Comparison of DNS blacklists

Last updated

The following table lists technical information for assumed reputable[ by whom? ] DNS blacklists used for blocking spam.

Contents

Blacklist operatorDNS blacklistZoneListing goalNominationListing lifetimeNotesCollateral listingsNotifies upon listing
Abusix combined combined.mail.abusix.zoneAggregate zoneAggregate zoneAggregate ZoneSingle lookup that contains results from black, exploit and policy listsNoNo
black black.mail.abusix.zoneLists individual IP addresses that have sent mail to spam traps, and some manually-added address blocks.Mostly automatic with some manual additionsFor automated, listings 5.6 days after last event. Manual additions are permanent.NoNo (but planned)
exploit exploit.mail.abusix.zoneLists IP addresses behaving in a way that indicates they are compromised, infected, proxies, or VPN or TOR exit nodes.Automatic5.6 days after last eventNoNo (but planned)
policy dynamic.mail.abusix.zoneLists IP addresses that should not be connecting directly to MX, such as residential IP addresses etc.AutomaticPermanent (until delist requested)Lists ranges that have generic or templated rDNS. Individual IP addresses can be delisted immediately via web.NoNo
dblack dblack.mail.abusix.zoneLists domains seen in spam hitting traps.Automatic5.6 days after last eventCan be used as an RHSBL and a URIBL.NoNo (but planned)
nod nod.mail.abusix.zoneLists domains that are newly observed (first use).Automatic25 hoursBased on historical passive DNS data, lists domains first seen in the wild within the last 25 hours).NoNo
shorthash shorthash.mail.abusix.zoneLists short URLs (SHA-1 hashed) seen in traps.Automatic5.6 days after last eventCreated to handle popular shorteners that are misused to hide domains from blacklistingNoNo
diskhash diskhash.mail.abusix.zoneLists URLs of online drive services (SHA-1 hashed) seen in traps.Automatic5.6 days after last eventCurrent only listing Google Drive and Yandex Disk URLs that are used to avoid domain blacklisting.NoNo
ARM Research Labs, LLC GBUdb Truncate truncate.gbudb.netExtremely conservative list of single IP4 addresses that produce exclusively spam/malware as indicated by the GBUdb IP Reputation system. Most systems should be able to safely reject connections based on this list.Automatic: IP addresses are added when the GBUdb "cloud" statistics reach a probability figure that indicates 95% of messages produce a spam/malware pattern match and a confidence figure that indicates sufficient data to trust the probability data.Automatic: Continuous while reputation statistics remain bad. Warning: Produces false positives, and has no remedy/removal process. IP addresses are dropped quickly if the statistics improve (within an hour). IP addresses are dropped within 36 hours (typ) if no more messages are seen (dead zombie).Source data is derived from a global network of Message Sniffer [1] filtering nodes in real-time. Truncate data is updated from statistics every 10 minutes.

Warning: Unreliable, as it produces false positives. It is impossible to find additional information or to manually troubleshoot the problem. It is based on results created by their proprietary software running a proprietary algorithm.

NoNo
Metunet Research Labs Metunet dnsbl rbl.metunet.comSingle IP4 addresses that produce exclusively spam or malware. Mail service providers are protected.AutomaticLast activities after one year automatic or delist request by mailRemoval requests are quickly and manually reviewed and processed without fees.NoNo
Mailspike / Anubisnetworks mailspike.org bl.mailspike.orgIP4 / IPv6 addresses that produce spam or malware.AutomaticList is updated daily. Reputation is gradually restored after days of good / null activityImmediate delisting via the websiteNoNo
invaluement DNSBL ivmSIP Paid access via rsyncSingle IP addresses which only send UBE. Specializing in snowshoe spam and other 'under the radar' spam which evades many other DNSBLs. Has FP-level comparable to Zen.Automatic (upon receipt of spam to a real person's mailbox), with extensive whitelists and filtering to prevent false positivesTypically an automatic expiration 11 days after the last abuse was seen, but with some exceptionsSpam samples are always kept on file for each listing. Removal requests are manually reviewed and processed without fees.NoNo
ivmSIP/24 Paid access via rsyncLists /24 blocks of IP addresses which usually only send UBE and containing at least several addresses which are confirmed emitters of junk mail. Collateral listings are kept to a minimum because subsections are often carved from /24 listings when spammers and legit senders share the same /24 block.Automatic once at least several IP addresses from a given block are individually listed on ivmSIP, with extensive whitelists and filtering to prevent false positivesExpiration time increases to many weeks as the fraction of IP addresses in the /24 block in question sending junk mail increases.Removal requests are quickly and manually reviewed and processed without fees.YesNo
ivmURI Paid access via rsyncComparable to uribl.com and surbl.org, this is a list of IP addresses and domains which are used by spammers in the clickable links found in the body of spam messagesAutomatic (upon receipt of spam to a real person's mailbox), with extensive whitelists and filtering to prevent false positivesTypically an automatic expiration several weeks after the last abuse was seenSpam samples are always kept on file for each listing. Removal requests are quickly and manually reviewed and processed without fees.NoNo
Spam and Open Relay Blocking System (SORBS) dnsbl dnsbl.sorbs.netUnsolicited bulk/commercial e-mail sendersN/A (See individual zones)N/A (See individual zones)Aggregate zone (all aggregates and what they include are listed on SORBS) [2] As per component listVia SORBS Report Manager
safe.dnsbl safe.dnsbl.sorbs.netUnsolicited bulk/commercial e-mail sendersN/A (See individual zones)N/A (See individual zones)"Safe" Aggregate zone (all zones in dnsbl.sorbs.net except "recent", "old", "spam" and "escalations")NoVia SORBS Report Manager
http.dnsbl http.dnsbl.sorbs.netOpen HTTP proxy serversFeeder serversUntil delisting requestedNoVia SORBS Report Manager
socks.dnsbl socks.dnsbl.sorbs.netOpen SOCKS proxy serversFeeder serversUntil delisting requestedNoVia SORBS Report Manager
misc.dnsbl misc.dnsbl.sorbs.netAdditional proxy serversFeeder serversUntil delisting requestedThose not already listed in the HTTP or SOCKS databasesNoVia SORBS Report Manager
smtp.dnsbl smtp.dnsbl.sorbs.netOpen SMTP relay serversFeeder serversUntil delisting requestedNoVia SORBS Report Manager
web.dnsbl web.dnsbl.sorbs.netIP addresses with vulnerabilities that are exploitable by spammers (e.g. FormMail scripts)Feeder serversUntil delisting requested or automated expiryNoVia SORBS Report Manager
new.spam.dnsbl new.spam.dnsbl.sorbs.netHosts that have sent spam to the SORBS spam traps or administrators in the last 48 hoursSORBS administrators and spam trapsRenewed every 20 minutes based inclusion in on 'spam.dnsbl.sorbs.net'NoVia SORBS Report Manager
recent.spam.dnsbl recent.spam.dnsbl.sorbs.netHosts that have sent spam to the SORBS spam traps or administrators in the last 28 daysSORBS administrators and spam trapsRenewed every 20 minutes based inclusion in on 'spam.dnsbl.sorbs.net'NoVia SORBS Report Manager
old.spam.dnsbl old.spam.dnsbl.sorbs.netHosts that have sent spam to the SORBS spam traps or administrators in the last yearSORBS administrator and spam trapsRenewed every 20 minutes based inclusion in on 'spam.dnsbl.sorbs.net'NoVia SORBS Report Manager
spam.dnsbl spam.dnsbl.sorbs.netHosts that have allegedly sent spam to the SORBS spam traps or administrators everSORBS administrators and spam trapsUntil delisting requestedNoVia SORBS Report Manager
escalations.dnsbl escalations.dnsbl.sorbs.netAddress blocks of service providers believed to support spammersSORBS administratorsUntil delisting requested and matter resolvedService providers are added on receipt of a 'third strike' spamYesVia SORBS Report Manager
block.dnsbl block.dnsbl.sorbs.netHosts demanding that they never be testedRequest by hostN/ANoVia SORBS Report Manager
zombie.dnsbl zombie.dnsbl.sorbs.netHijacked networksSORBS administrators (manual submission)Until delisting requestedNoVia SORBS Report Manager
dul.dnsbl dul.dnsbl.sorbs.netDynamic IP address rangesSORBS administrators (manual submission)Until delisting requestedNot a list of dial-up IP addressesNoVia SORBS Report Manager
noservers.dnsbl noservers.dnsbl.sorbs.netNo Servers Permitted by ISP PolicyAdministered by address registrantsNot Applicable.No Servers Permitted by ISP PolicyNoVia SORBS Report Manager
rhsbl rhsbl.sorbs.netAggregate RHS zonesN/AN/ANoNo
badconf.rhsbl badconf.rhsbl.sorbs.netDomains with invalid A or MX records in DNS Open submission via automated testing pageUntil delisting requestedNoNo
nomail.rhsbl nomail.rhsbl.sorbs.netDomains which the owners have confirmed will not be used for sending mailOwner submissionUntil delisting requestedNoNo
Spamhaus Spamhaus Blocklist (SBL) sbl.spamhaus.orgThis list contains IP addresses that are observed to be involved in sending spam, snowshoe spamming, botnet command and controllers (C&Cs), bulletproof hosting companies and hijacked address space.ManualFrom five minutes to a year or more, depending on issue and resolutionRarely (escalation)Yes (partial)
eXploits Blocklist (XBL) N/AThis lists the individual IPv4 addresses (/32s) that are infected with malware, worms, and Trojans; third party exploits, such as open proxies; or devices controlled by botnets. The constantly updated list is designed to protect networks from malware and spam by preventing mailservers from accepting connections from compromised computing devices.Third-party with automated additionsVaries, under a month, self removal via Composite Blocking List lookupConsists of the Composite Blocking List NoNo
Extended eXploits Blocklist (eXBL) N/AThis list is a real-time database of raw and filtered feeds that provides additional information on hijacked IP addresses. The eXBL is available to selected security organizations and cyber incident response teams.Third-party with automated additionsVaries, under a month, self removal via Composite Blocking List lookupConsists of the Composite Blocking List NoNo
Domain Blocklist (DBL) dbl.spamhaus.orgDomains owned by spammers and used for spam or other malicious purposes. This blocklist also contains domains owned by non-spammers which are used for legitimate purposes, but have been hijacked by spammers.Ranking of over 80 different metrics and machine learningA few days, with self-removal generally allowed{{}}Rarely
Enhanced Domain Blocklist (eDBL) dbl.spamhaus.orgThis list provides detailed information on each domain listing and is available via an API. This enables querying of the DBL engine, returning a JSON record for each domain.

The Enhanced Domain Blocklist (eDBL) can be used to track a particular domain's score over a longer period, or to combine Domain Blocklist data with other information.

A few days. Self-removal generally allowed.{{}}Rarely
Policy Blocklist (PBL) pbl.spamhaus.orgThis list includes IP address ranges for end-user devices, such as home routers, smart TVs, and other Information of Things (IoT) devices, from which mail should never be sent. This protects networks from the potential of being compromised by malware spread by botnet command and controller servers (C&Cs).Manual, by providers controlling the IPs or by Spamhaus PBL TeamSelf-removal (see spamhaus web site)Should not be confused with the MAPS DUL and Wirehub Dynablocker listsNoNo
Hash Blocklist (HBL) hbl.spamhaus.orgThis list contains the following content areas: Cryptowallet (Bitcoin etc.), malware and e-mail addresses.

Hash Blocklists (HBL) are lists of cryptographic hashes associated with malicious content, as opposed to IP addresses or domains. They are extremely useful for filtering fraudulent mail coming from ISPs, domains, or IP addresses that Spamhaus is unable to list e.g. Gmail. Additionally, they can block mail containing malware files.

Manual, by providers controlling the addresses or by Spamhaus PBL TeamSelf-removal (see spamhaus web site)NoNo
Zero Reputation Domains (ZRD) <key>.authbl.dq.spamhaus.netThis lists newly registered domains for 24 hours. Domains that have just been registered are rarely used by legitimate organizations immediately. Cybercriminals register and burn 100s of domains daily.

The Zero Reputation Domain (ZRD) blocklist helps to protect users from following links and visiting newly registered domains until it is established that they are not associated with zero day attacks; phishing, bot-herding, spyware or ransomware campaigns.

Automated24 hoursNoNo
Zen zen.spamhaus.orgA single lookup for querying the SBL, XBL and PBL databasesPreferred list to check all Spamhaus address lists with one queryAs per component listAs per component list
THREATINT DNSBL dnsbl.threatint.zoneIP addresses used to send spam and/or scan networks/hostsspam traps, honeypotsAutomatic: 48 hrs after activity stopsNoNo
JustSpam JustSpam.Org dnsbl.justspam.orgIP addresses used to send spam to trapspam trapsUntil Free RemovalSending a special mail generated using the removalform contains the listed IP in the mailheader.NoNo


Passive Spam Block List PSBL psbl.surriel.com
(also free available via rsync )
IP addresses used to send spam to trapspam trapsTemporary, until spam stopsNoNo
Weighted Private Block List WPBL db.wpbl.infoIP addresses used to send UBE to membersspam trapsTemporary, until spam stopsNoNo
SpamCop Blocking List SCBL bl.spamcop.netIP addresses which have been used to transmit reported mail to SpamCop usersUsers submitTemporary, until spam stops, has self removalNoYes (partial)
SpamRats RATS-NoPtr noptr.spamrats.comIP addresses detected as abusive at ISPs using MagicMail Servers, with no reverse DNS serviceAutomatically SubmittedListed until removed, and reverse DNS configuredYesNo
RATS-Dyna dyna.spamrats.comIP addresses detected as abusive at ISPs using MagicMail Servers, with non-conforming reverse DNS service (See Best Practises) indicative of compromised systemsAutomatically SubmittedListed until removed, and reverse DNS set to conform to Best PractisesYesNo
RATS-Spam spam.spamrats.comIP addresses detected as abusive at ISPs using MagicMail Servers, and manually confirmed as spam sourcesManually SubmittedListed until removedYesNo
RATS-Auth auth.spamrats.comIP addresses detected probing passwords or authenticating without sending mailAutomatically SubmittedListed until removedYesNo
Junk Email Filter Hostkarma hostkarma.junkemailfilter.comDetects viruses by behavior using fake high MX and tracking non-use of QUITAutomated [de]listingBlack list entries last 4 days. White list entries last 10 days.127.0.0.1=white 127.0.0.2=black 127.0.0.3=yellowYesNo
Heise Zeitschriften Verlag GmbH & Co. KG, hosted by manitu GmbH NiX Spam (nixspam) ix.dnsbl.manitu.netLists single IP addresses (no address ranges) that send spam to spam traps. Lists mailhosts, rather than domains, and thus blocks entire hosting providers and ISPs.Automated listing due to spam trap hits. Exceptions apply to bounces, NDRs and whitelisted IP addresses.12 hours after last listing or until self delistingTXT records provide information of listing incident - NiX Spam also provides hashes for fuzzy checksum plugin (iXhash) for SpamAssassin.NoYes (for ISPs/ESPs on request)
blocklist.de dnsbl bl.blocklist.deIP addresses used to in attacks over SSH, IMAP, SMTP, FTP, or HTTP, or for attacks involving remote file inclusion, SQL injection, or DDOSAutomatic: over honeypots and with over 515 users and 630 servers from blocklist.de via Fail2Ban or own scriptsAutomatic: 48 Hours after the last Attack. But earlier remove is available over the Delist-LinkServices are free. Source data is from Honeypot-Systems and over 515 User with 630 Servern there reports Attacks with Fail2BanNoYes
s5h.net Internet Services s5h.net all.s5h.netSpam sources from mail, forums, referrer spam and dictionary attacksTrapsTwelve months unless ISPs request removal earlierBy request. ISPs can provide request exclusion.YesNo


BarracudaCentral RBL b.barracudacentral.orgSpam TrapProvides a list of IP addresses which are sending spam. The Barracuda Reputation system uses automated collection methods to add and delete IP addresses from the BRBL.Until delisting requestedRequires registration of administrator and hosts to use. Removal requests are typically investigated and processed within 12 hours of submission if provided with a valid explanation.NoNo
The NordSpam Project NordSpam IP Blacklist bl.nordspam.comIP addresses detected as unsolicited bulk/commercial e-mail senders, Web spamManualUntil delisting requestedRemoval requests are manually reviewed and processed without fees.Rarely (escalation)Sometimes
NordSpam Domain Blacklist dbl.nordspam.comUnsolicited bulk/commercial e-mail senders, Web spamManualUntil delisting requestedRemoval requests are manually reviewed and processed without fees.NoSometimes
0Spam Project bl.0spam.org bl.0spam.orgLists single IP's for spam, malware, abuse, RFC Non-Compliance, Bad configuration and fraudAutomated listings from: Machine Learning, Spam traps, and abuse detectionUntil IP Owner/Authorized administrator/End User requests listing removal0spam AI detects: # General spam, # RFC-non-compliance issue, # Bouncing mail to the wrong server, # Unauthorized Mail relay, # Spoof & Bouncing spoofed-sender mail, # Fraud or scam mail, malware or illegal or abusive contentNoYes
rbl.0spam.org rbl.0spam.orgLists single IP's for spam, malware, abuse, RFC Non-Compliance, Bad configuration and fraudAutomated listings from: Machine Learning, Spam traps, and abuse detectionAutomated removal after 24 hours of no spam.0spam AI detects: # General spam, # RFC-non-compliance issue, # Bouncing mail to the wrong server, # Unauthorized Mail relay, # Spoof & Bouncing spoofed-sender mail, # Fraud or scam mail, malware or illegal or abusive contentNoYes
nbl.0spam.org nbl.0spam.orgLists Class C networks with high number of unaddressed abuse reports on the bl.0spam.org list.Automated listings for spam source Class C blocksUntil IP Owner/Authorized administrator/End User requests listing removalIt's suggestion to use the nbl.0spam.org list in conjunction with rule based filtering. This is a NetworkBlockList(NBL) so it lists full Class C IP blocks containing a high number of spam IP's. Use with SPF/DKIM Fail to produce the most accurate results.NoYes
dbl.0spam.org dbl.0spam.orgLists single IP's for domains found to be in spam emails.Automated listings from: Parsing spam emailsUntil IP Owner/Authorized administrator/End User requests listing removalThis list contains the IP's of domains found to be in emails identified as spam. You should NOT use this list as a sole identifier of spam.NoYes
Brukalai.lt DNSBL black.dnsbl.brukalai.ltAddresses and domains for junk mail filtering (aggregate zone)Mostly automatic with some manual additionsUntil delisting requestedYesNo
Metunet DNSBL rbl.metunet.comSingle IP4 addresses produce exclusively spam or malware. Respective Mail providers protected like Free and paid mail providers.AutomaticOne year after last activity (automatic) or delist request by mailRemoval requests are quickly and manually reviewed and processed without fees.NoNo
Excello s.r.o. Virusfree BIP bip.virusfree.czBotnet IP list. Single IPv4 addresses produced from spam, pure bots. No mail server addresses.Automatic listingAutomatic delistingIncluded in RSPAMD NoNo
Virusfree BAD bad.virusfree.czBAD senders list. Single IPv4 addresses with high spam rate. Mostly botnets and large spammers. Also, mail servers which send malware are listed.Automatic listingAutomatic delistingNoNo

Notes

"Collateral listings"—Deliberately listing non-offending IP addresses, in order to coerce ISPs to take action against spammers under their control.

"Notifies upon listing"—Warns registrants of listed IP addresses or domains (so registrants can take actions to fix problems).

Suspect RBL providers

Suspect RBL providers are those who employ well-documented patterns [3] of questionable or reckless practices [4] or have questionable actors based on statements or communications from the RBL's principal management to official forums. [5] These practices usually include acceptance of de-listing payments (also known as ransom payments) - which incentivizes fraud - such as is the case with UCEPROTECT/Whitelisted.org. [6] Often, these RBL providers use circular rhetoric such as "only spammers would claim we are illegitimate" in furtherance of their scheme. These RBL providers have shown clear or lengthy patterns of misconduct or unstable behavior in public forums or operations or both. [3] [5] It is recommended that ISPs carefully consider these RBL providers before incorporating them into spam blocking regimens. These RBL providers have demonstrated the potential and willingness to adversely affect vast swaths of internet communications for misguided, reckless or likely fraudulent purposes. Using these RBL providers will likely result in clogging up ISP support channels while negatively affecting legitimate business customers.

Blacklist operatorQuestionable OperationsDNS blacklistZoneListing goalNominationListing lifetimeNotesCollateral listingsNotifies upon listing
UCEPROTECT-NetworkAccepts monetary fees to de-list which incentivizes fraud or abuse; [4] principal management engages in questionable behavior in official communications [5] UCEPROTECT Level 1 dnsbl-1.uceprotect.net
(also free available via rsync [7] )
Single IP addresses that send mail to spamtraps.

Or anything that could have attacked them, even if not related to email.

Automatic by a cluster of more than 60 trapservers [8] Automatic expiration 7 days after the last abuse was seen, optionally express delisting for a small fee.UCEPROTECT's primary and the only independent listNoNo
UCEPROTECT Level 2 dnsbl-2.uceprotect.net
(also free available via rsync [7] )
Allocations with exceeded UCEPROTECT Level 1 listingsAutomatic calculated from UCEPROTECT-Level 1Automatic removal as soon as Level 1 listings decrease below Level 2 listing border, optionally express delisting (for a fee)Fully depending on Level 1YesNo
UCEPROTECT Level 3 dnsbl-3.uceprotect.net
(also free available via rsync [7] )
ASN's with excessive UCEPROTECT Level 1 listingsAutomatic calculated from UCEPROTECT-Level 1Automatic removal as soon as Level 1 listings decrease below Level 3 listing border, optionally express delisting (fee)Fully depending on Level 1YesNo
SPFBL.netOffers paid delisting [9] which violates Section 2.2.5 Conflict of Interest, RFC 6471 [10] RBL dnsbl.spfbl.netBad reputation, difficult to identify the responsible, dynamic addresses, SLAAC flag without genuine mail service and inappropriate use of the URLProvides a list of IPv4/IPv6 addresses and domains which are sending spam or phishing.Until delisting requested or seven days with good reputationThe feedback system runs at SMTP layer. See Feedback YesYes


Related Research Articles

The Domain Name System (DNS) is a hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol (IP) networks. It associates various information with domain names assigned to each of the associated entities. Most prominently, it translates readily memorized domain names to the numerical IP addresses needed for locating and identifying computer services and devices with the underlying network protocols. The Domain Name System has been an essential component of the functionality of the Internet since 1985.

<span class="mw-page-title-main">Open mail relay</span>

An open mail relay is a Simple Mail Transfer Protocol (SMTP) server configured in such a way that it allows anyone on the Internet to send e-mail through it, not just mail destined to or originating from known users. This used to be the default configuration in many mail servers; indeed, it was the way the Internet was initially set up, but open mail relays have become unpopular because of their exploitation by spammers and worms. Many relays were closed, or were placed on blacklists by other servers.

A Domain Name System blocklist, Domain Name System-based blackhole list, Domain Name System blacklist (DNSBL) or real-time blackhole list (RBL) is a service for operation of mail servers to perform a check via a Domain Name System (DNS) query whether a sending host's IP address is blacklisted for email spam. Most mail server software can be configured to check such lists, typically rejecting or flagging messages from such sites.

A whitelist or allowlist is a list or register of entities that are being provided a particular privilege, service, mobility, access or recognition. Entities on the list will be accepted, approved and/or recognized. Whitelisting is the reverse of blacklisting, the practice of identifying entities that are denied, unrecognised, or ostracised.

Telephone number mapping is a system of unifying the international telephone number system of the public switched telephone network with the Internet addressing and identification name spaces. Internationally, telephone numbers are systematically organized by the E.164 standard, while the Internet uses the Domain Name System (DNS) for linking domain names to IP addresses and other resource information. Telephone number mapping systems provide facilities to determine applicable Internet communications servers responsible for servicing a given telephone number using DNS queries.

Various anti-spam techniques are used to prevent email spam.

<span class="mw-page-title-main">Email spam</span> Unsolicited electronic advertising by email

Email spam, also referred to as junk email, spam mail, or simply spam, is unsolicited messages sent in bulk by email (spamming). The name comes from a Monty Python sketch in which the name of the canned pork product Spam is ubiquitous, unavoidable, and repetitive. Email spam has steadily grown since the early 1990s, and by 2014 was estimated to account for around 90% of total email traffic.

The Distributed Sender Blackhole List was a Domain Name System-based Blackhole List that listed IP addresses of insecure e-mail hosts. DSBL could be used by server administrators to tag or block e-mail messages that came from insecure servers, which is often spam.

<span class="mw-page-title-main">The Spamhaus Project</span> Organization targetting email spammers

The Spamhaus Project is an international organisation based in the Principality of Andorra, founded in 1998 by Steve Linford to track email spammers and spam-related activity. The name spamhaus, a pseudo-German expression, was coined by Linford to refer to an internet service provider, or other firm, which spams or knowingly provides service to spammers.

Email authentication, or validation, is a collection of techniques aimed at providing verifiable information about the origin of email messages by validating the domain ownership of any message transfer agents (MTA) who participated in transferring and possibly modifying a message.

SpamCop is an email spam reporting service, allowing recipients of unsolicited bulk or commercial email to report IP addresses found by SpamCop's analysis to be senders of the spam to the abuse reporting addresses of those IP addresses. SpamCop uses these reports to compile a list of computers sending spam called the "SpamCop Blocking List" or "SpamCop Blacklist" (SCBL).

SORBS is a list of e-mail servers suspected of sending or relaying spam. It has been augmented with complementary lists that include various other classes of hosts, allowing for customized email rejection by its users.

A smart host or smarthost is an email server via which third parties can send emails and have them forwarded on to the email recipients' email servers.

WHOIS is a query and response protocol that is used for querying databases that store an Internet resource's registered users or assignees. These resources include domain names, IP address blocks and autonomous systems, but it is also used for a wider range of other information. The protocol stores and delivers database content in a human-readable format. The current iteration of the WHOIS protocol was drafted by the Internet Society, and is documented in RFC 3912.

<span class="mw-page-title-main">Bill Woodcock</span> Internet infrastructure pioneer

Bill Woodcock is the executive director of Packet Clearing House, the international organization responsible for providing operational support and security to critical Internet infrastructure, including Internet exchange points and the core of the domain name system; the chairman of the Foundation Council of Quad9; the president of WoodyNet; and the CEO of EcoTruc and EcoRace, companies developing electric vehicle technology for work and motorsport. Bill founded one of the earliest Internet service providers, and is best known for his 1989 development of the anycast routing technique that is now ubiquitous in Internet content distribution networks and the domain name system.

A challenge–response system is a type of that automatically sends a reply with a challenge to the (alleged) sender of an incoming e-mail. It was originally designed in 1997 by Stan Weatherby, and was called Email Verification. In this reply, the purported sender is asked to perform some action to assure delivery of the original message, which would otherwise not be delivered. The action to perform typically takes relatively little effort to do once, but great effort to perform in large numbers. This effectively filters out spammers. Challenge–response systems only need to send challenges to unknown senders. Senders that have previously performed the challenging action, or who have previously been sent e-mail(s) to, would be automatically

In networking, a black hole refers to a place in the network where incoming or outgoing traffic is silently discarded, without informing the source that the data did not reach its intended recipient.

SURBL is a collection of URI DNSBL lists of Uniform Resource Identifier (URI) hosts, typically web site domains, that appear in unsolicited messages. SURBL can be used to search incoming e-mail message bodies for spam payload links to help evaluate whether the messages are unsolicited. For example, if http://www.example.com is listed, then e-mail messages with a message body containing this URI may be classified as unsolicited. URI DNSBLs differ from prior DNSBLs, which commonly list mail sending IP addresses. SURBL is a specific instance of the general URI DNSBL list type.

Not Just Another Bogus List (NJABL) was a DNS blacklist.

The Mail Abuse Prevention System (MAPS) is an organization that provides anti-spam support by maintaining a DNSBL. They provide five black lists, categorising why an address or an IP block is listed:

References

  1. "armresearch.com". armresearch.com. Retrieved 2012-05-06.
  2. "sorbs.net". sorbs.net. Retrieved 2012-05-06.
  3. 1 2 GitHub. "About removing UceProtect". github.com. Retrieved 2021-04-02.
  4. 1 2 Security Boulevard. "UCEPROTECT: When RBLs Go Bad". securityboulevard.com. Archived from the original on 21 April 2021. Retrieved 2021-04-02.
  5. 1 2 3 IETF. "IETF Mail Archive: [Asrg] Final statement". mailarchive.ietf.org. Retrieved 2021-04-02.
  6. whitelisted.org. "UceProtect Ransom Payment Collection Arm". www.whitelisted.org. Retrieved 2021-04-03.
  7. 1 2 3 UCEPROTECT. "UCEPROTECT-Network - Germanys first Spam protection database". Uceprotect.net. Retrieved 2012-05-06.
  8. Simpson, Ken. "Getting Onto a Blacklist Without Sending Any Spam". MailChannels Anti-Spam Blog. MailChannels Corporation. Archived from the original on 19 September 2011. Retrieved 16 September 2011.
  9. spfbl.net. "Query and delist - Rules for paid delist". spfbl.net. Retrieved 2023-08-25.
  10. C. Lewis and M. Sergeant (January 2012). "Overview of Best Email DNS-Based List (DNSBL) Operational Practices - 2.2.5. Conflict of Interest". IETF. Retrieved 2023-08-25.