Have you been blocked?
All blocklists are researched and managed by The Spamhaus Project.
Simply click on the link below, which will take you to the Project’s Blocklist Removal Center. From here you will be able to enter your IP or Domain and begin your request for removal.
Please note that the Project’s Blocklist Removal Center is the only place where removals are handled.
IT and security teams consistently face multiple business challenges. Discover how our solutions can help overcome some of those issues.
From processing issues, to email-borne threats our blocklists easily integrate with your current email set-up to improve anti-spam & anti-virus email filtering.
Employ our threat intelligence to increase visibility across security events, reveal potential weaknesses in your network, and threats to your brand.
Stay on top of the latest threats and proactively combat botnet infections, and other forms of abuse, with our solutions.
From clicking on phishing emails to visiting malware dropper sites, our threat intelligence provides automatic protection for your users.
Our products provide additional layers of security for networks and email. They also present security teams with additional insight into malicious behavior.
Border Gateway Protocol (BGP)
Block the worst of the worst at your network edge, taking advantage of your existing BGP-capable routers. Configuration only takes minutes.
Data Query Service (DQS)
Benefit from industry-leading real time blocklists. These DNSBLs easily plug into your existing email infrastructure to block spam and other email threats.
A powerful research tool to investigate relationships between internet infrastructures. Quickly pivot to new areas of concern to rapidly investigate potential threats.
Immediately block connections to dangerous sites, including phishing and malware dropper websites. A ‘set and forget’ solution.
A wide range of datasets, providing multiple layers of protection. They can be plugged directly into your existing hardware, making them an affordable choice.
Border Gateway Protocol (BGP) Feeds
Do Not Route Or Peer (DROP) and Botnet Controller List (BCL) datafeeds can peer with your existing BGP-capable router.
Domain (DBL), Zero Reputation (ZRD) and Hash blocklists (HBL) enable you to block content in emails, filtering out a higher rate of email-borne threats.
Data for Investigation
Passive DNS and extended datasets give you additional information on internet resources. They provide deeper insights into incidents and possible threats.
DNS Firewall Threat Feeds
A wide range of feeds to apply to your DNS recursive server. Choose the right level of protection for your organization.
Spam (SBL), Policy (PBL), Exploits (XBL) and Auth (AuthBL) blocklists allow you to filter email from IPs associated with spam, botnets, and other threats.
Find out more about us.
Learn more about Spamhaus; who we are, and what we do.
Find out who we work with and how you can become a Spamhaus Partner.
Discover a wide range of blog posts, case studies and reports.
Commonly asked questions about Spamhaus products and processes.
In depth information about the technical details and implementation of our products.
Real time blocklists (DNSBLs) that easily integrate into existing email infrastructure, protecting it from email-borne threats.
The Spamhaus Data Query Service (DQS) blocks up to 99% of malicious emails and utilizes industry-leading threat intelligence data.
Our real time DNSBLs protect over 3 billion mailboxes globally. Integrate them into your email infrastructure as part of a cost-effective solution for spam prevention. Save time, effort, and focus resources elsewhere.
The Spamhaus Data Query Service (DQS) is composed of continuously updated IP, Domain & Hash domain name system blocklists (DNSBLs).
Spamhaus blocklists protect against the vast bulk of spam and other email-borne threats at the SMTP gateway.
The outcome is a significant reduction in the time and cost of processing unsolicited and malicious email traffic.
These real time DNSBLs can be used with open-source tools like SpamAssassin and Rspamd, or integrated with your existing anti-spam platforms. This keeps costs to a minimum, with no additional hardware required.
Full set up details for DQS are on our documentation page.
Email administrators and email engineers running their own mail transfer agent or email infrastructure.
You may qualify for a non-commercial account, which is free of charge. See if you meet the usage criteria for a free account.
Incoming email sent from a blacklisted IP address can be dropped at SMTP connect, saving storage and processing costs. You have the choice to block, accept, or quarantine messages according to your company policy.
When an email is blocked, the sender will immediately receive a notification, ensuring that emails do not lie unread in junk folders for weeks.
Following IP filtering, emails can be filtered by content utilizing our Domain Blocklist (DBL), Zero Reputation Domain Blocklist (ZRD) and Hash Blocklist (HBL). This staged email filtering process is considered best practice:
User and query volume based, with prices starting as low as $250 USD per annum.
Constantly updated content-based lists including the Domain and Hash blocklists. These use multiple sources to define whether the entity is involved in malicious activity, or whether it is hosting or sending harmful content.
IP addresses that have been observed to be involved in sending or hosting spam, including hijacked servers and computers infected with botnet malware. These are the longest established blocklists in the industry.
Get a FREE 30 day trial of our blocklists. No credit card details required.
29 September 2020
Spamhaus produces many different DNSBLs (blocklists). The question is which ones to apply where? This simple guide provides you with all the information you need.
Grasp the specifics relating to email source code, so you can apply IP and domain threat intelligence to the right place in your email filtering process.
30 July 2020
Botnet operators certainly were busy during in lock-down. It's unfortunate to report a 29% increase quarter on quarter of newly observed botnet Command and Controllers (C&Cs) after last month's reduction.