Knowledge

Composite Blocking List

Source 📝

75:
The CBL attempts to avoid listing real mail servers, but certain misconfigurations of mail servers can make the system appear infected (for example, servers that send HELO with 'localhost' or a similar incorrect domain.)
131: 111: 68: 40:
The CBL takes its source data from very large spamtraps/mail infrastructures, and only lists
86: 8: 65:
that do their own direct mail transmission, or are otherwise participating in a botnet.
136: 58: 125: 54: 48: 29: 41: 116: 98: 62: 82:
The CBL does not provide public access to gathered evidence.
25: 79:
Entries automatically expire after a period of time.
51:
of various sorts (HTTP, socks, AnalogX, wingate etc.)
123: 124: 101:— estimate of outgoing spam reputation 44:exhibiting characteristics such as: 13: 14: 148: 105: 1: 32:sending computer infections. 132:Computer security procedures 16:In computer networking, the 7: 117:CBL lookup and removal page 92: 35: 10: 153: 26:DNS-based Blackhole List 18:Composite Blocking List 71:or "stealth" spamware. 85:CBL data are used in 144: 152: 151: 147: 146: 145: 143: 142: 141: 122: 121: 108: 95: 38: 12: 11: 5: 150: 140: 139: 134: 120: 119: 114: 107: 106:External links 104: 103: 102: 94: 91: 73: 72: 66: 52: 37: 34: 9: 6: 4: 3: 2: 149: 138: 135: 133: 130: 129: 127: 118: 115: 113: 110: 109: 100: 97: 96: 90: 88: 83: 80: 77: 70: 67: 64: 60: 56: 53: 50: 47: 46: 45: 43: 33: 31: 28:of suspected 27: 23: 19: 84: 81: 78: 74: 69:Trojan horse 49:Open proxies 39: 21: 17: 15: 30:E-mail spam 126:Categories 89:XBL list. 99:CBL Index 137:Spamming 93:See also 87:Spamhaus 36:Overview 112:The CBL 63:botnets 59:viruses 24:) is a 55:Worms 42:IPs 22:CBL 128:: 61:/ 57:/ 20:(

Index

DNS-based Blackhole List
E-mail spam
IPs
Open proxies
Worms
viruses
botnets
Trojan horse
Spamhaus
CBL Index
The CBL
CBL lookup and removal page
Categories
Computer security procedures
Spamming

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.