A comprehensive reference of Abusix’s production-ready DNS blocklists and whitelists, detailing list types, usage scenarios, return codes, and integration guidelines for email security infrastructure.
💡 It is normal for a non-SMTP server IP to be listed in this zone. This will not cause any ill-effects, e.g. it will not prevent mail from being sent from this IP or range.The list is built by constantly scanning the entire IPv4 range and applying a policy that states:
❗ Warning This zone should only be used on border SMTP hosts, not smart hosts or SMTP AUTH outbound servers, as you could block your customers. This list should never be used for Received headers hops or for anything other than checking IP addresses that hand off to your mail server(s), as doing so will cause significant numbers of false positives.Delisting Anyone can request a delisting from this zone, and a semi-permanent exception will be created automatically. Exceptions are only pruned when they are no longer necessary. Still, in the future, we may require that Policy exceptions are revalidated once per year to prevent them from becoming stale.
💡 Note We do not allow delists of CIDR ranges from the Policy list. Only IPs that meet the policy requirements are delisted. If you have updated your rDNS recently and would like us to re-scan it, please get in touch with us via our support channels, and we will do this for you.Example query:
💡 Note to Rsync users policy.zoneBlacklistrDNS policy.zone
💡 Info This list should be used as a URI DNSBL (e.g., checking domain names or IP addresses found in the message body), but can also be used as an RHSBL where the rDNS, SMTP HELO, MAIL FROM domain, DKIM d= domain, Message-ID domain, and List-Unsubscribe headers are checked against it. The list should not be used to check the connecting IP address, though only IP addresses are in the message body.127.0.1.1 is returned for domains/IPs found in the message body. 127.0.1.2 is returned for newly observed domains (found using other trap types). 127.0.1.3 is returned for domains found by following short URLs.
💡 Info The list of wildcards domains to make this list as easy to implement as possible. That means the zone lists the parent domain and any sub-domains, so you don’t need to normalize the hostname or domain name before querying.Example query:
💡Note When creating the domain list, we found that many spams go to great lengths to evade detection, using open redirectors, short URLs, and online drive services like Google Drive and Yandex Disk. Thus, we created several lists to combat this; see the shorthash and diskhash lists. When dblack, shorthash, and drivehash are combined, you will get the best possible coverage and protection available.
💡Info As this is an entirely new type of anti-spam check, it will require support to be added to your chosen mail platform. **Rspamd **Please look at our set-up instructions for rspamd, which contains the necessary code to do these lookups. See link
💡Info As this is an entirely new type of anti-spam check, it will require support to be added to your chosen mail platform. **Rspamd **Please look at our set-up instructions for rspamd, which contains the necessary code to do these lookups. See link