Best State of Art IT Security Solutions
The best Innovative and powerful IT Security products

Resources /

Best Anti Spam RBL Black Lists

Here you can find a list of popular RBL Real-time Blackhole List Anti Spam Black List Sites. 

It is recommended to use RBL sites in your Anti Spam filter for the best blocking of Spam senders.

You can use a few of them at least 2-3. If using too many it can slow down your site and catch real mail as spam.

In Protector UTM Firewall you can easily choose Low, Medium or High level of RBL lists that have already been preconfigured.

This way you don't have to make the choise yourself. 

Utm firewall Appliance 

RBL Lists

 

Low

Medium

High

DNSBL

Notice

abuse.rfc-ignorant.org.

 

 

 

RHSBL List

Domains without a working abuse mailbox

badconf.rhsbl.sorbs.net.

 

 

 

RHSBL List

A or MX records point to bad address space

bl.spamcop.net.

 

 

X

User Submission DNSBL

RBL SCBL aims to block spam with minimal blocking or misidentification of wanted email.

bogusmx.rfc-ignorant.org.

 

 

 

RHSBL List

Domains without working mail exchanger records

cbl.abuseat.org.

 

 

X

Open Proxy DNSB

Data is used by XBL, so don't use both.

dialups.mail-abuse.org.

 

 

 

Dialup or Dynamic IP DNSBL

 

dnsbl.sorbs.net.

 

 

 

Major Spam Source DNSBL

 

dsn.rfc-ignorant.org.

 

 

 

RHSBL List

Domains refusing any mail from “<>”

dul.dnsbl.sorbs.net.

 

 

 

Dialup or Dynamic IP DNSBL

Dynamic User/Host List Database (DUHL)

http.dnsbl.sorbs.net.

 

 

 

Open Proxy DNSBL

Open Proxy Servers

ipwhois.rfc-ignorant.org.

 

 

 

RBL with Hosts don follow RFC rules

RBL contain domains or IP networks whose administrators choose not to obey the RFCs,

misc.dnsbl.sorbs.net.

 

 

 

Open Proxy DNSBL

 

nomail.rhsbl.sorbs.net.

 

 

 

RHSBL List

Domain owners say no mail ever sent with these domains

postmaster.rfc-ignorant.org.

 

 

 

RHSBL List

Domains without a working postmaster mailbox

rhsbl.sorbs.net.

 

 

 

au.sorbs.net

Aggregate zone (contains all RHS zones)

sbl-xbl.spamhaus.org.

 

 

X

Major Spam Source DNSBL

Spamhaus Block List

sbl.spamhaus.org.

 

 

 

Major Spam Source DNSBL

Spamhaus Block List

pbl.spamhaus.org.

 

X

X

Dialup or Dynamic IP DNSBL

Spamhaus Policy Block List

smtp.dnsbl.sorbs.net.

 

 

 

Open Relay DNSBL

List of Open SMTP relay servers.

socks.dnsbl.sorbs.net.

 

 

 

Open Proxy DNSBL

List of Open SOCKS Proxy Servers.

spam.dnsbl.sorbs.net.

 

 

 

Anti Spam DNSBL

Targets that are listed to sent  spam/UCE/UBE to the admins of SORBS at any time

web.dnsbl.sorbs.net.

 

 

 

Open Formmail DNSBL

List of web (WWW) servers which have spammer or abusable vulnerabilities (e.g. FormMail scripts)

whois.rfc-ignorant.org.

 

 

 

RHSBL List

Domains without “correct” whois

xbl.spamhaus.org.

 

 

 

Open Proxy DNSBL

Exploits Block List - illegal 3rd party exploits.Incorporates CBL data and OPM data.

zombie.dnsbl.sorbs.net.

 

 

 

Bogon, Hijacked & Zombie Network DNSBL

List of networks hijacked from their original owners

zen.spamhaus.org.

X

X

X

Major Spam Source DNSBL

Spamhaus Block List - the SBL, XBL and PBL in combination

psbl.surriel.com

 

X

X

Spamtrap Driven or Automated DNSBL

Passive Spam Block List

ix.dnsbl.manitu.net

 

 

 

Spamtrap Driven or Automated DNSBL

automatically generated entries

ips.backscatterer.org

 

 

 

Behaviour Driven DNSBL

Backscatter and Sender Callout abusers

dnsbl-1.uceprotect.net (For Level 1)

 

 

x

Spamtrap Driven or Automated DNSBL

Level 1 lists single IP's only.

dnsbl-2.uceprotect.net (For Level 2)

 

 

 

Spamtrap Driven or Automated DNSBL

Strict Level 2 escalates within allocation

dnsbl-3.uceprotect.net (For Level 3)

 

 

 

Spamtrap Driven or Automated DNSBL

 

➤ Related pages
Alfa AWUS051nh Information
Alfa AWUS052nh Information
All about Cloud Security
Anti Spam Black Lists
Breaking Authentication Schemes
Cloud Internet Security
Distributed Denial of Service
Free Top 15 WiFi Security Tips Videos
Honeypot
How does SEO hacking occur?
IT Security Resources Part 5
IT Security Resources Part3
IT Security Resources Part4
IT Security Technical Part2
Security Scanner
Stealthy DDoS
The Facts about Cloud Computing
Virtual Machine
Virus Spam Bounce Ruleset
Vulnerability Assessment Guide
What is SSH?

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef