Posts Tagged ‘abuse prevention’
Having your IP address end up on a so called ‘blacklist’ can be a troublesome experience, especially when not anticipated. In most cases, it is a sign that something is wrong on the server(s) you rent or own, or that maybe one of the end users hasn’t followed email sending guidelines. This post is dedicated to those who want to know more about IP address reputation and what can be done to resolve issues identified by other parties.
The ongoing fight against spam
As we have already explained in the Spam blogs (I and II), email spam continues to be an issue. Due to the ever-evolving problem of email spam, there is an understandable need to have measures to combat this. Over the years, several efforts have been made to prevent unsolicited emails from reaching email inboxes by a plethora of means. Many of these proposed solutions have had promising technical white papers but few have actually resulted in an implementation that is either scalable, reliable or both.
Where does spam come from? Why do people send it? And what can we do to stop it clogging up our inboxes? This two-part article explores these issues and comes up with practical ideas for keeping us safe, secure and spam-free.
It’s almost impossible to open your e-mail inbox and to not see spam in there. In some cases, it’s because someone unintentionally for signed up to things like clickbait articles. A clickbait article is, for instance, an article where they promise you a free trip to New York – although the free trip may not even exist. Most of the time those articles channel responses to information harvesters which, in turn, will lead to databases containing literally millions of email addresses and personal contact details. Such databases or lists can be sold to the highest bidder on the dark net/dark web/deep web, or even on normal sites.
It should come as no surprise that the LeaseWeb services companies receive abuse notifications on a daily basis. That’s why last July, a new LeaseWeb Abuse Handler was launched which increases efficiency for those who submit notifications, for our customers and for the LeaseWeb companies.
We receive abuse notifications from a variety of companies and NGOs including banks, brand owners and blacklists. Most of these notifications are generated in an automated matter and are directly forwarded to us when an IP address of one of the LeaseWeb companies has been detected. We also receive notifications from individuals through several channels such as email, the web form at leaseweb.com and social media. All notifications are taken seriously and immediately forwarded to our customers to ensure fast processing and a quick solution of the abuse issue.
Submitting a notification to one of the LeaseWeb companies
LeaseWeb companies have no access to the servers of our customers. Our customersare free to configure their server(s) to their own needs, as long as they are compliant with local law and the LeaseWeb terms and conditions that apply in the country where the server resides. But all LeaseWeb companies have a dedicated abuse email address which can be found at our Abuse Prevention webpage. The requirements for submitting a notification with one of the LeaseWeb companies can also be found on our website.
The most important requirements to submit a notification are:
- Include the URL (if applicable) to the abusive material
- Include a valid LeaseWeb IP address and/ or domain
- Include a short description of the issue (is it about copyright infringement, phishing, etc.?)
- Include evidence (if applicable)
Be sure to submit your notification to the right LeaseWeb company
When submitting a notification, make sure you are filing your notification with the right LeaseWeb company: LeaseWeb Netherlands B.V., LeaseWeb USA, Inc., LeaseWeb Deutschland GmbH, LeaseWeb Pacific Pte. Ltd., LeaseWeb CDN B.V., or LeaseWeb Network B.V. If you are not 100% sure whether you have selected the right company, verify the IP-address using RIPE.net (EU) or ARIN.net (US). By doing this you will be sure to have submitted your notification to the correct company.
When submitting a notification regarding copyright infringement, also be sure to read our page about the Legal Framework, where you will find all necessary information on how each company handles copyright infringement notifications and what is required.
This is a guest blog by Michiel Steltman, Director of DINL (Dutch Digital Infrastructure Association).
The enormous growth of the online economy in the last two decades has made the Netherlands a strong player in the online world. The AMS-IX, world’s largest Internet exchange, has attracted many carrier neutral datacenters and enabled a substantial hosting industry. Which in turn has attracted major Internet brands. Next to the Rotterdam Harbor and Schiphol Airport our Digital Infrastructure is now Holland’s third main port which made the Netherlands also the digital gateway to Europe. It fuels Cloud as the new style of IT, it enables innovations and startups and it provides a strong base for Holland’s future knowledge- and services based economy.
The various LeaseWeb services companies are always looking to improve the processes involved with handling abuse notifications and to increase user-friendliness.
Over the past few years, we have received valuable feedback on the abuse handling process from customers and third parties who submitted notifications. With that feedback in mind, we have developed a brand new system that will further streamline the abuse notification handling process. This system was launched on July 1st 2015 and the first responses are very positive.