On Sun, Mar 31, 2024 at 6:30 PM Slavko via mailop <mailop@mailop.org> wrote:
> Dňa 31. marca 2024 15:02:31 UTC používateľ Odhiambo Washington via mailop < > mailop@mailop.org> napísal: > > >> Something bad seems to have gained the ability to use that IP... > >> > > > >Not that easy unless there is some recent exploit that I am not aware of. > > Don't seems as neighbor problem... > > checkrbl 41.212.32.14 > > Found in "Spamhaus ZEN DQS" (zen.dq.spamhaus.net): > * CSS, Snowshoe SPAM (127.0.0.3) > * XBL, exploited, open proxy or botnet (127.0.0.4) > * PBL, end user (from Spamhaus) (127.0.0.11) > > checkrbl 41.212.32.15 > Found in "Spamhaus ZEN DQS" (zen.dq.spamhaus.net): > * PBL, end user (from Spamhaus) (127.0.0.11) > > checkrbl 41.212.32.16 > Found in "Spamhaus ZEN DQS" (zen.dq.spamhaus.net): > * PBL, end user (from Spamhaus) (127.0.0.11) > > regards > I have got the ISP to deal with it. Might someone know what I must do to get data showing on https://postmaster.google.com/managedomains ? I have two verified domains in there, but nothing on the (expected) dashboard. https://imgur.com/a/g3DhGWJ -- Best regards, Odhiambo WASHINGTON, Nairobi,KE +254 7 3200 0004/+254 7 2274 3223 In an Internet failure case, the #1 suspect is a constant: DNS. "Oh, the cruft.", egrep -v '^$|^.*#' ¯\_(ツ)_/¯ :-) [How to ask smart questions: http://www.catb.org/~esr/faqs/smart-questions.html]
_______________________________________________ mailop mailing list mailop@mailop.org https://list.mailop.org/listinfo/mailop