Have you been blocked?
All blocklists are researched and managed by The Spamhaus Project.
Simply click on the link below, which will take you to the Project’s Blocklist Removal Center. From here you will be able to enter your IP or Domain and begin your request for removal.
Please note that the Project’s Blocklist Removal Center is the only place where removals are handled.
IT and security teams consistently face multiple business challenges. Discover how our solutions can help overcome some of those issues.
From processing issues, to email-borne threats our blocklists easily integrate with your current email set-up to improve anti-spam & anti-virus email filtering.
Employ our threat intelligence to increase visibility across security events, reveal potential weaknesses in your network, and threats to your brand.
Stay on top of the latest threats and proactively combat botnet infections, and other forms of abuse, with our solutions.
From clicking on phishing emails to visiting malware dropper sites, our threat intelligence provides automatic protection for your users.
Our products provide additional layers of security for networks and email. They also present security teams with additional insight into malicious behavior.
Border Gateway Protocol (BGP)
Block the worst of the worst at your network edge, taking advantage of your existing BGP-capable routers. Configuration only takes minutes.
Data Query Service (DQS)
Benefit from industry-leading real time blocklists. These DNSBLs easily plug into your existing email infrastructure to block spam and other email threats.
A powerful research tool to investigate relationships between internet infrastructures. Quickly pivot to new areas of concern to rapidly investigate potential threats.
Immediately block connections to dangerous sites, including phishing and malware dropper websites. A ‘set and forget’ solution.
A wide range of datasets, providing multiple layers of protection. They can be plugged directly into your existing hardware, making them an affordable choice.
Border Gateway Protocol (BGP) Feeds
Do Not Route Or Peer (DROP) and Botnet Controller List (BCL) datafeeds can peer with your existing BGP-capable router.
Domain (DBL), Zero Reputation (ZRD) and Hash blocklists (HBL) enable you to block content in emails, filtering out a higher rate of email-borne threats.
Data for Investigation
Passive DNS and extended datasets give you additional information on internet resources. They provide deeper insights into incidents and possible threats.
DNS Firewall Threat Feeds
A wide range of feeds to apply to your DNS recursive server. Choose the right level of protection for your organization.
Spam (SBL), Policy (PBL), Exploits (XBL) and Auth (AuthBL) blocklists allow you to filter email from IPs associated with spam, botnets, and other threats.
Find out more about us.
Learn more about Spamhaus; who we are, and what we do.
Find out who we work with and how you can become a Spamhaus Partner.
Discover a wide range of blog posts, case studies and reports.
Commonly asked questions about Spamhaus products and processes.
In depth information about the technical details and implementation of our products.
Domain, Zero Reputation and Hash blocklists add vital additional layers of security to your email filtering process.
For increased peace of mind and enhanced levels of security, emails should be filtered by content, following the use of IP blocklists. This will provide further protection for mail servers, networks and users.
At Spamhaus we offer three different datasets based on content reputation: Domain Blocklists (DBL), Zero Reputation Domains (ZRD) and Hash Blocklists (HBLs). All blocklists are carefully curated by an expert team of researchers, who use machine learning, combined with manual investigations and heuristics, assessing over 3 million domains every day!
Using Spamhaus Content Blocklists in combination with our IP blocklists enables you to filter over 99% of spam and malicious emails, utilizing your existing email infrastructure.
Email administrators can block email containing links to listed domains by performing message body URI checks. You can use our return codes to simply block emails, or use them as part of a spam scoring system, according to your organization’s policies, risk profile and tolerance for false positives.
Domains owned by spammers and used for spam or other malicious purposes. This blocklist also contains domains owned by non-spammers which are used for legitimate purposes, but have been hijacked by spammers.
The Domain Blocklist protects email containing domains associated with spam, phishing, malware, botnet command and controllers (C&Cs) and redirector domains.
Due to our strong relationships with domain registries, some domains are listed before they are seen in the wild.
This blocklist is included in our Content Blocklist subscription and is available via our Data Query Service (DQS). It can also be consumed via an API. For further information, please contact us.
This lists newly registered domains for 24 hours. Domains that have just been registered are rarely used by legitimate organizations immediately. Cybercriminals register and burn 100s of domains daily.
The Zero Reputation Domain (ZRD) blocklist helps to protect your users from clicking on links and visiting newly registered domains until it is established that they are not associated with zero day attacks; phishing, bot-herding, spyware and ransomware campaigns.
This blocklist contains the following content areas: Cryptowallet (Bitcoin etc.), Malware and Email addresses.
Hash Blocklists (HBL) are lists of cryptographic hashes associated with malicious content, as opposed to IP addresses or domains. They are extremely useful for filtering fraudulent emails coming from ISPs, domains, or IP addresses that Spamhaus is unable to list e.g. Gmail. Additionally, they can block emails containing malware files.
Due to our collection and dissemination methods, our Malware Hash Blocklist can list malware within 30 secs of initial observation by our researchers.
Sign-up for a free 30 day trial of our Content Blocklists. No credit card or payment details are required. Implementation is quick and easy.