This article is a reference to CyberHoot’s mail relay IP Addresses and Domain names. The process of allowing phishing tests through to your end users inboxes is dependent upon your mail and spam filters. CyberHoot provides instructions and scripts on bypassing Microsofts Spam, Clutter, and Junk filters as well as adding our mail domains to the safe senders lists.
Please note that if you are using multiple filters in series, you will also need to set up X-Headers in addition to allow lists to deliver email to your end users. You may wish to run powershell scripts we have prepared to make your life easier.
CyberHoot Training Assignments Relay:
CyberHoot assignments are delivered via email. Currently, all assignments flow through the single server listed below however, this may change as CyberHoot grows. It is suggested for for email assignments you should create an allow list for the following specific mail relay.
- DNS Name: mail.cyberhoot.com
- IP Address: 184.108.40.206
Phishing Test Mail Relays
*Optionally, you can cover all of these domains and IP addresses if you allow our subnet: 220.127.116.11/28.
Some Services will ask for a Comma-Separated List of IPs: Here’s our list in total:
Related White-Listing Articles:
How to Allow-List in Barracuda SPAM Gateway and Cloud Solution
How to Allow-List in your own Personal Gmail Account
How to Allow-List in your Google Workspace
How to Allow-List in Microsoft’s O365
How to Allow-List in ProofPoint
How to Allow-List in Sophos Central (Website Management)
Powershell script for avoiding SPAM, Clutter, Junk in M365 and O365
Powershell script for adding CyberHoot’s phishing domains to Safe Senders List