HowTo: Allow-List in Barracuda

21st June 2025 | HowTo, MSP, Technology HowTo: Allow-List in Barracuda

If you’re utilizing Barracuda’s Email Security Gateway, you can white-list CyberHoot IP Addresses and Domain Name to allow our simulated phishing test emails and training notifications to get through to your end-user’s inboxes.

Please see this article for the current IP Addresses and Domain Names for CyberHoot.

CyberHoot Email-Relay IP Addresses, Domains, and White-Listing Articles

White-listing by IP in Barracuda in Email Security Gateway

These instructions were gathered and summarized–based on Barracuda’s knowledgebase. For more information on how to white-list in Barracuda, check out this video from Barracuda.

If you are using Barracuda’s Email Security Service (cloud), follow these steps to white-list Barracuda by IP address:

  1. Log in to your Barracuda Cloud Control.
  2. Go to Email Security > Inbound Settings > IP Address Policies.
  3. In the IP Blocking / Exemption section,  enter the first CyberHoot mail server IP in the IP/Network Address field.
  4. In the Netmask field, type the netmask using this format:  255.255.255.255
  5. If you’d like, add a note in the Comment field. For example, CyberHoot Simulated Phishing IP Address.
  6. Click Add to white-list the IP address.
  7. Complete steps 2 through 6 for each of the CyberHoot IP addresses found above.

If you are using Barracuda’s Email Security Gateway (on-premises), follow these steps to white-list Barracuda by IP address:

  1. Log in to your Barracuda Email Security Gateway web interface.
  2. Go to the BLOCK/ACCEPT > IP Filters page.
  3. In the Allowed IP/Range section, enter the first CyberHoot mail server IP in the IP/Network Address field.
  4. In the Netmask field, type the netmask using this format:  255.255.255.255
  5. If you’d like, add a note in the Comment field. For example, CyberHoot Simulated Phishing IP Address.
  6. Click Add to white-list the IP address.
  7. Complete steps 2 through 6 for each of the CyberHoot IP addresses found above.

Barracuda Intent Analysis

You may need to white-list us in Barracuda’s Intent Analysis feature to prevent the URLs in simulated phishing tests from being altered, and potentially resulting in skewed phishing test results. See this article from Barracuda explaining this process

If you are using Barracuda’s Email Security Service (cloud), follow these steps to white-list Barracuda’s Intent Analysis:

  1. Log in to your Barracuda Cloud Control.
  2. Navigate to Email Security > Inbound Settings > Anti-Phishing.
  3. Under the Intent section, add CyberHoot’s hostnames. Make sure the Policy drop-down is set to Ignore.

If you are using Barracuda’s Email Security Gateway (on-premises), follow these steps to white-list Barracuda’s Intent Analysis:

  1. Log in to your Barracuda Email Security Gateway web interface.
  2. Navigate to Email Security Gateway > Basic > Spam Checking.
  3. Under the Intent Analysis section, add CyberHoot’s hostnames to the URI Exemptions: text box field.

Barracuda Advanced Threat Protection (ATP) 

If you are using Barracuda’s Advanced Threat Protection (ATP) and have experienced false clicks or false attachment opens, you can set up exemptions. Setting up exemptions allows you to bypass PDF scanning for phishing test emails from CyberHoot’s IP addresses. 

To set up exemption addresses to bypass ATP PDF Scanning:

  1. Log in to your Barracuda Email Security Gateway web interface.
  2. Select the ATP Settings tab.
  3. Enter the above CyberHoot IP address(es) and subnet mask(s) at the beginning of this How To article.
  4. Click Add.
Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Let’s be honest, who hasn’t reset a password at least once this month? For decades, passwords have been our...

Read more
When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

In a shift away from the usual “hack-meets-victim” narrative, a new kind of cyber-assault is emerging. One...

Read more
Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

In cybersecurity, not all attacks happen through fancy malware or zero-day exploits. Some of the most effective...

Read more