Home Directory Plugins Security check_iponblacklist

Search Exchange

Search All Sites

Nagios Live Webinars

Let our experts show you how Nagios can help your organization.

Contact Us

Phone: 1-888-NAGIOS-1
Email: sales@nagios.com

Login

Remember Me

Directory Tree

check_iponblacklist

Current Version
1
Last Release Date
2017-03-19
Compatible With
  • Nagios 3.x
  • Nagios 4.x
Twitter Handle
@chipongue04
License
GPL
Hits
9056
Files:
FileDescription
check_dnsbl.pycheck_dnsbl.py
Nagios CSP

Meet The New Nagios Core Services Platform

Built on over 25 years of monitoring experience, the Nagios Core Services Platform provides insightful monitoring dashboards, time-saving monitoring wizards, and unmatched ease of use. Use it for free indefinitely.

Monitoring Made Magically Better

  • Nagios Core on Overdrive
  • Powerful Monitoring Dashboards
  • Time-Saving Configuration Wizards
  • Open Source Powered Monitoring On Steroids
  • And So Much More!
This Nagios plugin monitors blacklists in search of a past IP address as an argument. By default, the plugin searches in 27 of the most popular blacklists, and can optionally be added to other lists, or ignored the set of predefined blacklists. This plugin signals the presence of the server IP address on at least one of the blacklists with the critical state.
Blacklists are one of the most popular tools to combat the growing problem of spam and phishing attempts by using the email. These lists are typically implemented in the form of DNS records. In this model, an e-mail server is inserted in a blacklist by adding its IP address to a domain managed by the list in a format previously agreed.
To verify the reliability of a server, the Antispam tools query DNS by searching the server IP address in the format defined by the list. The content of the returned registry is irrelevant since its existence in DNS signals the server's presence on the blacklist. These lists are managed by private entities, and address-insertion policies are susceptible to failures and misleading interpretations of the sometimes legitimate behavior of e-mail servers.
Typically, messages sent by servers in blacklists are strongly rejected or marked as spam by the recipient's spam detection tools. The presence of a legitimate email server in a blacklist has a negative impact on the functioning of the institution, which is important to be aware and resolve as soon as possible.

This Nagios plugin monitors blacklists in search of a past IP address as an argument. By default, the plugin searches in 27 of the most popular blacklists, and can optionally be added to other lists, or ignored the set of predefined blacklists. This plugin signals the presence of the server IP address on at least one of the blacklists with the critical state.

Mandatory arguments: The following argument must be specified when the module is executed:-H or – hostaddress used to specify e-mail address to send.

Optional arguments: The following arguments are optionally invoked, as required by the user:-L or – list used to specify one or a set of blacklists.
-I or – ignore used to skip the blacklist pre installed. -I or – ignore, used to specify one or more black lists to be ignored.
-V or – version used to query the module version.
-A or – author used to query the author's data.

Command-Line Execution Example:
./check_dnsbl.py -H 198.224.42.133 -l zem.spamhaus.org,spam.abuse.ch
Reviews (1)
Every time I was running the plugin I was getting the following error: "Error, check you internet connection". 194.210.238.163 could not be pinged, so in order to make the plugin work, I had to change line 52 from this:
urllib.request.urlopen('http://194.210.238.163', timeout=2)
to this:
urllib.request.urlopen('https://www.google.com/', timeout=2)