Solved

Ip listed in Spamhaus list

Posted on 2008-10-27
3
362 Views
Last Modified: 2013-12-09
Hi,
I have a vps server with 2 IP
onece one ip was listed in spamhaus database, and i have removed that one.
but today, i was checking with another Ip,
and its listed aswell!! but todays one is different, its seems to saying, the full subnet is listed

Ref: SBL68923
78.110.172.0/24 is listed on the Spamhaus Block List (SBL)

i have attached the link aswell.
http://www.spamhaus.org/sbl/sbl.lasso?query=SBL68923

what does it mean ?? does it mean, my Ip or the full subnet is blocked

please advise me.
0
Comment
Question by:fosiul01
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 48

Expert Comment

by:Tintin
ID: 22816332
What IP addresses does your VPS server have?

The /24 means a full class C address range (254 IP addresses) is listed.

Note that spamhaus does NOT block anything.  It is a list that servers can reference (mostly for mail) to decide whether they accept/reject mail coming from the listed sites.

0
 
LVL 29

Author Comment

by:fosiul01
ID: 22816367
yes , my Ip is 78.110.172.135

Before i had the same problem with another IP , and at that time, spamhouse was saying that MY Ip is in sbl list , and yahoo , hotmail was not accepting my iP
so i had to fix the problem

but this time, its like full class is listed.

so who would be responsible for removing the ip, I dont think its me, its vps provider , is not it ??
0
 
LVL 48

Accepted Solution

by:
Tintin earned 500 total points
ID: 22816782
Ultimately, your service provider is responsible for the offenders in your IP address block as they will be contravening your service provider's terms of service (TOS).

0

Featured Post

Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question