"THE CBL is only designed to be used on INCOMING mail, i.e. on the hosts that your MX records point to."
From the CBL web site.
They have a FAQ and how to get delisted.
CBL blacklists my ip by stating that
"This IP is infected with, or is NATting for a machine infected with Win32/Dorkbot
This was detected by observing this IP attempting to make contact to a Win32/Dorkbot Command and Control server, with contents unique to Win32/Dorkbot C&C command protocols.
Win32/Dorkbot is a worm, and can travel to infect other computers via Instant Messaging, Twitter, Facebook and even USB drives.
Once installed, it gets involved with clickfraud, and can act as "ransomware" - locking the user out of their computer or encrypting the contents until the user pays a "ransom".
This was detected by a TCP/IP connection from ---.--.---.--- on port 35589 going to IP address 184.108.40.206 (the sinkhole) on port 3720.
The botnet command and control domain for this connection was 'n.hmiblgoja.ru'. "
But this is very odd, because my household holds 2 OSX run macs, an iPhone and a Huawei phone. In addition to these I have a Windows desktop machin, that has been formatted and clean installed with new windows just last week. (I got the same thing from CBL a few weeks ago). I've run multiple different anti-virus softwares, but nothing finds anything.
The most odd thing is that this is a newly installed computer, and the Virus it says this is infected is, should be found with basic Windows anti-malware software.
Does anyone know how the CBL works, is it possible that this is a false positive thing?