On 18/04/2024 13:06, Graeme Fowler wrote:
On 18 Apr 2024, at 12:17, Sebastian Arcus <s.ar...@open-t.co.uk> wrote:
That is really useful information - thank you. I'm actually not overly worried 
about revealing the IP address - I guess it is a public IP anyway. If anybody 
can take a look at let me know - that would be much appreciated. The IP in 
question is 51.155.244.89

You replied to me and not the mailing list, but anyway -

Sorry - and thank you for getting back to me

if you go to https://check.spamhaus.org/listed/?searchterm=51.155.244.89 and expand ‘show details’ it explains a lot more.

I have been through that a number of time. It is useful information, but fairly wide ranging. I've already checked everything I could based on the info above. I was trying to narrow things down a bit.


You can also see a reputation score here: 
https://talosintelligence.com/reputation_center/lookup?search=51.155.244.89

Something behind that router is infested with some form of malware. Given the 
HELO name, if you’re providing internet access to the home’s clients, good luck 
finding it!

The mention of HELO is what threw me off - and I kept on thinking that it's not possible, as port 25 is blocked. But I completely missed the point that even authenticated connections on 587 will use HELo - I think? So 587/465 could be possibilities. I don't really have qualms with completely blocking outbound 587/465 if needed - they are mainly still open because it's the first time I've dealt with issues being caused by them being open - and I like to try and provide functionality for users up to the point when it is starting to cause problems.

Thank you again
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to