找回密码
 立即注册
CeraNetworksBGVM服务器主机交流IP归属甄别会员请立即修改密码
查看: 42|回复: 5

斯巴达这个邮件该如何处理?第一次遇到,求各位指教。

[复制链接]

44

主题

47

回帖

350

积分

中级会员

积分
350
发表于 2022-7-3 08:53:34 | 显示全部楼层 |阅读模式
本帖最后由 sdooer 于 2022-7-3 08:58 编辑

Hi XX

Please see the abuse report below and reply back with a solution within 24 hours. Failure to respond may result in service suspension.

https://check.spamhaus.org/listed/?searchterm=45.142.X.X

Why was this IP listed?
45.142.X.X is making SMTP connections with HELO values that use a bare IP address. This behavior is commonly associated with various botnets, and is a violation of the SMTP protocol as defined in RFC2821/5321 section 4.1.1.1.

The most recent detection was at: July 1 2022, 10:40:00 UTC (+/- 5 minutes)

Ryan McCully
Managing Director
Spartan Host Ltd


补充说明:该服务器我的用途仅安装的VLESS XTLS Nginx。
回复

使用道具 举报

167

主题

700

回帖

2403

积分

金牌会员

积分
2403
发表于 2022-7-3 08:54:46 | 显示全部楼层
翻译版

Hi SB
请参阅下面的滥用报告,并在24小时内回复解决方案。不响应可能导致服务暂停。
https://check.spamhaus.org/listed/?searchterm=45.142.X.X
为什么列出此IP?
45.142.X.X正在使用使用裸IP地址的HELO值进行SMTP连接。此行为通常与各种僵尸网络相关,并且违反RFC2821/5321第4.1.1.1节中定义的SMTP协议。
最近一次检测时间为:2022年7月1日,10:40:00UTC(+/-5分钟)
瑞安·麦卡利
总经理
斯巴达主机有限公司
回复

使用道具 举报

49

主题

1048

回帖

2529

积分

金牌会员

积分
2529
发表于 2022-7-3 09:27:22 | 显示全部楼层

第一次见到 楼下来
回复

使用道具 举报

319

主题

806

回帖

3705

积分

论坛元老

积分
3705
发表于 2022-7-3 09:31:28 | 显示全部楼层
不知道,你可以回复直接关机
回复

使用道具 举报

62

主题

251

回帖

1088

积分

金牌会员

积分
1088
发表于 2022-7-3 10:57:36 | 显示全部楼层
1:一键脚本被按了后门 2:VPS的root密码被人攻破了
回复

使用道具 举报

44

主题

47

回帖

350

积分

中级会员

积分
350
 楼主| 发表于 2022-7-3 11:05:08 | 显示全部楼层

hostloc10086 发表于 2022-7-3 10:57

1:一键脚本被按了后门 2:VPS的root密码被人攻破了


根据链接所提供的如下提示:
我想应该是我使用了扶墙,和安装使用流媒体APP的原因?


What should be done about it?
If this is a shared server, please call your hosting company or ISP!

These listings are the result of what we believe to be a security issue that results in spam being sent from your network. To stop ongoing listings and to secure your network, devices, and data, we recommend both prevention and remediation of the issue.

We hope the following information might be of help.

Prevention
We very strongly advise securing your router/firewall to deny any outbound packets on port 25, except those coming from any email servers (if any) on your local network. Remote sending of email to servers on the Internet will still work if web-based, or configured properly using port 587 with SMTP-AUTH.

If you are not running your own mail server, you should be using your ISP's mail servers with SMTP authentication, and your router should be set to deny outbound traffic on port 25. Your ISP can help you set that up if needed.
If you are using your ISP's mail servers and they are blocking you from those servers, please call them for a resolution. Your router should also be set to deny outbound traffic on port 25. Your ISP can help with that.
If you are running your own mail server, please contact your ISP for help with getting set up on an appropriate static IP and valid DNS/rDNS for that purpose, to configure SMTP authentication on port 587, and then to limit outbound port 25 only to the use of that server.
Limiting port 25 access is a best practice. Please call your ISP or IT department for assistance with configuring your router or firewall correctly.

Remediation
The device(s) or computer(s) that caused this issue should be found and secured. The following information should address most cases, but please seek professional assistance if it is necessary:

The cause of this problem is frequently found to be coming from an phone or laptop with "free" 扶墙s, channel unlockers, streaming type apps installed.
Programs like Windows Defender, Windows Malicious Software Removal Tool (MSRT), Malwarebytes, Norton Power Eraser, CCleaner and/or McAfee Stinger can help. There is also a version of Malwarebytes for Mac/OSX. These tools are free of charge!
Update your enterprise anti-virus/anti-malware programs, and run full scans on every device that is available
If you have a CMS or website, ensure it is up to date. All plug-ins, extensions & patches for it should be updated and maintained
We can only see what's coming from the NAT (public) IP; anything inside your network is visible only to you. Packet capture is the best way to identify which devices are generating unwanted traffic. In general, only mailservers are supposed to generate traffic to port 25, as mail clients rely on the dedicated ports 587 or 465.
If this IP address is a NAT gateway, firewall or router: in some cases, the compromised device can also be the router/firewall itself. Please consult the documentation of your device regarding how to make sure its software is up to date, and how to ensure that the device is properly secured.
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

Archiver|手机版|小黑屋|HS2V主机综合交流论坛

GMT+8, 2024-5-9 10:12 , Processed in 0.160052 second(s), 3 queries , Gzip On, Redis On.

Powered by Discuz! X3.5

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表