Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Ip listed in Spamhaus list

Posted on 2008-10-27
3
360 Views
Last Modified: 2013-12-09
Hi,
I have a vps server with 2 IP
onece one ip was listed in spamhaus database, and i have removed that one.
but today, i was checking with another Ip,
and its listed aswell!! but todays one is different, its seems to saying, the full subnet is listed

Ref: SBL68923
78.110.172.0/24 is listed on the Spamhaus Block List (SBL)

i have attached the link aswell.
http://www.spamhaus.org/sbl/sbl.lasso?query=SBL68923

what does it mean ?? does it mean, my Ip or the full subnet is blocked

please advise me.
0
Comment
Question by:fosiul01
  • 2
3 Comments
 
LVL 48

Expert Comment

by:Tintin
ID: 22816332
What IP addresses does your VPS server have?

The /24 means a full class C address range (254 IP addresses) is listed.

Note that spamhaus does NOT block anything.  It is a list that servers can reference (mostly for mail) to decide whether they accept/reject mail coming from the listed sites.

0
 
LVL 29

Author Comment

by:fosiul01
ID: 22816367
yes , my Ip is 78.110.172.135

Before i had the same problem with another IP , and at that time, spamhouse was saying that MY Ip is in sbl list , and yahoo , hotmail was not accepting my iP
so i had to fix the problem

but this time, its like full class is listed.

so who would be responsible for removing the ip, I dont think its me, its vps provider , is not it ??
0
 
LVL 48

Accepted Solution

by:
Tintin earned 500 total points
ID: 22816782
Ultimately, your service provider is responsible for the offenders in your IP address block as they will be contravening your service provider's terms of service (TOS).

0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Ubuntu not booting - How get past GRUB? 3 57
ftp to port 21 4 54
maybe no no httpd.conf 6 62
EXCHANGE. LINUX, SYMANTEC MESSAGING GATEWAY 2 38
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

837 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question