Overview
This is a repackaged software product wherein additional charges apply for hardening, security configuration, and support.
WHAT IS LISTMONK
Listmonk is an open-source, self-hosted newsletter and mailing list manager built as a single statically linked Go binary. It supports double or single opt-in subscriber lists, public and private lists, segmented campaigns, transactional email via REST API, HTML and plain-text templates, scheduled and continuous campaigns, bounce processing, click and view tracking, public archive pages, multi-language i18n, custom subscriber attributes, and a built-in admin UI. Connects to any standard SMTP relay (Amazon SES, SendGrid, Postmark, Mailgun, or self-hosted Postfix). Persists subscribers, campaigns, templates, and tracking data in PostgreSQL. AGPL-3.0 license, no vendor lock-in.
WHAT THIS AMI ADDS
Security hardening:
- Super-admin account with unique password (EC2 Instance ID) generated at first boot - never baked into the AMI
- Listmonk admin UI bound to 127.0.0.1:9000 - reachable only through the Nginx reverse proxy with TLS
- PostgreSQL 16 local, listening on 127.0.0.1 only - database password generated per instance
- Nginx reverse proxy with TLS, HTTP-to-HTTPS redirect, security headers
- UFW firewall pre-configured - only TCP 22, 80, 443 are exposed
- fail2ban, AppArmor
- CVE scan - every image is scanned for vulnerabilities before release
OS hardening (CIS Level 1):
- CIS Ubuntu 24.04 LTS Level 1 benchmark applied via ansible-lockdown
- auditd, SSH hardening, kernel hardening, IMDSv2 enforced
Compliance artifacts:
- SBOM - CycloneDX 1.6 at /etc/lynxroute/sbom.json
- CIS Conformance Report at /etc/lynxroute/cis-report.html
- CIS Tailored Profile at /usr/share/doc/lynxroute/CIS_TAILORED_PROFILE.md
Highlights
- Listmonk security baked in: super-admin user with unique password generated at first boot, admin UI bound to 127.0.0.1 and reachable only through Nginx with TLS, PostgreSQL bound to loopback - unlike bare Listmonk AMIs that expose the admin UI directly on TCP 9000, ship without a super-admin user, and leave PostgreSQL listening on 0.0.0.0.
- CIS Level 1 hardened Ubuntu 24.04 LTS: auditd, fail2ban, AppArmor, SSH key-only, IMDSv2 enforced. CVE-scanned before every release. SBOM (CycloneDX) and CIS Conformance Report included.
- Full self-hosted email platform: subscribers, lists, campaigns, transactional REST API, templates, analytics, bounce processing, and i18n in a single Go binary on PostgreSQL 16. AGPL-3.0 license - fully auditable, no vendor lock-in, ever.
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Cost/hour |
|---|---|
t3.small Recommended | $0.02 |
t3.large | $0.03 |
t3.medium | $0.02 |
m6i.large | $0.03 |
Vendor refund policy
We do not offer refunds for this product. AWS infrastructure charges (EC2, EBS, data transfer) are billed separately by AWS and are not refundable by us.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Version 6.1.0 - Initial release (May 2026)
- Listmonk 6.1.0 single-binary on Ubuntu 24.04 LTS
- CIS Level 1 hardening applied (ansible-lockdown/UBUNTU24-CIS)
- CVE-scanned before every release
- Super-admin user with unique password (EC2 Instance ID) generated at first boot
- Admin UI bound to 127.0.0.1:9000 and reachable only through Nginx with TLS
- PostgreSQL 16 local, bound to 127.0.0.1 with per-instance generated password
- UFW firewall pre-configured (TCP 22, 80, 443 only)
- fail2ban, auditd, AppArmor pre-configured
- SBOM (CycloneDX 1.6) at /etc/lynxroute/sbom.json
- CIS Conformance Report (OpenSCAP) at /etc/lynxroute/cis-report.html
- IMDSv2 enforced
Additional details
Usage instructions
- Launch instance (t3.small recommended)
- Open Security Group - allow TCP 443 from your IP
- SSH: ssh -i key.pem ubuntu@<PUBLIC_IP>
- Read credentials: sudo cat /root/listmonk-credentials.txt
- Open https://<PUBLIC_IP> in your browser - accept the self-signed certificate warning
- Log in with admin credentials from the credentials file
- Configure SMTP in Settings -> SMTP after first login
Admin password equals the EC2 Instance ID. Credentials are saved to /root/listmonk-credentials.txt at first boot. Replace the self-signed TLS certificate with a CA-signed certificate for production use.
Support
Vendor support
Visit us online: https://lynxroute.com
For Listmonk documentation: https://listmonk.app/docs For Listmonk upstream issues: https://github.com/knadh/listmonk/issues For AWS infrastructure issues:
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
