Have you been blocked?
All blocklists are researched and managed by The Spamhaus Project.
Simply click on the link below, which will take you to the Project’s Blocklist Removal Center. From here you will be able to enter your IP or Domain and begin your request for removal.
Please note that the Project’s Blocklist Removal Center is the only place where removals are handled.
IT and security teams consistently face multiple business challenges. Discover how our solutions can help overcome some of those issues.
From processing issues, to email-borne threats our blocklists easily integrate with your current email set-up to improve anti-spam & anti-virus email filtering.
Employ our threat intelligence to increase visibility across security events, reveal potential weaknesses in your network, and threats to your brand.
Stay on top of the latest threats and proactively combat botnet infections, and other forms of abuse, with our solutions.
From clicking on phishing emails to visiting malware dropper sites, our threat intelligence provides automatic protection for your users.
Our products provide additional layers of security for networks and email. They also present security teams with additional insight into malicious behavior.
Border Gateway Protocol (BGP)
Block the worst of the worst at your network edge, taking advantage of your existing BGP-capable routers. Configuration only takes minutes.
Data Query Service (DQS)
Benefit from industry-leading real time blocklists. These DNSBLs easily plug into your existing email infrastructure to block spam and other email threats.
A powerful research tool to investigate relationships between internet infrastructures. Quickly pivot to new areas of concern to rapidly investigate potential threats.
Immediately block connections to dangerous sites, including phishing and malware dropper websites. A ‘set and forget’ solution.
A wide range of datasets, providing multiple layers of protection. They can be plugged directly into your existing hardware, making them an affordable choice.
Border Gateway Protocol (BGP) Feeds
Do Not Route Or Peer (DROP) and Botnet Controller List (BCL) datafeeds can peer with your existing BGP-capable router.
Domain (DBL), Zero Reputation (ZRD) and Hash blocklists (HBL) enable you to block content in emails, filtering out a higher rate of email-borne threats.
Data for Investigation
Passive DNS and extended datasets give you additional information on internet resources. They provide deeper insights into incidents and possible threats.
DNS Firewall Threat Feeds
A wide range of feeds to apply to your DNS recursive server. Choose the right level of protection for your organization.
Spam (SBL), Policy (PBL), Exploits (XBL) and Auth (AuthBL) blocklists allow you to filter email from IPs associated with spam, botnets, and other threats.
Find out more about us.
Learn more about Spamhaus; who we are, and what we do.
Find out who we work with and how you can become a Spamhaus Partner.
Discover a wide range of blog posts, case studies and reports.
Commonly asked questions about Spamhaus products and processes.
In depth information about the technical details and implementation of our products.
Posted by Milly Fawcett on 25 Mar 2019
In recent independent tests Spamhaus’ block lists, used alongside a specially configured SpamAssassin, stopped 99.43%* of spam emails, with 0.02% false positives. These results are similar to some of the more expensive email filter solutions on the market. Perhaps it’s time to consider a more cost-effective & simple anti-spam solution?
Until recently those using SpamAssassin and Spamhaus’s block lists had to rely on the programme’s default configuration, or, manually change SpamAssassin’s configuration based on what the user believed to be the best settings.
Now, users no longer have to rely on intuition or the defaults: we have created the optimum settings. At a high-level, the experts at Spamhaus have introduced new analysis for the headers and tweaked both the rules and weighted scoring.
With these changes, you can achieve similar results you would expect from a costly email filter product, all for the price of a subscription to Spamhaus’s Blocklists via the Data Query Service (DQS), and the time taken to download the SpamAssassin add-on.
Firstly, it’s worth noting that this will only work for subscribers to the Spamhaus DQS. Additionally, you need access to all our blocklists, i.e., Spamhaus’s Content Blocklists including Domain Blocklist (DBL), Zero Reputation Domain (ZRD) and Spamhaus’s IP Blocklists, which includes the Spamhaus Block List (SBL), the Exploits Block List (XBL) and the Policy Block List (PBL).
With all the above in place just go to https://docs.spamhaustech.com/ and find ‘Data Query Service using SpamAssassin’ or click here, and download the instructions and Spamhaus’s SpamAssassin add-on. Naturally, if you are using a subprogram with SpamAssassin you will need to amend accordingly.
Effective email filters needn’t cost the earth, nor take excessive amounts of time to configure. Download the config and sign up for a free 30-day DQS trial today, and see how simple it can be.
* The VBSpam results refer to the test configuration where Spamhaus’s data-sets were the only ones used: lookups to all other services supplying data were disabled. SpamAssassin users will further increase the effectiveness of this set-up by turning on services that deeply analyse mail contents such as the ClamAV open source anti-malware engine.
Spamhaus’ Data Query Service (DQS) is an affordable and effective solution to protect your email infrastructure and users.
Using your existing email protection solution, you will be able to block spam and other related threats including malware, ransomware, and phishing emails.
The service has never failed and utilizes the longest established DNSBLs in the industry.
5 December 2018
If you are a current Rsync customer with under 50,000 users it's likely that you will find it beneficial to migrate to our Data Query Service.
5 October 2018
Understand how dynamic updates help to prevent hailstorm spam
1 February 2018
The threat from cyber criminals is relentless, so any protection strategy needs to ensure that a security team’s workload is manageable and focused. With the right threat intelligence strategy in place, there are ways to gain extra time and target the most serious threats.