Have you been blocked?
All blocklists are researched and managed by The Spamhaus Project.
Simply click on the link below, which will take you to the Project’s IP and Domain Reputation Checker. From here you will be able to enter your IP or Domain and begin your request for removal.
Please note that the Project’s IP and Domain Reputation Checker is the only place where removals are handled.
IT and security teams consistently face multiple business challenges. Discover how our solutions can help overcome some of those issues.
From processing issues, to email-borne threats our blocklists easily integrate with your current email set-up to improve anti-spam & anti-virus email filtering.
Employ our threat intelligence to increase visibility across security events, reveal potential weaknesses in your network, and threats to your brand.
Stay on top of the latest threats and proactively combat botnet infections, and other forms of abuse, with our solutions.
From clicking on phishing emails to visiting malware dropper sites, our threat intelligence provides automatic protection for your users.
Data for Integration
Enhance your service and create competitive advantage by integrating Spamhaus’ world-class IP and domain reputation data.
Our products provide additional layers of security for networks and email. They also present security teams with additional insight into malicious behavior.
Border Gateway Protocol (BGP) Firewall
Block the worst of the worst at your network edge, taking advantage of your existing BGP-capable routers. Configuration only takes minutes.
Data Query Service (DQS)
Benefit from industry-leading real time blocklists. These DNSBLs easily plug into your existing email infrastructure to block spam and other email threats.
A powerful research tool to investigate relationships between internet infrastructures. Quickly pivot to new areas of concern to rapidly investigate potential threats.
Immediately block connections to dangerous sites, including phishing and malware dropper websites. A ‘set and forget’ solution.
Spamhaus Intelligence API
Threat intelligence data in API format to enable users to easily integrate metadata relating to threats with their own applications, programs, and products.
A wide range of datasets, providing multiple layers of protection. They can be plugged directly into your existing hardware, making them an affordable choice.
Border Gateway Protocol (BGP) Feeds
Do Not Route Or Peer (DROP) and Botnet Controller List (BCL) datafeeds can peer with your existing BGP-capable router.
Domain (DBL), Zero Reputation (ZRD) and Hash blocklists (HBL) enable you to block content in emails, filtering out a higher rate of email-borne threats.
Data for Investigation
Passive DNS and extended datasets give you additional information on internet resources. They provide deeper insights into incidents and possible threats.
DNS Firewall Threat Feeds
A wide range of feeds to apply to your DNS recursive server. Choose the right level of protection for your organization.
Spam (SBL), Policy (PBL), Exploits (XBL) and Auth (AuthBL) blocklists allow you to filter email from IPs associated with spam, botnets, and other threats.
Find out more about us.
Learn more about Spamhaus; who we are, and what we do.
Find a parter
Discover our partners and how they can support you.
Become a partner
Learn about the benefits of being a Spamhaus partner and how to get started.
Discover a wide range of blog posts, case studies and reports.
Spamhaus’ insight into malware, botnet C&Cs, and the domain reputation landscape.
Commonly asked questions about Spamhaus products and processes.
The Blocklist Tester
A tool to help you check if your servers are correctly configured to use Spamhaus DNSBLs.
The Reputation Portal
A tool for ASN owners to get visibility of their IPs’ reputation and proactively manage listings.
Help for the Project's legacy DNSBLs users
Using the Project’s legacy blocklists and suddenly experiencing email issues? This page may be able to help.
In depth information about the technical details and implementation of our products.
Posted by XYZ and Sarah Miller on 3 Mar 2022
Protecting the internet and making it a safer place to operate is everyone's responsibility. Spamhaus works with a broad spectrum of organizations across the industry to ensure this happens, including registries.
We've been reaching out to registries for their views and opinions on combating internet abuse for this blog post series. Recently we had an in-depth conversation with XYZ on their approach to domain abuse.
Before diving into that interview, let’s define “domain abuse” from Spamhaus’ perspective. For this, I’ll defer to our domain Guru, Carel Bitter:
“We usually see domain name abuse as using one or more domain names to enable abusive, fraudulent, or malicious activity. The domain names are often a crucial link in the chain, as many of these activities would not work anymore once the domains involved are not functioning anymore. So, taking action on a domain name breaks the malicious activity.”
Now, without further ado, here’s what XYZ had to say on the matter…
Spamhaus: Why is it important for XYZ to invest in anti-spam and other anti-abuse measures?
XYZ: It’s crucial for us to protect the .xyz namespace for all of its legitimate users. Individuals such as NFL Super Bowl champion turned motivational speaker MarquesColston.xyz and businesses like Square parent company Block .xyz place their trust and online presence in .xyz, and it’s imperative that our top-level domain (TLD) remains as free as possible from abuse. This is why the XYZ Anti-Abuse team prioritizes combating abuse – we value our community.
Spamhaus: What does XYZ consider to be domain abuse?
XYZ: XYZ’s Anti-Abuse Policy prohibits technical abuse of the DNS – including the following activities:
The XYZ Anti-Abuse Policy extends beyond what is required by ICANN, the nonprofit organization that focuses on ensuring a stable, secure, and unified global Internet. XYZ suspends abuse found when monitoring, and spam is included as a violation of our anti-abuse policy, as it is a significant area of concern.
Spamhaus: We’re pleased to see you include spam in your policy. Why do you feel it important to do so?
XYZ: Spam is widely used as a gateway to proliferate links to technical abuse of the DNS, like malware and phishing. Spam campaigns can send up a substantial flare, more easily noticed by cybersecurity platforms. This is one of the reasons why we deeply encourage spam protection services. By keeping our namespace safe and secure, .xyz and all XYZ zones are rated as safe zones throughout the internet, and this is very important to us.
We have seen some networks take extreme measures in the form of blanket blocking certain TLDs due to a network admin seeing a spam campaign in a namespace. We do not think that is a safe best practice, and it is not recommended. Due to our proactive measures in preventing spam from proliferating, we hope our domain extensions do not show up on any of those radars. If they do, we encourage reporting abuse directly to the registry so we can take action!
Spamhaus: We agree with you regarding blanket-blocking. The domain space is a very dynamic one. And as such, it’s hard to predict where the next big domain, the next hot start-up, may choose its name. While it may seem like a quick win to dismiss an entire TLD, you will undoubtedly target things you don’t want to. Meanwhile, the miscreants you were originally targeting have switched to a different TLD.
While we’re on the topic of “targeting miscreants,” it’s evident that .xyz has an ever-increasing community of legitimate websites. Often, with increased domain numbers comes increased exposure to abuse. However, in the latest Botnet Report, .xyz saw a 52% reduction in the number of domain registrations used for botnet command & controllers (C&Cs), which is really positive. What is XYZ doing to prevent abuse before it happens?
XYZ: There are various actions that we take, including those noted below.
Spamhaus: Having worked with XYZ for many years, we know you’re quick to act on confirmed abuse reports. Aside from using these, what tools and processes have you available to keep on top of abuse?
XYZ: We have developed sophisticated abuse monitoring software which allows us to proactively monitor, detect in near real time, and actively intervene when any of the aforementioned activities are detected.
XYZ has also established an abuse feedback system that allows individuals to report abuse 24/7. When individuals or independent researchers report .xyz abuse directly to the registry, XYZ can quickly investigate and suspend domain names in violation of our Anti-Abuse Policies.
As you’ve mentioned, we’ve developed strong partnerships with Spamhaus, as well as many other cybersecurity providers. This effort helps us identify and eliminate the bad apples from the many good ones that we have in our namespace.
Spamhaus: OK – so you’ve identified an abusive domain, what actions do you take?
XYZ: We immediately shut down the domain and notify the sponsoring registrar so they can further investigate, identify the registrant’s additional assets, and shut down or ban the customer if necessary. However, we don’t have any of the registrant’s details, so other than suspending the domain, the rest of the work lies with the registrars. This is a challenge for cybersecurity in general…
For now, let’s leave this here, and you can go and refill your coffee! In our next blog post, we’ll pick up with XYZ to learn more about the challenge of not knowing the full scope of a bad actor’s domains, alongside hearing some of their thoughts on how this issue can be resolved.
30 March 2022
fTLD, the registry behind .bank, turns to Passive DNS to ease the burden of compliance.
23 March 2022
Here, fTLD, the registry for .bank and .insurance top-level domains (TLDs), provides their view of how a TLD can make it simple for users to trust their interactions with websites.
16 March 2022
Here are some key considerations regarding the proper processes and procedures when sending email using a newly acquired domain name.