfJ0GoDoZ876w7cyU5joVw0tikCjABXwRBA==
> X-SG-ID:
> N2C25iY2uzGMFz6rgvQsb8raWjw0ZPf1VmjsCkspi/LP5qbstBs+tNXeqRqWNMElXL97lzut3o+IPcAkA9CcXv8yKhwJejT9wnW1jUPmsdJ8/FV6Ck4y3YBgP5saSmoKs3fV2XzcfEGH
---Ikväll💋***3127795457 <(312)%20779-5457>
>> Subject: se
>> Reply-To: "🔞Suck_me💋"
>> x-abuse-id: 4ceea4f1-8b3b-4aa3-b1e2-ac4327b529b9
>> Feedback-ID:
>> 4ceea4f1-8b3b-4aa3-b1e2-ac4327b529b9:2295fca2-d8cd-445d-99b7-65050cd44b8e:wixshoutout
>> X-
3YBgP5saSmoKs3fV2XzcfEGH1Cn5CId7xqmdBEMoGjiDP1gV3OFd9cykfBHNuIrQZ5FJ/D3Z2BF1k4sgTxm4TgHAjfvC/pp5+AyVzKkROwJ599/XwPA+iZY/GypC2PdgTIrroJVGBMhW/QUtCsniD57PrmYBF9ZS1pjgg+6eORATab9qgV2pf0aW0xZCQpvd6FGGdhFwH314
To: azeddinebenlarbi...@gmail.com <mailto:azeddinebenlarbi...@gmail.com>
X-Entity-ID: syRQ9E
6; c=relaxed/relaxed; d=sendgrid.info
> ;
> > >> h=content-type:from:mime-version:subject:reply-to:x-feedback-id:to;
> > >> s=smtpapi; bh=unij9luYZjytYq8AnlTGrziLaTBYROHjkIEkJHrCZEI=;
> > >> b=PzohlIQ/O/Yd5uXr0V5xE/tfkG5TBjtSk4TSct0hwy6dCgV69aE8sYHkcUS4DPajzXN
ck_me💋" > <mailto:no-re...@test.ascendbywix.com>>
> > Mime-Version: 1.0
> > Message-ID:
> > > <mailto:tair7mckqcfthnsohjrktzdgpzrwo...@ismtpd0061p1las1.sendgrid.net>>
> > Message-ID: > <mailto:nmh2xc0ysduucmswzay...@ismtpd0061p1las
701 - 732 of 732 matches
Mail list logo