75:
The CBL attempts to avoid listing real mail servers, but certain misconfigurations of mail servers can make the system appear infected (for example, servers that send HELO with 'localhost' or a similar incorrect domain.)
131:
111:
68:
40:
The CBL takes its source data from very large spamtraps/mail infrastructures, and only lists
86:
8:
65:
that do their own direct mail transmission, or are otherwise participating in a botnet.
136:
58:
125:
54:
48:
29:
41:
116:
98:
62:
82:
The CBL does not provide public access to gathered evidence.
25:
79:
Entries automatically expire after a period of time.
51:
of various sorts (HTTP, socks, AnalogX, wingate etc.)
123:
124:
101:— estimate of outgoing spam reputation
44:exhibiting characteristics such as:
13:
14:
148:
105:
1:
32:sending computer infections.
132:Computer security procedures
16:In computer networking, the
7:
117:CBL lookup and removal page
92:
35:
10:
153:
26:DNS-based Blackhole List
18:Composite Blocking List
71:or "stealth" spamware.
85:CBL data are used in
144:
152:
151:
147:
146:
145:
143:
142:
141:
122:
121:
108:
95:
38:
12:
11:
5:
150:
140:
139:
134:
120:
119:
114:
107:
106:External links
104:
103:
102:
94:
91:
73:
72:
66:
52:
37:
34:
9:
6:
4:
3:
2:
149:
138:
135:
133:
130:
129:
127:
118:
115:
113:
110:
109:
100:
97:
96:
90:
88:
83:
80:
77:
70:
67:
64:
60:
56:
53:
50:
47:
46:
45:
43:
33:
31:
28:of suspected
27:
23:
19:
84:
81:
78:
74:
69:Trojan horse
49:Open proxies
39:
21:
17:
15:
30:E-mail spam
126:Categories
89:XBL list.
99:CBL Index
137:Spamming
93:See also
87:Spamhaus
36:Overview
112:The CBL
63:botnets
59:viruses
24:) is a
55:Worms
42:IPs
22:CBL
128::
61:/
57:/
20:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.