Just to follow up… 
I ran the check on his domain:
https://mxtoolbox.com/domain/netlite.it/

Pretty clean, maybe a few things to fix, but he’s not on any black list. 

I don’t know when he set up his domain, it could be that Trend Micro blocked 
the IP block due to a previous tenant and never took them off. 

Truthfully, I don’t use much more than Spamhaus these days. in terms of RBLs.  

He’s not running an open relay and if there was a spammer on his network, 
Spamhaus would have caught it too. Or someone else. 

Its not Matteo’s server and I suspect its Trend Micro. 

HTH

-Mike

> On May 2, 2017, at 8:56 AM, Kevin A. McGrail <kmcgr...@pccc.com> wrote:
> 
> On 5/2/2017 9:51 AM, Michael Segel wrote:
>> You can run a check on your MX Server… there are a couple of web sites that 
>> do this… and I think one or two will identify the RBLs that include you.
> One trick I use a lot when I have an infected machine on a network or a 
> customer with a problem is that I setup a smarthost running a milter that 
> runs the email through a spam checker, logs the answer and then tempfails the 
> emails.
> 
> Then I can analyze if there is an issue and do a silent discard by subject or 
> internal IP if we find a compromised machine while letting everything else go 
> through.
> 
> Regards,
> KAM

Reply via email to