So far i can see, is your web site the target not you mail server.

I personaly use : http://multirbl.valli.org/lookup/netlite.it.html 
About the same as mx toolbox, but i did notice that the list of multirbl is 
much shorted when the domainname is used.
If i check with this hostname:  mail.netlite.it (212.29.157.98) 
http://multirbl.valli.org/lookup/212.29.157.98.html 

DNSBL Blacklist Test Summary
Ip based:  231 of 231 tests done. 
Domain base: 49 of 49 tests done. 
Result, not listed anywere. 

You are running with out of date wordpress plugins. Checked a few.
Thats asking for problems. Check you webserver logs for strange/out of the 
order things. 

If you dont use mod security, get it, learn it, install it and stop the 
wordpress abuse.

Greetz, 

Louis



> -----Oorspronkelijk bericht-----
> Van: dovecot_...@hotmail.com 
> [mailto:owner-postfix-us...@postfix.org] Namens Michael Segel
> Verzonden: dinsdag 2 mei 2017 16:02
> Aan: Kevin A. McGrail
> CC: li...@lazygranch.com; Matteo Cazzador; postfix users
> Onderwerp: Re: Trace spam activity on mail server
> 
> Just to follow up…
> I ran the check on his domain:
> https://mxtoolbox.com/domain/netlite.it/
> 
> Pretty clean, maybe a few things to fix, but he’s not on any 
> black list. 
> 
> I don’t know when he set up his domain, it could be that 
> Trend Micro blocked the IP block due to a previous tenant and 
> never took them off. 
> 
> Truthfully, I don’t use much more than Spamhaus these days. 
> in terms of RBLs.  
> 
> He’s not running an open relay and if there was a spammer on 
> his network, Spamhaus would have caught it too. Or someone else. 
> 
> Its not Matteo’s server and I suspect its Trend Micro. 
> 
> HTH
> 
> -Mike
> 
> > On May 2, 2017, at 8:56 AM, Kevin A. McGrail 
> <kmcgr...@pccc.com> wrote:
> > 
> > On 5/2/2017 9:51 AM, Michael Segel wrote:
> >> You can run a check on your MX Server… there are a couple 
> of web sites that do this… and I think one or two will 
> identify the RBLs that include you.
> > One trick I use a lot when I have an infected machine on a 
> network or a customer with a problem is that I setup a 
> smarthost running a milter that runs the email through a spam 
> checker, logs the answer and then tempfails the emails.
> > 
> > Then I can analyze if there is an issue and do a silent 
> discard by subject or internal IP if we find a compromised 
> machine while letting everything else go through.
> > 
> > Regards,
> > KAM
> 
> 

Reply via email to