New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
VPS IP UCEPROTECT blacklisted
I paid for two years and got a VPS from OVH (SBG)
Emails sent from our website go to spam
When I found out about it I found out that IP is blacklisted in UCEPROTECT.
ovh inquired about this and they said that their ASNs were blacklisted.
They told me to call the admin of the recipient's e - mail server and do IP whitelisting
It's impossible.
Give a solution to this
I use hestiacp, can this be solved if I use a service like mail baby?
Comments
Use amazon mail services. Or any other third party SMTP.
yes, use an email relay like mail baby / mailchannels if you have many domains.
If you have limited (10-20 domains) you can also consider email hosting.
Our email hosting plans start just $12 per year: https://my.webhorizon.in/order/main/packages/email/?group_id=11
we can do the setup if needed.
UCEPROTECT is not a serious RBL
It ask providers for money to unlist them and is verry trigger happy to ban million IPs
No body used them with exception of people tha use OpShield CPGuard and click on all 30+ RBLS
thank you
thank you ,
I used mail baby for hestiacp
Its 465 port not working, 587 working
Its e-mail is still spam. Is there no solution together
Check on https://mxtoolbox.com/deliverability for delivery issues and setup correctly dkim.
We use them, works fine.
Maybe you are sending spam?
UCEPROTECT is absolutely awful and other than some providers in Germany, I'm not aware of any mailservers that actually use UCEPROTECT Listings as an RBL.
To give some context, I managed a network with 90,000 IPs originating from it. UCEPROTECT decided to level 3 list our ASN for just 6 IP addresses that were detected as sending spam.
https://www.titanhq.com/blog/warning-ignore-pay-for-de-listing-blacklist-service/
https://securityboulevard.com/2021/02/uceprotect-when-rbls-go-bad/
If you're serious about mail deliverability then you should look at relaying via endgrid, Sendinblue, Mailgun as a few budget examples.
We use them, works fine.
Thanks I'll see it
I do not send spam I have a hosting company, all emails sent by whmcs go to spam. Previously used Hetzner there was no problem.
Everyone's experience is different but OVH and Google mail servers are the #1 and #2 sources of spam to my MX by a wide margin. I am seriously tempted to send all mail from OVH IPs to Junk folder automatically.
The advice from others is good - don't originate mail from OVH IPs. Hetzner is not OVH.
Check Your IP addresses with a blacklist monitoring tool, for example: HetrixTools.
If Your IP address only blacklisted by Uceprotect (and no any others), I think You can simple ignore it.
https://docs.hetrixtools.com/uceprotect-level3/
At the moment I have 2 IP address, which both clean, but the monitoring tool send me a warning because the full IP range or ASN blacklisted by them. I think, It's not a fair attitude.
I know Hetzner is not ovh
I mean,
There is no problem if you have used hetzner before
It seems to me that you have misread
I have not misread, I don't understand what relevance the lack of a problem with Hetzner has to the current problem with OVH. The problem is related to the source IP ASN/reputation. You could send exactly the same email with Hetzner and it works because the IP ASN/reputation is different.
If messages that you send are treated as Spam by the recipient while you are respecting RFCs, then it is a problem with the recipient.
This is what happens with centralization or/and when you or your email vendor foolishly delegate filtering decisions to third parties.
UCEPROTECT level 1 is ok to be used.
I have seen absolutely no blacklisting from level 1 which was not sending spam and I check them every day. They catch compromised systems or open relays in our network pretty fast.
The ransom operation method for "escalation" that is a completely different problem. I do find some reasons behind that and the fact that they usually wait for a while before escalation and it is pretty reasonable for people which care about their networks (we run a very clean business network and have to) however, people which run services for the masses have no way around that, their systems will be compromised and they need a dedicated person or service to check 24/7.
OVH likely falls short of that while Hetzner does not.
I have witnessed a dramatic increase in inbound spam from OVH over the last few weeks. I wouldn’t be surprised if it’s a listing that was earned.
If you want to see some of it and you have a busy mail server with a lot of domains on it, grep for “vmta” and I bet you won’t go through 5 IPs before one is OVH and porn related.