So far i can see, is your web site the target not you mail server. I personaly use : http://multirbl.valli.org/lookup/netlite.it.html About the same as mx toolbox, but i did notice that the list of multirbl is much shorted when the domainname is used. If i check with this hostname: mail.netlite.it (212.29.157.98) http://multirbl.valli.org/lookup/212.29.157.98.html
DNSBL Blacklist Test Summary Ip based: 231 of 231 tests done. Domain base: 49 of 49 tests done. Result, not listed anywere. You are running with out of date wordpress plugins. Checked a few. Thats asking for problems. Check you webserver logs for strange/out of the order things. If you dont use mod security, get it, learn it, install it and stop the wordpress abuse. Greetz, Louis > -----Oorspronkelijk bericht----- > Van: dovecot_...@hotmail.com > [mailto:owner-postfix-us...@postfix.org] Namens Michael Segel > Verzonden: dinsdag 2 mei 2017 16:02 > Aan: Kevin A. McGrail > CC: li...@lazygranch.com; Matteo Cazzador; postfix users > Onderwerp: Re: Trace spam activity on mail server > > Just to follow up… > I ran the check on his domain: > https://mxtoolbox.com/domain/netlite.it/ > > Pretty clean, maybe a few things to fix, but he’s not on any > black list. > > I don’t know when he set up his domain, it could be that > Trend Micro blocked the IP block due to a previous tenant and > never took them off. > > Truthfully, I don’t use much more than Spamhaus these days. > in terms of RBLs. > > He’s not running an open relay and if there was a spammer on > his network, Spamhaus would have caught it too. Or someone else. > > Its not Matteo’s server and I suspect its Trend Micro. > > HTH > > -Mike > > > On May 2, 2017, at 8:56 AM, Kevin A. McGrail > <kmcgr...@pccc.com> wrote: > > > > On 5/2/2017 9:51 AM, Michael Segel wrote: > >> You can run a check on your MX Server… there are a couple > of web sites that do this… and I think one or two will > identify the RBLs that include you. > > One trick I use a lot when I have an infected machine on a > network or a customer with a problem is that I setup a > smarthost running a milter that runs the email through a spam > checker, logs the answer and then tempfails the emails. > > > > Then I can analyze if there is an issue and do a silent > discard by subject or internal IP if we find a compromised > machine while letting everything else go through. > > > > Regards, > > KAM > >