On Sun, Mar 31, 2024 at 6:30 PM Slavko via mailop <mailop@mailop.org> wrote:

> Dňa 31. marca 2024 15:02:31 UTC používateľ Odhiambo Washington via mailop <
> mailop@mailop.org> napísal:
>
> >> Something bad seems to have gained the ability to use that IP...
> >>
> >
> >Not that easy unless there is some recent exploit that I am not aware of.
>
> Don't seems as neighbor problem...
>
> checkrbl 41.212.32.14
>
> Found in "Spamhaus ZEN DQS" (zen.dq.spamhaus.net):
>  * CSS, Snowshoe SPAM (127.0.0.3)
>  * XBL, exploited, open proxy or botnet (127.0.0.4)
>  * PBL, end user (from Spamhaus) (127.0.0.11)
>
> checkrbl 41.212.32.15
> Found in "Spamhaus ZEN DQS" (zen.dq.spamhaus.net):
>  * PBL, end user (from Spamhaus) (127.0.0.11)
>
> checkrbl 41.212.32.16
> Found in "Spamhaus ZEN DQS" (zen.dq.spamhaus.net):
>  * PBL, end user (from Spamhaus) (127.0.0.11)
>
> regards
>

I have got the ISP to deal with it.

Might someone know what I must do to get data showing on
https://postmaster.google.com/managedomains ?
I have two verified domains in there, but nothing on the (expected)
dashboard.

https://imgur.com/a/g3DhGWJ


-- 
Best regards,
Odhiambo WASHINGTON,
Nairobi,KE
+254 7 3200 0004/+254 7 2274 3223
 In an Internet failure case, the #1 suspect is a constant: DNS.
"Oh, the cruft.", egrep -v '^$|^.*#' ¯\_(ツ)_/¯ :-)
[How to ask smart questions:
http://www.catb.org/~esr/faqs/smart-questions.html]
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to