I spoke with someone at Mimecast and we concluded the the customer of mimecast has setup that rule (likely the whole of *.tools), since they could not find anything on there end that didnt like bgp.tools
On Wed, Jan 17, 2024 at 10:54 PM Christopher Hawker <ch...@thesysadmin.au> wrote: > > It'd be interesting to know how Mimecast made the determination that > bgp.tools is compromised. > > Regards, > Christopher Hawker > > On Thu, 18 Jan 2024 at 09:47, Rubens Kuhl <rube...@gmail.com> wrote: >> >> It might be due to usage of a new gTLD like .tools. A number of new >> gTLDs use heavy discounting and this is a magnet for abusive >> registrations, unfortunately. >> >> Rubens >> >> On Wed, Jan 17, 2024 at 2:15 PM Tim Burke <t...@mid.net> wrote: >> > >> > +1 for bgp.tools, it is a superior tool. Sadly, the corporate IT-forced >> > DNS filtering at work for “cybersecurity” (Mimecast) thinks it is a >> > compromised website for some reason, so bgp.he.net ends up being used >> > while I am at the office. >> > >> > On Jan 16, 2024, at 8:44 AM, Ian Chilton <i...@ichilton.co.uk> wrote: >> > >> > Hi, >> > >> > Not a direct answer to your question, but if you're not aware of it, >> > https://bgp.tools/ is a great tool and shows the same info. >> > >> > Ian >> > >> >