[NOTE: this is relevant to mail operations as a number of legitimate senders are customers of Amazon AWS. Several of them are my clients.]
An operation that is easily distinguished by > EHLO phylobago.mysecuritycamera.org and a payload that begins with "This message is from a trusted sender." and a visible FROM of >livenewsupd...@millan.pgw.jp has made 66 delivery attempts over the past six days, from 60 Amazon IPs. If a given IP was not on Spamhaus CSS at the time of delivery, it appears that it would have been added soon after. These figures reflect data from logs that have not yet been rolled into the archive. There are three deliverable local addresses in their customary drop, two which come to me and the other being "Nadine". The rest of the recipients are spamtrap accounts that result in the message being delivered to Rev. Bayes, and the IP dropped into the IP REFUSE list for at least 1440 minutes. At the moment there are 48 AWS IP addresses in that list. It is difficult to imagine how such a large-scale and essentially static operation (the EHLO, MAIL FROM and visible FROM, together with the opening string have been constant since the first messages rolled in on 16 Dec 2019) could persist. There was an apparent service interruption from 01 Jan to 09 Jan, after which delivery attempts continue as usual. The most recent delivery was approximately 45 minutes ago (the IP, 54.91.110.45, was not in CSS at delivery time; it is now). In that interval, at least four of the refuse-listed IPs have encountered refusal. Is nobody else seeing this and reporting it to AWS abuse? mdr -- "There are no laws here, only agreements." -- Masahiko _______________________________________________ mailop mailing list mailop@mailop.org https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop