Would a spammy email server only trigger one RBL?

While mxtoolbox looks complete, there are more RBLs than on their list. I never 
knew Trend Micro had a RBL. ‎

‎Spamrl.com is one I can't stay off of. They do honor their one week reprieve. 
Like I said, I managed to get them removed from servers that I communicate 
with. There are over a hundred RBLs. If one is a problem child, dump it.

Pulled right from their website.
"Unfortunately, we cannot disclose any details about WHY your IP has a bad 
reputation.‎"

This thread is about spamrl.com, and no, I'm not a participant in the thread. 
http://www.webhostingtalk.com/showthread.php?t=1598238‎

Supposedly spamrl.com uses honeypots, which makes me wonder if a prankster can 
spoof headers and spam the honeypots just to drum up customers for commercial 
white lists. 

  Original Message  
From: Michael Segel
Sent: Tuesday, May 2, 2017 7:02 AM
To: Kevin A. McGrail
Cc: li...@lazygranch.com; Matteo Cazzador; postfix users
Subject: Re: Trace spam activity on mail server

Just to follow up… 
I ran the check on his domain:
https://mxtoolbox.com/domain/netlite.it/

Pretty clean, maybe a few things to fix, but he’s not on any black list. 

I don’t know when he set up his domain, it could be that Trend Micro blocked 
the IP block due to a previous tenant and never took them off. 

Truthfully, I don’t use much more than Spamhaus these days. in terms of RBLs. 

He’s not running an open relay and if there was a spammer on his network, 
Spamhaus would have caught it too. Or someone else. 

Its not Matteo’s server and I suspect its Trend Micro. 

HTH

-Mike

> On May 2, 2017, at 8:56 AM, Kevin A. McGrail <kmcgr...@pccc.com> wrote:
> 
> On 5/2/2017 9:51 AM, Michael Segel wrote:
>> You can run a check on your MX Server… there are a couple of web sites that 
>> do this… and I think one or two will identify the RBLs that include you.
> One trick I use a lot when I have an infected machine on a network or a 
> customer with a problem is that I setup a smarthost running a milter that 
> runs the email through a spam checker, logs the answer and then tempfails the 
> emails.
> 
> Then I can analyze if there is an issue and do a silent discard by subject or 
> internal IP if we find a compromised machine while letting everything else go 
> through.
> 
> Regards,
> KAM

Reply via email to