Have you been blocked?
All blocklists are researched and managed by The Spamhaus Project.
Simply click on the link below, which will take you to the Project’s IP and Domain Reputation Checker. From here you will be able to enter your IP or Domain and begin your request for removal.
Please note that the Project’s IP and Domain Reputation Checker is the only place where removals are handled.
IT and security teams consistently face multiple business challenges. Discover how our solutions can help overcome some of those issues.
From processing issues, to email-borne threats our blocklists easily integrate with your current email set-up to improve anti-spam & anti-virus email filtering.
Employ our threat intelligence to increase visibility across security events, reveal potential weaknesses in your network, and threats to your brand.
Stay on top of the latest threats and proactively combat botnet infections, and other forms of abuse, with our solutions.
From clicking on phishing emails to visiting malware dropper sites, our threat intelligence provides automatic protection for your users.
Data for Integration
Enhance your service and create competitive advantage by integrating Spamhaus’ world-class IP and domain reputation data.
Our products provide additional layers of security for networks and email. They also present security teams with additional insight into malicious behavior.
Border Gateway Protocol (BGP) Firewall
Block the worst of the worst at your network edge, taking advantage of your existing BGP-capable routers. Configuration only takes minutes.
Data Query Service (DQS)
Benefit from industry-leading real time blocklists. These DNSBLs easily plug into your existing email infrastructure to block spam and other email threats.
A powerful research tool to investigate relationships between internet infrastructures. Quickly pivot to new areas of concern to rapidly investigate potential threats.
Immediately block connections to dangerous sites, including phishing and malware dropper websites. A ‘set and forget’ solution.
Spamhaus Intelligence API
Threat intelligence data in API format to enable users to easily integrate metadata relating to threats with their own applications, programs, and products.
A wide range of datasets, providing multiple layers of protection. They can be plugged directly into your existing hardware, making them an affordable choice.
Border Gateway Protocol (BGP) Feeds
Do Not Route Or Peer (DROP) and Botnet Controller List (BCL) datafeeds can peer with your existing BGP-capable router.
Domain (DBL), Zero Reputation (ZRD) and Hash blocklists (HBL) enable you to block content in emails, filtering out a higher rate of email-borne threats.
Data for Investigation
Passive DNS and extended datasets give you additional information on internet resources. They provide deeper insights into incidents and possible threats.
DNS Firewall Threat Feeds
A wide range of feeds to apply to your DNS recursive server. Choose the right level of protection for your organization.
Spam (SBL), Policy (PBL), Exploits (XBL) and Auth (AuthBL) blocklists allow you to filter email from IPs associated with spam, botnets, and other threats.
Find out more about us.
Learn more about Spamhaus; who we are, and what we do.
Find a parter
Discover our partners and how they can support you.
Become a partner
Learn about the benefits of being a Spamhaus partner and how to get started.
Discover a wide range of blog posts, case studies and reports.
Spamhaus’ insight into malware, botnet C&Cs, and the domain reputation landscape.
Commonly asked questions about Spamhaus products and processes.
The Blocklist Tester
A tool to help you check if your servers are correctly configured to use Spamhaus DNSBLs.
The Reputation Portal
A tool for ASN owners to get visibility of their IPs’ reputation and proactively manage listings.
Help for the Project's legacy DNSBLs users
Using the Project’s legacy blocklists and suddenly experiencing email issues? This page may be able to help.
In depth information about the technical details and implementation of our products.
Posted by on 12 May 2022
Every day, Constant Contact’s platform sends over 250 million emails. With that, they take on an unenviable responsibility: to not only safeguard against malicious email going out, but also to protect their shared IP space. With Spamhaus’ data, Constant Contact has achieved this AND enhanced their customer service in a truly meaningful way. Read on to find out how.
Constant Contact has created a digital marketing platform to meet the needs of small businesses and non-profits worldwide. These are the kind of businesses who typically do not have a marketing or IT department to advise them. Businesses who are likely unfamiliar with constantly changing best practices and legislation changes.
Constant Contact is their go-to marketing buddy. The do-it-yourself platform helps them keep track of their customers, manage social channels and send relevant emails that land in their recipient’s mailbox.
Constant Contact operates using a shared IP environment, meaning all customers share the same sending servers. This is the most affordable and logical solution for low volume marketers.
While shared IP space keeps costs to a minimum, it takes some careful management; if one customer makes some poor sending decisions, they could damage this shared IP reputation for all. And if IP reputation is damaged, it can affect not only how a message lands in the recipient’s inbox but also if it lands at all. Additionally, bad sending practices can result in an IP listing from a reputation provider, like Spamhaus, which can ultimately lead to all email being blocked for all customers on that IP space.
Needless to say, it is mandatory that Constant Contact’s IP space maintains the highest standards. Keeping the amount of “bad” email sent from their IPs to a minimum is critical.
One technique Constant Contact explored was URL scanning via an anti-virus solution. By putting this solution in front of their outbound email product, they could prevent bad URLs from being sent via email and minimize the risk of emails getting blocked – thus preventing their joint IP space becoming tarnished.
The theory makes sense, but upon implementation, the team found this solution to be both resource intensive and costly, so turned to an alternative approach.
Before using Spamhaus’ Domain Blocklist (DBL), Constant Contact would find in their email logs something to the effect of “this message was blocked because it contained a URL that was listed on DBL”.
Logically, the team thought: “Why would we even send this message in the first place? If the email contains a domain that’s listed, it should be blocked before it’s sent.” With that, Constant Contact began using Spamhaus’ data to check for listings before emails had a chance to get blocked externally.
Initially, they used other data providers too, but again, this was an expensive solution and exceeded their budget, particularly when the team were getting more and more accurate hits with the DBL than from any other provider. This quality meant the team could drop the additional data with negligible impact. Constant Contact now only uses Spamhaus for their domain lookups.
“The fact Spamhaus can find a malicious domain before it hurts our customer’s reputation, or even our own reputation, is invaluable”, shared Jon Marburger, Director of Email Deliverability, Constant Contact.
Quite simply really. When one of Constant Contact’s customers attempts to send a campaign containing a URL listed on the Spamhaus DBL, the system is configured to block the email while their Compliance team investigates. Often, the sender (their customer) isn’t being intentionally malicious, simply naive, and this amounts to a positive experience for them. For a little more detail…
Typically, Constant Contact encounters 3 ‘types’ of customers being flagged by DBL:
1) Those unknowingly sending bad external links;
2) Those whose own sites are unknowingly listed;
3) Bad actors and scammers.
The first two cases enable Constant Contact to add a lot of value to the service they’re providing; from advising on how to spot malicious sites to making customers aware their site is hacked and how to avoid this in future. Meanwhile, the latter group can rapidly be shut down.
Without the DBL, these opportunities wouldn’t exist. “There are a lot of blocklists out there but the only one that’s ever been super trustworthy, in terms of only listing the real bad guys, has been Spamhaus. So it’s been nice to know that when we get something, we can trust that it’s more than likely bad”, explained Tara Natanson, Manager of ISP Relations, Constant Contact.
Constant Contact takes their role in the digital space seriously. Now that they’ve started exploring the reputation data pool, they’re looking into how they can further enhance their solution with other datasets.
Jon explained, “It’s both facets of being a good platform and being a good steward in the email space – making sure we’re protecting the recipients whose details are housed in our platform from not only spam but malicious content.” Constant Contact is next looking to make use of the Hash Blocklist data, so watch this space for an update.
Spamhaus’ Data Query Service (DQS) is an affordable and effective solution to protect your email infrastructure and users.
Using your existing email protection solution, you will be able to block spam and other related threats including malware, ransomware, and phishing emails.
The service has never failed and utilizes the longest established DNSBLs in the industry.
20 October 2022
We bear good news regarding domain name abuse: almost all numbers are down compared to last quarter! See the Q3 trends and find the insight into some of the tactics used by bad actors and advice to circumvent falling victim.
27 July 2022
Email senders - take note: in this blog, the deliverability experts from Emarsys, Twilio, and Validity share their top 5 tips for you to achieve consistent email deliverability. You're welcome!
Deliverability experts from Emarsys, Twilio and Validity share their insight into the opportunities and challenges senders should consider when changing email provider. Hint - you need to build your reputation from scratch, so how can an email filter decide if your email is genuine or attempted abuse?