Regarding spamrl.com / spamexperts, their customer tools don't work. The only 
solution is to drop them. On and off, months were wasted with those clowns.

I'm assuming the customer never sees the dictionary search attempts, so the 
problem is their crappy software. Now I have caught snow shoe type dictionary 
searches coming from Digital Ocean IP space. The hackers buy three to as many 
as eight "droplets". I report them and DO does shut them down. It is possible 
spamrl.com just seems the entire DO IP space toxic, but then again they should 
provide a functional whitelist procedure.

This VPS race to the bottom is a problem. With OVH under $5, it looks like 
there is no floor, and you can't police your customers with pocket change 
revenue. 

  Original Message  
From: Bill Cole
Sent: Wednesday, May 3, 2017 8:26 AM
To: Postfix users
Reply To: Postfix users
Subject: Re: Trace spam activity on mail server

On 2 May 2017, at 10:56, li...@lazygranch.com wrote:

> Would a spammy email server only trigger one RBL?

Sure.

> While mxtoolbox looks complete, there are more RBLs than on their 
> list. I never knew Trend Micro had a RBL. ‎

Funny story: technically Trend Micro has the ONLY "RBL" because that's a 
registered trademark. They bought that trademark along with all of the 
other intellectual property and ongoing operations of Mail Abuse 
Prevention Systems, L.L.C. ~15 years ago. MAPS was a not-for-profit 
founded by Paul Vixie, who invented the DNSBL mechanism and ran the 
first DNSBL: the Realtime Blackhole List, a.k.a. RBL.

As far as I can tell, the active defense of that trademark has been 
almost invisible for over a decade, so while DNSBL is the formally 
correct generic term, RBL may not even be legally defensible as a 
trademark any more but one of the Trend Micro DNSBL's is actually named 
RBL.

> ‎Spamrl.com is one I can't stay off of. They do honor their one week 
> reprieve. Like I said, I managed to get them removed from servers that 
> I communicate with. There are over a hundred RBLs. If one is a problem 
> child, dump it.
>
> Pulled right from their website.
> "Unfortunately, we cannot disclose any details about WHY your IP has a 
> bad reputation.‎"
>
> This thread is about spamrl.com, and no, I'm not a participant in the 
> thread. 
> http://www.webhostingtalk.com/showthread.php?t=1598238‎
>
> Supposedly spamrl.com uses honeypots, which makes me wonder if a 
> prankster can spoof headers and spam the honeypots just to drum up 
> customers for commercial white lists. 

The spamrl.com operation is just an alternative face for spamexperts.com 
and one of their inputs is feedback from customers, who can report 
errors in their filtering to spamrl.com addresses for mitigation.

Reply via email to