Blog , 22 Mar 2021

Abusix Mail Intelligence – Exploit IP List

Steve Freegard,

Sr. Product Owner Abusix Intelligence

Welcome to Part 3 of our series of blog posts dissecting each of the datasets available as part of Abusix Mail Intelligence. This time we’re looking at our Exploit IP list.

How the Exploit IP List is being built:

This list is 100% automated. I call it our “behavioral” blacklist because it’s looking at all of our SMTP inputs (not just traps) and it observes the behavior of the SMTP client and SMTP transaction and will list IPs behaving in a way that a regular SMTP server never would.

Some examples include:

Reasons for being listed & how to avoid getting listed on our Exploit IP List:

Common reasons for being listed in our exploit list:

Compromised or Infected hosts

Keep your devices up-to-date with the latest software, firmware, patches, and plugin updates.  Make sure you run Anti-Virus.

Currently, the most common compromises we see are from Windows PCs, Mikrotik routers, and WordPress. All of these could be avoided if they were kept up to date with the latest patches, firmware update, plugins etc.

Many infections bypass any local SMTP server and implement their own SMTP client and they talk directly to MX over 25/tcp, so are more difficult to detect.   This also ensures that they bypass any rate limits, so considerable amounts of mail can be sent.

Shared IPs

If your mail server uses an external IP that is part of a NAT pool and the internal clients are not blocked from making outbound connections on TCP port 25, then the IP could become listed if one of the NAT IPs is allocated to an infected device.

It is always recommended to prevent 25/tcp outbound to all but SMTP servers.   You should also not place an SMTP server on the same external IP used by a NAT pool, SMTP servers should always be on their own external IP.

For TOR or VPN users, it could be that the external IP that has been allocated is being shared by multiple users and some have been sending spam, malware or a connected user has an infected PC.  For VPN users, switching to a different server or reconnecting is usually all that is needed to receive a new IP.

Misconfigured SMTP servers

Make sure the hostname of the server is set correctly (e.g. not “localhost.localdomain”) and the domain used actually belongs to you.  If you’re going to use an internal domain name, make sure it doesn’t use a public TLD as someone else might register it.

Also, make sure you aren’t breaching the SMTP RFCs by removing Received headers.  This is very bad practice, it does not provide any additional security, makes troubleshooting much more difficult and your messages are far more likely to be treated as spam and you could get listed.

Hope that is useful.

Until next time – stay safe.


Linkedin Icon Twitter Icon Facebook Icon E-mal Icon
Two computer monitors showing AbuseHQ

Free Trial

Keep malicious messages out of your mail server and your user’s inboxes with our 14-day free trial!

Get started

Products & Tools



Get in touch

Talk to us

Do you want to know more about our products and services? Get in touch, we are always happy to answer any questions you may have.

The quickest way to get in touch with the team is via our online chat feature at the bottom right of this page.

Alternatively, feel free to email us at or send us a message via our form.