On 08/25/2014 04:51 AM, Alex wrote:
> Hi all,
> 
> I'm having difficulty understanding this one:
> 
> http://pastebin.com/LYJVas5e
> 
> It looks like a host in Japan relayed this message through a few systems
> within trendmicro.com <http://trendmicro.com>, then on to our system
> before being tagged as obvious spam. The part I don't understand is, why
> is Trend involved with this? Is one of their systems compromised?
> 

you should ask them :)

> I'm also wondering why out13.sjc.mx.trendmicro.com
> <http://out13.sjc.mx.trendmicro.com> in the one Received header shows as
> an invalid fqdn when it resolves fine here to the IP in the header.
> 
> Received: from out13.sjc.mx.trendmicro.com
> <http://out13.sjc.mx.trendmicro.com> (unknown [216.99.131.50])

Maybe they disabled dns lookups on their relayhosts since they don't
care about the data: they own the hosts so they are already known. As
for the hostname of the customer that sent the message: they probably
use some non-visible way to easily relate the message to a customer
(f.i. smtp auth).

> 
> # host out13.sjc.mx.trendmicro.com <http://out13.sjc.mx.trendmicro.com>
> out13.sjc.mx.trendmicro.com <http://out13.sjc.mx.trendmicro.com> has
> address 216.99.131.50
> # host 216.99.131.50
> 50.131.99.216.in-addr.arpa domain name pointer
> out13.sjc.mx.trendmicro.com <http://out13.sjc.mx.trendmicro.com>.
> 
> 
> Thanks,
> Alex
> 


Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to