<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic backplane1.janrainbackplane.com in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/backplane1-janrainbackplane-com/m-p/2123748#M395642</link>
    <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; We have been running the Cisco Botnet fliters for some time now and we are seeing thousands of dropped packets all pointing to backplane1.janrainbackplane.com, port 443 on a wide variety of ip addresses. I can find no information within the other anti-malware vendors that they consider this to be malware. Is this behavior unique to my environment or are you seeing this type of behavior as well?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 00:22:50 GMT</pubDate>
    <dc:creator>mrrlg</dc:creator>
    <dc:date>2019-03-12T00:22:50Z</dc:date>
    <item>
      <title>backplane1.janrainbackplane.com</title>
      <link>https://community.cisco.com/t5/network-security/backplane1-janrainbackplane-com/m-p/2123748#M395642</link>
      <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; We have been running the Cisco Botnet fliters for some time now and we are seeing thousands of dropped packets all pointing to backplane1.janrainbackplane.com, port 443 on a wide variety of ip addresses. I can find no information within the other anti-malware vendors that they consider this to be malware. Is this behavior unique to my environment or are you seeing this type of behavior as well?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:22:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backplane1-janrainbackplane-com/m-p/2123748#M395642</guid>
      <dc:creator>mrrlg</dc:creator>
      <dc:date>2019-03-12T00:22:50Z</dc:date>
    </item>
    <item>
      <title>backplane1.janrainbackplane.com</title>
      <link>https://community.cisco.com/t5/network-security/backplane1-janrainbackplane-com/m-p/2123749#M395646</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to chime in. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Typically those are good reference pages:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.siteadvisor.com/sites/backplane1.janrainbackplane.com"&gt;http://www.siteadvisor.com/sites/backplane1.janrainbackplane.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;(ironport ) &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.senderbase.org/senderbase_queries/rep_lookup?search_name=backplane1.janrainbackplane.com&amp;amp;action%3ASearch=Search"&gt;http://www.senderbase.org/senderbase_queries/rep_lookup?search_name=backplane1.janrainbackplane.com&amp;amp;action%3ASearch=Search&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.mywot.com/en/scorecard/backplane1.janrainbackplane.com"&gt;http://www.mywot.com/en/scorecard/backplane1.janrainbackplane.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.google.com/safebrowsing/diagnostic?site=backplane1.janrainbackplane.com"&gt;http://www.google.com/safebrowsing/diagnostic?site=backplane1.janrainbackplane.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 19:11:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backplane1-janrainbackplane-com/m-p/2123749#M395646</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2012-11-13T19:11:19Z</dc:date>
    </item>
    <item>
      <title>backplane1.janrainbackplane.com</title>
      <link>https://community.cisco.com/t5/network-security/backplane1-janrainbackplane-com/m-p/2123750#M395649</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; 90% of the blocked IPs on my Botnet filter are from backplane1.janrainbackplane.com, port 443&lt;/P&gt;&lt;P&gt;None of the hosts, perhaps 50, have complained about problems.&lt;/P&gt;&lt;P&gt;I have no idea why.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Robert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2012 17:36:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backplane1-janrainbackplane-com/m-p/2123750#M395649</guid>
      <dc:creator>Robert Zeff</dc:creator>
      <dc:date>2012-11-28T17:36:06Z</dc:date>
    </item>
    <item>
      <title>backplane1.janrainbackplane.com</title>
      <link>https://community.cisco.com/t5/network-security/backplane1-janrainbackplane-com/m-p/2123751#M395653</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I currently have an open ticket with Cisco on this matter. I am seeing this "domain" associated with multiple ips. Their current response is &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"the domain is mapped to several IPs and due to the command 'dynamic-filter ambiguous-is-black' then it will be blocked. You can create an entry under the White-list in order to access the Website and keep the "ambiguous" command on."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ip addresses I checked that were being associated with this domain are part of Amazon's e-commerce space. I have white-listed it in a couple of ASAs to see if the underlying ip addresses are captured by the botnet filter.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2012 19:57:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backplane1-janrainbackplane-com/m-p/2123751#M395653</guid>
      <dc:creator>mrrlg</dc:creator>
      <dc:date>2012-11-28T19:57:34Z</dc:date>
    </item>
    <item>
      <title>backplane1.janrainbackplane.com</title>
      <link>https://community.cisco.com/t5/network-security/backplane1-janrainbackplane-com/m-p/2123752#M395656</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think these are all pop-up ads.&amp;nbsp; I thought about white-listing, but we've been blcking thousands of hits with no complaints.&lt;/P&gt;&lt;P&gt;We've seen pop up ads that contain malware, so unless someone complains, we'll not white-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is ambiguoius, I wonder?&amp;nbsp; There is no forward - reverse lookup matches for all of these IPs?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Dec 2012 02:59:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backplane1-janrainbackplane-com/m-p/2123752#M395656</guid>
      <dc:creator>Robert Zeff</dc:creator>
      <dc:date>2012-12-02T02:59:05Z</dc:date>
    </item>
    <item>
      <title>backplane1.janrainbackplane.com</title>
      <link>https://community.cisco.com/t5/network-security/backplane1-janrainbackplane-com/m-p/2123753#M395658</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Same here. We've been blocking about 300-400k connections per day to this site for weeks. Zero complaints. I did a capture and it seemed related to either ads or analytics for Fox Sports websites. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Dec 2012 20:08:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backplane1-janrainbackplane-com/m-p/2123753#M395658</guid>
      <dc:creator>grahamt</dc:creator>
      <dc:date>2012-12-17T20:08:10Z</dc:date>
    </item>
  </channel>
</rss>

