Just to follow up… I ran the check on his domain: https://mxtoolbox.com/domain/netlite.it/
Pretty clean, maybe a few things to fix, but he’s not on any black list. I don’t know when he set up his domain, it could be that Trend Micro blocked the IP block due to a previous tenant and never took them off. Truthfully, I don’t use much more than Spamhaus these days. in terms of RBLs. He’s not running an open relay and if there was a spammer on his network, Spamhaus would have caught it too. Or someone else. Its not Matteo’s server and I suspect its Trend Micro. HTH -Mike > On May 2, 2017, at 8:56 AM, Kevin A. McGrail <kmcgr...@pccc.com> wrote: > > On 5/2/2017 9:51 AM, Michael Segel wrote: >> You can run a check on your MX Server… there are a couple of web sites that >> do this… and I think one or two will identify the RBLs that include you. > One trick I use a lot when I have an infected machine on a network or a > customer with a problem is that I setup a smarthost running a milter that > runs the email through a spam checker, logs the answer and then tempfails the > emails. > > Then I can analyze if there is an issue and do a silent discard by subject or > internal IP if we find a compromised machine while letting everything else go > through. > > Regards, > KAM