Roger
Check the Google feeds - they specify the URL / domain that's being abused
Regards
Michele
-- Mr Michele Neylon Blacknight Solutions Hosting & Colocation, Domains http://www.blacknight.co/ http://blog.blacknight.com/ http://mneylon.tel/ Intl. +353 (0) 59 9183072 Locall: 1850 929 929 Direct Dial: +353 (0)59 9183090 Fax. +353 (0) 1 4811 763 Twitter: http://twitter.com/mneylon ------------------------------- Blacknight Internet Solutions Ltd, Unit 12A,Barrowside Business Park,Sleaty Road,Graiguecullen,Carlow,Ireland Company No.: 370845
________________________________________ From: Roger Schreiter [roger@planinternet.de] Sent: 20 September 2013 14:06 To: discuss@lists.surbl.org Subject: [SURBL-Discuss] How to figure out the virtual host, containing malware
Hello,
we are operating email servers and approx 100 virtual web servers on the same machine.
Some email receivers do block our emails, because our server seems to distribute malware on a virtual webserver and is now listed on surbl.org.
Ok, now I have to figure out, which of our 100 customers is hosting a malware on his virtual webserver, most like without knowledge and being victime of a spyware or an unsecure CMS. (The latter should be of course removed asap from our server.)
I wonder, how can I get a hint, which customer's web space is affected? Is there any mean to get more details from surbl.org, about the malware source? Domainname or addidional even a filename would be very helpful.
Thanks for any hints! Roger.
-- Roger Schreiter Lutherstr. 9 D-71576 Burgstetten Tel.: +49 7191 8929678
_______________________________________________ Discuss mailing list Discuss@lists.surbl.org http://lists.surbl.org/mailman/listinfo/discuss
On Sep 20, 2013, at 6:47 AM, Michele Neylon - Blacknight michele@blacknight.com wrote:
Roger
Check the Google feeds - they specify the URL / domain that's being abused
michelle - interesting. but which google feeds?
Regards
Michele
-- Mr Michele Neylon Blacknight Solutions Hosting & Colocation, Domains http://www.blacknight.co/ http://blog.blacknight.com/ http://mneylon.tel/ Intl. +353 (0) 59 9183072 Locall: 1850 929 929 Direct Dial: +353 (0)59 9183090 Fax. +353 (0) 1 4811 763 Twitter: http://twitter.com/mneylon
Blacknight Internet Solutions Ltd, Unit 12A,Barrowside Business Park,Sleaty Road,Graiguecullen,Carlow,Ireland Company No.: 370845
From: Roger Schreiter [roger@planinternet.de] Sent: 20 September 2013 14:06 To: discuss@lists.surbl.org Subject: [SURBL-Discuss] How to figure out the virtual host, containing malware
Hello,
we are operating email servers and approx 100 virtual web servers on the same machine.
Some email receivers do block our emails, because our server seems to distribute malware on a virtual webserver and is now listed on surbl.org.
Ok, now I have to figure out, which of our 100 customers is hosting a malware on his virtual webserver, most like without knowledge and being victime of a spyware or an unsecure CMS. (The latter should be of course removed asap from our server.)
I wonder, how can I get a hint, which customer's web space is affected? Is there any mean to get more details from surbl.org, about the malware source? Domainname or addidional even a filename would be very helpful.
Thanks for any hints! Roger.
-- Roger Schreiter Lutherstr. 9 D-71576 Burgstetten Tel.: +49 7191 8929678
Discuss mailing list Discuss@lists.surbl.org http://lists.surbl.org/mailman/listinfo/discuss
Discuss mailing list Discuss@lists.surbl.org http://lists.surbl.org/mailman/listinfo/discuss
On 09/21/2013 02:59 AM, Neil Schwartzman wrote:
On Sep 20, 2013, at 6:47 AM, Michele Neylon - Blacknight michele@blacknight.com wrote:
Roger
Check the Google feeds - they specify the URL / domain that's being abused
michelle - interesting. but which google feeds?
I'd like to know about any feeds Google makes available as well.
Aside from that, and I'm not entirely sure this would work, but you could probably feed the default homepage URL (http://example.com) of all the domains you host through the Google Safe Browsing API and see if any return a positive hit.
- Ron