My server's ip has been added to the SpamHaus CBL blacklist. I thought I found the infected client site that is the cause and cleaned it, but I keep getting relisted so I am missing something.
SpamHaus have given me excellent information to find the cause, but for the life of me I cannot find any record of the connection related to the info they gave me - despite grepping the heck out of my entire server, which I have full access to.
They have also provided a link to tool https://www.abuseat.org/shtracer.pl to use to monitor for the next activity that will get me back on the list, but I am climbing the learning curve to get that perl script to run on my ssh command line.
So while I continue to struggle away I thought I'd ask for help/advice here and in the process create a thread others in my situation may benefit from. I've not found anything current online that is helping me, so either I'm missing something bigtime or this is a new issue.
An abbreviation of what I have been told:
> This IP address is infected with or NATing for an infection of "Eitest".
>This was detected by a TCP connection from "xxx.xxx.xxx.xxx" on port "59095" going to IP address "192.42.xxx.xx" (the sinkhole) on port "80".
> This detection corresponds to a connection at Fri Apr 20 20:49:04 2018 UTC (this timestamp is believed accurate to within one second).
Detection Information Summary
Destination IP 192.42.xxx.xx
Destination port 80
Source IP xxx.xxx.xxx.xxx
Source port 59095
C&C name/domain example.com
Protocol TCP
Time Fri Apr 20 20:49:04 2018 UTC
SpamHaus have given me excellent information to find the cause, but for the life of me I cannot find any record of the connection related to the info they gave me - despite grepping the heck out of my entire server, which I have full access to.
They have also provided a link to tool https://www.abuseat.org/shtracer.pl to use to monitor for the next activity that will get me back on the list, but I am climbing the learning curve to get that perl script to run on my ssh command line.
So while I continue to struggle away I thought I'd ask for help/advice here and in the process create a thread others in my situation may benefit from. I've not found anything current online that is helping me, so either I'm missing something bigtime or this is a new issue.
An abbreviation of what I have been told:
> This IP address is infected with or NATing for an infection of "Eitest".
>This was detected by a TCP connection from "xxx.xxx.xxx.xxx" on port "59095" going to IP address "192.42.xxx.xx" (the sinkhole) on port "80".
> This detection corresponds to a connection at Fri Apr 20 20:49:04 2018 UTC (this timestamp is believed accurate to within one second).
Detection Information Summary
Destination IP 192.42.xxx.xx
Destination port 80
Source IP xxx.xxx.xxx.xxx
Source port 59095
C&C name/domain example.com
Protocol TCP
Time Fri Apr 20 20:49:04 2018 UTC
Last edited by a moderator: