News:

Go to HostNed.com Home
Welcome.  This is a place to get user-to-user support, learn more, and share ideas.  If you can't find your answers here, feel free to ask by creating a new topic or visit the support ticket system at https://my.hostned.com :)  Have fun here!

Main Menu
Welcome to HostNed Community. Please login or sign up.

Shoutbox


Recent posts

#1
Billing / Why Do I Still See the Old Web...
Last post by Dynaweb - May 03, 2025, 11:07:34 AM
Question: My HostNed account was recently suspended and has now been reactivated. However, when I visit my website, I'm still seeing the old content (like the Plesk or cPanel default page) instead of my actual website. Why is this happening?

Answer: This issue is most commonly caused by your web browser storing an older version of the website in its cache. Even though your website files are now live on our servers, your browser might be displaying the previously saved version. This is a normal behavior designed to make browsing faster, but it can sometimes lead to displaying outdated content after changes or service interruptions.

Here are the steps you can take to resolve this:

1. Perform a Hard Refresh (Force Reload):
This forces your browser to bypass its cache and request the latest version of the page directly from our server.
  • Windows/Linux (Chrome, Firefox, Edge): Press Ctrl + Shift + R or Ctrl + F5 while on your website.
  • Mac (Chrome, Safari): Press Cmd + Shift + R while on your website.

2. Clear Your Browser's Cache and Cookies:
If a hard refresh doesn't work, you may need to clear your browser's stored files and cookies for your website. Here's how to do it in some popular browsers:
  • Google Chrome:
    • Click the three vertical dots (the "Customize and control Google Chrome" menu) in the top-right corner.
    • Hover over More tools and then click Clear browsing data.
    • At the top, select a Time range. To clear everything, choose All time.
    • Make sure the boxes next to Cookies and other site data and Cached images and files are checked.
    • Click the Clear data button.
  • Mozilla Firefox:
    • Click the three horizontal lines (the "Menu" button) in the top-right corner.
    • Click Options.
    • Select Privacy & Security on the left sidebar.
    • In the "Cookies and Site Data" section, click Clear Data....
    • Make sure the boxes next to Cached Web Content and Cookies and Site Data are checked.
    • Click Clear.
  • Microsoft Edge:
    • Click the three horizontal dots (the "Settings and more" menu) in the top-right corner.
    • Go to Settings.
    • Select Privacy, search, and services in the left sidebar.
    • Under "Clear browsing data," click Choose what to clear.
    • Select a Time range (e.g., "All time").
    • Make sure the boxes next to Cached images and files and Cookies and other site data are checked.
    • Click Clear now.
  • Safari (Mac):
    • Click Safari in the menu bar, then select Preferences.
    • Go to the Privacy tab.
    • Click Manage Website Data....
    • Find your website in the list, select it, and click Remove. You can also click Remove All, but be aware this will clear data for all websites.
    • Click Done.

3. Try Incognito/Private Browsing Mode:
Opening your website in a private or incognito window bypasses your browser's existing cache and cookies.
  • Chrome: Click the three vertical dots (menu) > New Incognito window.
  • Firefox: Click the three horizontal lines (menu) > New Private Window.
  • Edge: Click the three horizontal dots (menu) > New InPrivate window.
  • Safari: Click File > New Private Window.
If your website loads correctly in a private window, it strongly indicates that the issue is with your browser's cached data in your regular browsing session.

4. Restart Your Browser:
After clearing your cache and cookies, close and reopen your web browser completely.

5. Restart Your Computer and Router (Less Common):
In some rare instances, a local network issue or a persistent cache within your operating system might be involved. Restarting your computer and your internet router can sometimes resolve these unusual cases.

If the issue persists after trying all these steps, please don't hesitate to contact our support team, and we'll be happy to investigate further.
#2
Web Hosting / Why Do I Still See the Old Web...
Last post by Dynaweb - May 03, 2025, 11:05:30 AM
Question: I've recently made changes to my website files through the HostNed control panel (File Manager, FTP, etc.), but when I visit my website in a browser, I'm still seeing the old version. Why aren't my changes showing up?

Answer: This is a very common occurrence and is almost always due to your web browser storing an older version of your website in its cache. Browsers save website files (like images, CSS, and HTML) locally to speed up loading times on subsequent visits. When you make changes, your browser might still be displaying the cached version instead of fetching the latest files from our server.
Here are the steps you can take to see your recent website updates:

1. Perform a Hard Refresh (Force Reload):
This is the quickest way to try and bypass your browser's cache for the specific page you're viewing.
  • Windows/Linux (Chrome, Firefox, Edge): Press Ctrl + Shift + R or Ctrl + F5 while on your website.
  • Mac (Chrome, Safari): Press Cmd + Shift + R while on your website.

2. Clear Your Browser's Cache and Cookies:
If a hard refresh doesn't work, you may need to clear your browser's stored files and cookies for your website or even for all websites. Here's how to do it in some popular browsers:
  • Google Chrome:
    • Click the three vertical dots (the "Customize and control Google Chrome" menu) in the top-right corner.
    • Hover over More tools and then click Clear browsing data.
    • At the top, select a Time range. To ensure you see the latest changes, try clearing data for Last hour or Last 24 hours. If that doesn't work, you can try All time.
    • Make sure the boxes next to Cookies and other site data and Cached images and files are checked.
    • Click the Clear data button.
  • Mozilla Firefox:
    • Click the three horizontal lines (the "Menu" button) in the top-right corner.
    • Click Options.
    • Select Privacy & Security on the left sidebar.
    • In the "Cookies and Site Data" section, click Clear Data....
    • Make sure the boxes next to Cached Web Content and Cookies and Site Data are checked.
    • Click Clear.
  • Microsoft Edge:
    • Click the three horizontal dots (the "Settings and more" menu) in the top-right corner.
    • Go to Settings.
    • Select Privacy, search, and services in the left sidebar.
    • Under "Clear browsing data," click Choose what to clear.
    • Select a Time range (try Last hour or Last 24 hours first, then All time if needed).
    • Make sure the boxes next to Cached images and files and Cookies and other site data are checked.
    • Click Clear now.
  • Safari (Mac):
    • Click Safari in the menu bar, then select Preferences.
    • Go to the Privacy tab.
    • Click Manage Website Data....
    • Find your website in the list, select it, and click Remove. You can also click Remove All, but be aware this will clear data for all websites.
    • Click Done.

3. Try Incognito/Private Browsing Mode:
Opening your website in a private or incognito window bypasses your browser's existing cache and cookies, forcing it to load the latest version from the server.
  • Chrome: Click the three vertical dots (menu) > New Incognito window.
  • Firefox: Click the three horizontal lines (menu) > New Private Window.
  • Edge: Click the three horizontal dots (menu) > New InPrivate window.
  • Safari: Click File > New Private Window.
If your changes are visible in a private window, it confirms that the issue is with your browser's cached data in your regular browsing session.

4. Restart Your Browser:
After clearing your cache and cookies, close and reopen your web browser completely.

5. Check for Server-Side Caching (Less Common for Immediate Changes):
While less likely to cause immediate delays after you've directly edited files, some websites utilize server-side caching mechanisms (like caching plugins in WordPress or server-level caching). If you've recently made changes and they are still not appearing after trying the browser steps, you might need to clear any server-side caches as well. If you are using a CMS like WordPress, check for caching plugin settings. If you're unsure, you can contact our support team to inquire about server-side caching.

In most cases, a hard refresh or clearing your browser's cache will resolve this issue and allow you to see your latest website changes. If you continue to experience problems after trying these steps, please don't hesitate to contact our support team, and we'll be happy to assist you further.
#3
Announcements / Phishing Email Alert: Beware o...
Last post by Dynaweb - April 24, 2025, 08:58:54 AM

A new wave of phishing emails is targeting users with fake "password expiration" warnings, aiming to steal your login credentials and compromise your online security. Here's what you need to know to protect yourself.

---

What Does the Scam Look Like?

You might receive an email like this:


Subject: ACCOUNT DEACTIVATION IN PROGRESS 
From: "yourdomain.com" <ai@badgirl.co.jp> 

Password expires today, [date]

Your you@yourdomain.com will be considered dormant and closed within 24 hours, if no action is taken. 

You can keep your password using the link below. 

[Keep Current Password] [Confirm Password] 

Account Information Concerned: 
Email address: you@yourdomain.com 
Password status: Expired


The email pressures you to click a button or link to "keep" or "confirm" your password, claiming your account will be deactivated if you don't act immediately.

---

Why Is This a Scam?

  • Fake Urgency: Scammers use threats of account deactivation to create panic and prompt quick action without thinking.
  • Phishing Links: The buttons or links lead to a fake login page designed to steal your email address and password.
  • Impersonation: The sender's address and branding may look similar to your real provider, but often uses a suspicious or unrelated domain.
  • Generic Content: These emails rarely address you by name and often have awkward phrasing or grammar mistakes.
---

What Happens If You Click?

If you enter your credentials on the fake site, attackers can:

  • Take over your email account and lock you out.
  • Access sensitive information, impersonate you, or contact your friends and colleagues for further scams.
  • Attempt to access other accounts where you use the same email and password combination.

---

How to Spot and Avoid These Scams

  • Check the sender's address: Is it from your actual provider or a suspicious domain?
  • Look for generic greetings and urgent language: Real providers rarely use threats or urgent deadlines in email.
  • Hover over links: Don't click! Hover to see if the URL matches your provider's official website.
  • Watch for spelling and grammar errors: Many phishing emails have awkward or incorrect language.
  • When in doubt, don't click: Go directly to your provider's website by typing the address manually, or contact your IT department or provider support.
---
What to Do If You See One Of These

  • Do not reply to the email. 
  • If you see a button "Display External Images", do not click it, as doing so will alert the sender they have a phishing nibble and may continue to target you as a known qualified account.
  • Move it to Spam folder (or Report_spam for future prevention training)
  • Contact us so we can evaluate the message and block the sender.


What to Do If You Fell for the Scam

  • Change your password immediately on the affected account and any other accounts using the same password.
  • Enable two-factor authentication (2FA) if available, for added security.
  • Notify us (or your IT department) or provider so they can monitor for suspicious activity.
  • Warn your contacts—attackers may use your account to target others.

---

Summary

Password expiration phishing emails are a common and dangerous scam these days. Stay vigilant, verify suspicious messages, and never click links or provide credentials in response to unsolicited emails. When in doubt, contact your host or it admin directly and report the phishing attempt.

Stay safe. Think before you click.
#4
Announcements / Scam Alert: Beware Domain Netw...
Last post by Dynaweb - January 31, 2025, 10:34:09 AM
Beware of another snail-mail Domain Registration Scam. This one from a company named Domain Networks (domainnatworks.com) from Santa Fe, NM, USA (although their solicitation says Hendersonville, NC).

DO NOT CONTACT THIS COMPANY

DO NOT SEND THEM MONEY

If you need help determining your real Domain Registrar, feel free to contact us or use our WHOIS Lookup here..

Domain Networks are deceptively sending what appears to be Domain Expiration Notices over USPS to homes and businesses. Their notices pretending to be from your current Domain Name Registrar, even listing your current registrar's name and your DNS settings at the very top of the document. It is very deceptive marketing attempting to fool domain owners. Beware!

Although they do have some mild legalese stating "This is not a bill. This is a solicitation. You are under no obligation to pay the amount stated above unless you accept this offer.", very similar could be stated for regular renewals. This verbiage comes directly after they state that they are not even a registrar and they are just there to "enhance exposure". However, the notice very much so looks like a registration renewal notice!

Here is an example of the notice they are mailing:
#5
Industry News / WHOIS Sunset: Major Changes Co...
Last post by Dynaweb - January 16, 2025, 03:41:45 PM
QuoteWHOIS (1982 - 2025)

A Quiet Farewell to a Digital Pioneer Born in the early days of ARPANET, WHOIS emerged as a simple yet revolutionary protocol that helped connect and identify users across emerging digital networks. For 43 years, it faithfully served the internet community, providing transparent domain registration information with remarkable consistency. From its humble beginnings at SRI International to becoming a global standard for domain lookup, WHOIS witnessed the internet's transformation from a small research network to a global communication infrastructure. It stood as a beacon of transparency, allowing anyone to discover the human behind a domain name. Now, as we approach January 28, 2025, WHOIS will quietly sunset, not with a dramatic shutdown, but with a dignified transition to RDAP. It leaves behind a legacy of openness and a foundational role in internet governance. Though technology moves forward, we pause to remember a protocol that connected us, informed us, and helped build trust in the early digital age. Rest in peace, WHOIS. Your work is done.



As we approach a significant milestone in the domain name industry, it's crucial for our HostNed community to be aware of the upcoming changes. On January 28, 2025, just days from now, ICANN will implement the WHOIS Sunset Date, marking the end of an era for how we access domain registration data.

What's Changing?

  • WHOIS servers for generic Top-Level Domains (gTLDs) will no longer be required after January 28, 2025.
  • Many registrars are expected to shut down their public WHOIS servers on this date.
  • The Registration Data Access Protocol (RDAP) will replace WHOIS as the primary method for accessing domain registration data.

Why This Matters

This transition affects various aspects of domain management and verification:

  • Domain owners may need to adapt to new methods for updating and accessing their registration information.
  • Certificate Authorities will need to adjust their domain control validation processes, potentially affecting SSL/TLS certificate issuance.
  • Services relying on WHOIS data for domain research, cybersecurity, and legal purposes will need to transition to RDAP.

What You Need to Do

  • 1. If you're a domain owner, check with your registrar about their plans for the transition and any actions you need to take.
  • 2. For those using WHOIS data in automated systems or workflows, start planning your migration to RDAP-based solutions.
  • 3. Be prepared for potential changes in how you verify domain ownership or obtain SSL/TLS certificates.

Benefits of RDAP

While this change may seem disruptive, RDAP offers several improvements over WHOIS:

  • Enhanced security features
  • Standardized data format for easier processing
  • Better support for internationalized domain names

Stay Informed

As a staple hosting provider since 2000, HostNed is committed to helping you navigate this transition smoothly. We'll perform updates transparently in the backend and provide updates as we approach the sunset date and assist with any questions you may have about how these changes affect your domains or services.

We encourage our community members to share their thoughts, concerns, or questions about the WHOIS sunset in the comments below. Let's work together to ensure a smooth transition to this new era of domain data management.
#6
Email and Webmail / How Do I Install a New Email A...
Last post by Dynaweb - October 07, 2024, 12:42:09 PM
Setting up a new email account on your hosted domain at HostNed can be done easily using either cPanel or Plesk, depending on your hosting environment. Follow the steps below based on the control panel you are using.

Note: For yourdomain.com replace with your actual domain name.

cPanel Instructions
  • Log In to cPanel:
    • Access your cPanel account by going to:
      Quotehttps://yourdomain.com/cpanel
    • Enter your cPanel login credentials.
  • Navigate to Email Accounts:
    • Once logged in, scroll down to the Email section.
    • Click on Email Accounts.
  • Create a New Email Account:
    • Click on Create.
    • Choose the domain where you want to create the email address (if you have more than one).
    • Enter the desired email address. Example:
      Quoteinfo@yourdomain.com
    • Set a strong password or use the password generator for added security.
    • Optional: Set the mailbox quota (the maximum storage for the email account).
  • Click Create:
    • After entering all the details, click Create. Your new email account will be set up immediately.
  • Access Your Email:
    • You can access your new email account through the Webmail interface by going to
      Quotehttps://yourdomain.com/webmail
      or configure it on a third-party client (like Outlook or Gmail) using the IMAP/POP3 and SMTP settings provided.

Plesk Instructions
  • Log In to Plesk:
    • Access Plesk by going to:
      Quotehttps://yourdomain.com:8443
    • Enter your Plesk login credentials.
  • Go to Mail Settings:
    • In the left-hand menu, click on Mail.
  • Add a New Mail Account:
    • Click on Create Email Address.
    • Choose the domain where you want the email account to be created.
    • Enter the desired email address. Example:
      Quotecontact@yourdomain.com
    • Set a password for the account or use the password generator.
  • Set Quota and Preferences:
    • Set the mailbox size quota if needed.
    • You can also configure the default settings for autoresponders or email forwarding.
  • Click OK:
    • Click OK to finish the setup. Your new email account will be created.
  • Access Your Email:
    • You can log into your email account via Plesk's Webmail feature by going to
      Quotehttps://yourdomain.com/webmail
      or configure it on a third-party client (like Outlook or Gmail) using the IMAP/POP3 and SMTP settings provided.

Additional Information
  • Email Settings:
    • IMAP Server:
      mail.yourdomain.com
    • POP3 Server:
      mail.yourdomain.com
    • SMTP Server:
      mail.yourdomain.com
    • IMAP Port: 993 (SSL)
    • POP3 Port: 995 (SSL)
    • SMTP Port: 465 (SSL)
  • See this FAQ for more info on which email posts to use.

If you experience any issues, feel free to reach out to HostNed Support for assistance.
#7
Email and Webmail / Email Account Options - Forwar...
Last post by Dynaweb - August 17, 2024, 04:13:55 PM
In today's digital age, having a professional email address associated with your domain is essential for businesses and individuals alike. When setting up hosted domain email, you typically have two primary options: email forwarders and actual mailboxes. These options are available through your hosting control panel (either cPanel or Plesk). Understanding the differences between these two can help you choose the best solution for your needs.

Email Forwarders: Simple Redirection

Definition: Email forwarders are services that automatically redirect emails sent to your domain address to another existing email account, such as a personal or business email.

Functionality:
- Forwarders receive emails sent to your domain address and send them to a designated email account.
- You can set up multiple domain addresses to forward to a single receiving account, simplifying email management.

Advantages:
- Cost-Effective: Email forwarders are often free or low-cost, making them an economical choice for individuals and small businesses.
- Simplicity: They are easy to set up and manage, allowing you to focus on your core activities without worrying about multiple email accounts.
- Multiple Addresses: You can manage several email addresses from one primary account, streamlining communication.

Enhanced Functionality:
One of the standout features of email forwarders is their ability to integrate with existing email clients, such as Gmail. This allows users to maintain a professional appearance while benefiting from the simplicity of forwarding.

- Send Mail As: Many email clients offer a "Send Mail As" feature, enabling you to send emails using your domain address while using your personal or existing email account. This feature helps you avoid the "unprofessional appearance" that can come from using a generic email address.

Example Setup in Gmail:
1. Go to Gmail Settings > See All Settings > Accounts and Import.
2. In the "Send mail as" section, click "Add another email address."
3. Enter your name and the domain email address.
4. Follow the verification process to confirm ownership of the domain email.

By using this feature, you can compose and send emails that appear to come directly from your domain address, enhancing your professional image without the need for a separate mailbox.

Limitations:
- Basic Functionality: While forwarders are great for redirection, they may lack advanced features like storage, spam filtering, and organization tools found in actual mailboxes.
- Dependency on Existing Email: The effectiveness of forwarders relies heavily on the capabilities of your existing email service.

Actual Mailboxes

Definition: An actual mailbox provides a dedicated email account with its own storage and features, allowing for comprehensive email management.

Functionality:
- Users have a standalone email account with storage space for incoming emails.
- Mailboxes often come with advanced features such as spam filtering, contact and calendar integration, and organizational tools.
- HostNed provides access via RoundCube webmail or other interfaces.

Advantages:
- Full Control: With an actual mailbox, you have complete control over your email management, including organization and storage.
- Professional Features: Mailboxes typically offer more robust features, such as custom filters, folders, and advanced security options.
- Independence: You don't rely on another email service, ensuring that your domain email remains professional and functional.

Limitations:
- Cost: Actual mailboxes may come with higher costs compared to email forwarders.
- Complex Setup: Setting up an actual mailbox can be more complex and time-consuming than simply configuring a forwarder.

Comparison Table


FeatureEmail ForwarderActual Mailbox
StorageNo local storageDedicated storage
ManagementSimple redirectionFull email client features
CostOften free or low-costMay have higher costs
SetupUsually quick and easyMore complex initial setup
Professional AppearanceCan use "Send Mail As" featureDirectly associated with the domain

Conclusion

Choosing between an email forwarder and an actual mailbox depends on your specific needs and preferences. If you're looking for a simple, cost-effective solution that allows you to maintain a professional appearance, email forwarders with features like "Send Mail As" can be an excellent choice. However, if you require advanced email management features and greater control, an actual mailbox may be the better option.

By understanding the differences and advantages of each option, you can make an informed decision that best suits your communication needs. Whether you opt for the simplicity of email forwarders or the robustness of actual mailboxes, having a professional email presence is essential in today's digital landscape.
#8
Industry News / SSL Certificates: From Optiona...
Last post by Dynaweb - August 16, 2024, 06:39:36 AM
The landscape of web hosting has undergone a significant transformation in recent years, with SSL (Secure Sockets Layer) certificates evolving from an optional feature to a fundamental necessity. This shift reflects the growing emphasis on online security and user trust.

ssl-standard-in-emerging-tech.jpg

The Rise of SSL in Web Hosting

Early Days: SSL as a Premium Feature

In the early 2000s, SSL certificates were primarily used by e-commerce sites and financial institutions. They were often expensive and complex to implement, making them a premium feature offered by hosting providers.

Google's HTTPS Push

A major turning point came in 2014 when Google announced HTTPS as a ranking signal for search results. This move incentivized website owners to adopt SSL certificates to improve their search engine visibility.

Let's Encrypt and Free SSL

The launch of Let's Encrypt in 2016 revolutionized SSL adoption. This non-profit Certificate Authority provided free, automated SSL certificates, making HTTPS accessible to all website owners.

Current Trends in SSL Adoption

SSL as a Standard Offering

Today, most reputable web hosting providers include free SSL certificates with their hosting packages. This shift has made HTTPS the new norm for websites of all sizes and types.

Automated SSL Management

Many hosting companies now offer automated SSL installation and renewal processes. This simplification has removed technical barriers, encouraging widespread adoption.

Browser Warnings

Modern web browsers display prominent warnings for non-HTTPS sites, further driving SSL adoption. This has created a user expectation for secure connections across all websites.

Impact on Web Hosting Industry

Security as a Priority

The standardization of SSL has shifted the focus of hosting providers towards comprehensive security solutions. Many now offer additional security features like malware scanning and DDoS protection.

Performance Optimization

With SSL becoming ubiquitous, hosting providers are focusing on optimizing HTTPS performance. This includes implementing HTTP/2 and exploring newer protocols like QUIC.

Competitive Differentiation

As basic SSL becomes standard, hosting companies are differentiating themselves by offering advanced SSL options, such as wildcard certificates or extended validation (EV) SSL.

Future Outlook

Universal HTTPS

The trend is moving towards a fully encrypted web, with HTTPS becoming the default protocol for all websites.

Enhanced Validation Methods

Future developments may include more sophisticated methods of domain validation and certificate issuance to combat evolving security threats.

Integration with Emerging Technologies

As new web technologies emerge, SSL integration will likely become more seamless, potentially incorporating blockchain or AI for enhanced security and verification.

The journey of SSL from an optional add-on to a standard feature in web hosting reflects the industry's response to growing security concerns and user expectations. As the web continues to evolve, SSL certificates and secure connections will remain a cornerstone of trustworthy online interactions, shaping the future of web hosting and online security.
#9
Email and Webmail / Understanding and Implementing...
Last post by Dynaweb - August 16, 2024, 05:59:42 AM
What is DMARC?
DMARC (Domain-based Message Authentication, Reporting, and Conformance) is an email authentication protocol designed to protect your domain from email spoofing. It helps verify that emails claiming to originate from your domain are indeed sent by you or an authorized sender.  

Why is DMARC Important?
  • Enhanced Email Deliverability: Emails with proper DMARC authentication are more likely to reach recipients' inboxes, reducing spam filtering issues.
  • Protection Against Phishing: DMARC helps prevent unauthorized use of your domain for phishing attacks.
  • Increased Trust: Implementing DMARC demonstrates your commitment to email security, building trust with your recipients.

When to Implement DMARC
While often associated with email marketing platforms like Mailchimp, Constant Contact, or HubSpot, DMARC is equally beneficial for businesses sending emails from their own hosted email servers. If you're concerned about email spoofing or want to improve email deliverability, DMARC is a valuable tool.

Setting Up DMARC
Implementing DMARC involves adding specific records to your domain's DNS settings. This is often performed through your server control panel such as cPanel or Plesk, but could also be through your DNS management at your domain registrar if your nameservers point to them and your DNS is managed there (less common). It's essential to follow the specific instructions provided by your service provider.

Important Considerations:
  • Backup Your DNS Records: Before making any changes to your DNS settings, create a backup of your current records. It is sufficient to perform a full domain backup using cPanel or Plesk, but you may also want to screenshot your current records before performing any changes or additions to DNS records for good practice.
  • Test Your Emails: After implementing DMARC, closely monitor your email delivery rates for any potential issues.
  • Seek Support: If you encounter difficulties, consult your email provider for assistance or open a ticket with us.

By understanding and implementing DMARC, you can significantly enhance your email deliverability trust level, reputation, and security.

Keywords: DMARC, email authentication, email security, email deliverability, domain authentication, DNS, phishing, spam
#10
Email and Webmail / When Emails From Gmail, Outloo...
Last post by Dynaweb - July 28, 2024, 07:52:05 AM
Understanding Email Blocklists and Our Commitment to Ensuring Incoming Email Deliverability

Introduction

As a valued customer, we understand how frustrating it can be when important emails are blocked or marked as spam. This article aims to shed light on why this happens, particularly with emails from major providers like Gmail, Outlook, and Hotmail, and to inform you about the measures we have taken to ensure you receive your emails without interruption.

The following image is an example of what the email sender may receive, informing them of the failure to deliver their message to your domain:



Why Are Emails Being Blocked?

Email blocklists, also known as Real-time Blackhole Lists (RBLs), are used by email servers to identify and block emails from known sources of spam. This helps provide a secure and comfortable experience for users. These blocklists are maintained by independent services such as SpamCop and Spamhaus, which monitor and report spam activity. Those reports are, in turn, used by email servers to know where malicious activity originates.

The Conflict

In recent times, a conflict has emerged between major email providers (like Gmail, Outlook, and Hotmail) and independent blocklist services. Here's why:

1. High Volume of Traffic: Major providers handle a massive volume of email traffic daily. Inevitably, some of this traffic includes spam, phishing attempts, and other undesirable content.
2. Reputation-Based Blocking: Independent blocklist services operate based on domain and origin reputation. When they detect a significant amount of spam originating from a particular provider, they add the provider's IP addresses to their blocklists.
3. Increased Accountability: Traditionally, major providers were often given passes due to their dominance in the email market. However, independent services have recently adopted a stricter stance, holding these providers accountable for the spam originating from their networks.

Our Response and Commitment

We are committed to ensuring that our customers can receive emails from all legitimate sources, including major providers like Gmail, Outlook, and Hotmail. Here are the steps we have taken to address this issue:

1. Whitelisting Known IP Ranges: We have identified and whitelisted the known IP ranges used by major providers. This means that emails from these providers will bypass the blocklist checks, ensuring they reach your inbox.
2. Regular Updates: We regularly update our whitelisted IP ranges to accommodate any changes made by the providers. This helps maintain seamless email deliverability.
3. Continuous Monitoring: Our team continuously monitors email traffic and blocklist reports to identify and address any new issues promptly.

Despite these efforts, occasions do sometimes arise when incoming emails do not make it through. An example of when this may happen is if Gmail adds a new block of sending IP addresses that are not yet accounted for on our end.

What You Can Do

If you experience issues with receiving emails from specific senders, please follow these steps:

1. Report the Issue: Contact our support team with details about the sender and the email in question. This helps us investigate and resolve the issue quickly.
2. Whitelist Specific Senders: If you frequently receive emails from a particular sender, consider adding them to your personal whitelist in your email client or control panel like cPanel or Plesk.
3. Stay Informed: Keep an eye on our knowledgebase/forums for updates and best practices related to email deliverability.

Conclusion

We understand the importance of reliable email communication and are dedicated to providing the best service possible. By taking proactive measures and keeping our customers informed, we aim to minimize disruptions and ensure that you receive all your important emails.

If you have any questions or need further assistance, please do not hesitate to contact our support team. We are here to help!

Kind Regards, 
Support Dept

---

By sharing this information, we hope to provide clarity on why email blocking occurs and reassure you of our commitment to resolving these issues effectively. Thank you for choosing our services!