Have you been blocked?
All blocklists are researched and managed by The Spamhaus Project.
Simply click on the link below, which will take you to the Project’s IP and Domain Reputation Checker. From here you will be able to enter your IP or Domain and begin your request for removal.
Please note that the Project’s IP and Domain Reputation Checker is the only place where removals are handled.
IT and security teams consistently face multiple business challenges. Discover how our solutions can help overcome some of those issues.
From processing issues, to email-borne threats our blocklists easily integrate with your current email set-up to improve anti-spam & anti-virus email filtering.
Employ our threat intelligence to increase visibility across security events, reveal potential weaknesses in your network, and threats to your brand.
Stay on top of the latest threats and proactively combat botnet infections, and other forms of abuse, with our solutions.
From clicking on phishing emails to visiting malware dropper sites, our threat intelligence provides automatic protection for your users.
Data for Integration
Enhance your service and create competitive advantage by integrating Spamhaus’ world-class IP and domain reputation data.
Our products provide additional layers of security for networks and email. They also present security teams with additional insight into malicious behavior.
Border Gateway Protocol (BGP) Firewall
Block the worst of the worst at your network edge, taking advantage of your existing BGP-capable routers. Configuration only takes minutes.
Data Query Service (DQS)
Benefit from industry-leading real time blocklists. These DNSBLs easily plug into your existing email infrastructure to block spam and other email threats.
A powerful research tool to investigate relationships between internet infrastructures. Quickly pivot to new areas of concern to rapidly investigate potential threats.
Immediately block connections to dangerous sites, including phishing and malware dropper websites. A ‘set and forget’ solution.
Spamhaus Intelligence API
Threat intelligence data in API format to enable users to easily integrate metadata relating to threats with their own applications, programs, and products.
abuse.ch Real Time Feeds - coming soon
Actionable data signals on cyber threats, with a focus on malware and botnets, to strengthen threat investigations, detections, and help prevent data breaches.
Integration | MDaemon
Block over 99% of email-borne threats with Spamhaus’ real time DNS blocklists and MDaemon® Email Server.
Integration | Halon
Safeguard your email stream using Spamhaus’ real time DNS blocklists and Halon’s secure email infrastructure.
Integration | Messageware
Enhance Microsoft Exchange protection by blocking malicious IP addresses from connecting to your on-premise server in real time.
A wide range of datasets, providing multiple layers of protection. They can be plugged directly into your existing hardware, making them an affordable choice.
Exploits Dataset Statistics
View the geolocation, hosting network, malware names associated with each detection, and other critical data points.
Border Gateway Protocol (BGP) Feeds
Do Not Route Or Peer (DROP) and Botnet Controller List (BCL) datafeeds can peer with your existing BGP-capable router.
Domain (DBL), Zero Reputation (ZRD) and Hash blocklists (HBL) enable you to block content in emails, filtering out a higher rate of email-borne threats.
Data for Investigation
Passive DNS and extended datasets give you additional information on internet resources. They provide deeper insights into incidents and possible threats.
DNS Firewall Threat Feeds
A wide range of feeds to apply to your DNS recursive server. Choose the right level of protection for your organization.
Spam (SBL), Policy (PBL), Exploits (XBL) and Auth (AuthBL) blocklists allow you to filter email from IPs associated with spam, botnets, and other threats.
abuse.ch Threat Intelligence Feeds – coming soon
URLhaus, MalwareBazaar, ThreatFox, YARAify, Feodo Tracker and Sandnet enrich CTI feeds and support vulnerability mangement.
Find out more about us.
Learn more about Spamhaus; who we are, and what we do.
Find a partner
Discover our partners and how they can support you.
Become a partner
Learn about the benefits of being a Spamhaus partner and how to get started.
Discover a wide range of blog posts, case studies and reports.
Spamhaus’ insight into malware, botnet C&Cs, and the domain reputation landscape.
Commonly asked questions about Spamhaus products and processes.
The Blocklist Tester
A tool to help you check if your servers are correctly configured to use Spamhaus DNSBLs.
The Reputation Portal
A tool for ASN owners to get visibility of their IPs’ reputation and proactively manage listings.
Help for the Project's legacy DNSBLs users
Using the Project’s legacy blocklists and suddenly experiencing email issues? This page may be able to help.
In depth information about the technical details and implementation of our products.
Posted by The Spamhaus Team on 27 Jul 2022
In this second blog post with the deliverability experts from Emarsys, Twilio, and Validity, we share the Email Software Provider’s (ESP) perspective on the risks and opportunities associated with changing provider. Hint: reputation is not transferable. When moving to a new ESP, you must start from scratch, methodically illustrating that you’re a legitimate sender. It’s a big move that should be considered carefully.
Between Kate, Kiersti, and Steve, there is approximately 50 years of deliverability experience. Safe to say, we’re in knowledgeable hands! They’re contributing to our Deliverability 101 series to help senders know, understand, and adopt best practices – if you’d like to find out more about our contributors read more in our previous blog post.
There are two legitimate reasons in the eyes of our experts. The most common is senders who’ve outgrown their ESP and require a more complex product. That could be a product that supports a marketing automation function instead of a batch and blast approach. “Maturing an email program in this way is encouraged,” shares Kiersti.
Equally, ESPs all manage their networks differently. If a sender is using a provider, who does not meet their requirements for compliance practices, responsible IP pooling, or lack of strong problem identification and resolution-handling identification and resolution, finding a new ESP would be a sound choice.
That said, if deliverability is the reason for considering a change, the experts would fervently encourage you to rethink. Changing ESP will not fix deliverability; the sender holds the ace card here (more on this in our previous blog post). So changing ESP will only prolong the issue, with a lot of hard work in between. Instead, you should rethink your sending practices. Discover sending fundamentals here.
When you start with a new provider, you need to build your reputation from scratch. Reputation can’t be transferred. Much like in real life, you need to build your email reputation over time.
Steve explains: “When a sender changes platform, they send emails from a new IP range and a new from address. The emails may look the same on the face of it, but they have a different template and structure underneath the hood. How can an email filter decide if this is genuine or attempted abuse?”
You need to mitigate this challenge and enable filters to differentiate you quickly and easily from a malicious sender pretending to be you. How?
“Ensure your sender domain and IP are correctly authenticated and configured,” shares Steve. Set up and test your DNS records, including Reverse DNS, SPF, DKIM, and DMARC. Without this, there is no way for an email receiver to verify that an email’s sender is who they say they are – you can read more on this here.
Warm-up your IPs and domains by introducing low volume, controlled sends over time. “Start by sending small, routine amounts of emails to your most engaged subscribers. Gradually increase these numbers until you’re sending to the full list” notes Kate. “Using best data and a good email campaign to generate positive email engagement proves to the filters that you are to be trusted” adds Steve.
There’s a good reason for email filters being suspicious of new senders – “Email activity on new IPs is often related to bad actors sending spam or fraud, so a new sender needs to methodically illustrate they are not a bad actor” observes Kiersti.
A piece of parting advice on this topic from Kate – “Remember: Growing your email program is a marathon—not a sprint. The warmup is key.”
Sounds obvious, but after the first few emails, don’t try to skip ahead – “build volume consistently; avoid spikes or sudden changes” states Steve. If your first sends achieve good deliverability, that means the plan is working, but not to the extent you can start running your email programs as you did before. Spikey email traffic looks like a spam campaign and may result in your emails getting blocked. Grow gradually and be consistent.
But before anything, really consider your motivation for moving. If deliverability is your primary driver, first review your practices around address acquisition, database maintenance, email frequency, and content. For more tips to improve your sending practices, take a look at this eBook. Or, next up you can read the ESP’s final blog with their 5 top tips for senders to achieve email deliverability.
27 July 2022
Email senders - take note: in this blog, the deliverability experts from Emarsys, Twilio, and Validity share their top 5 tips for you to achieve consistent email deliverability. You're welcome!
As part of our Deliverability 101 series, we're inviting experts from across the email-sending community to share their pearls of wisdom. For this blog post, we get the insight from Emarsys, Twilio, and Validity on who holds responsibility for deliverability.
12 July 2022
Email authentication has always had its challenges but with the advent of BIMI, users and brands alike will be better protected when engaging with email. Fredrik Poller from Halon brings you up-to-speed on the latest authentication method.