Check the bottom of this page to get more information about migrations to version 5 or here to view the DNSBL Project dashboard.
Removal requests are still available for manual handling (until the main site has been fixed). Just send a mail to firstname.lastname@example.org (or email@example.com) with the address you want to have unlisted.
A DNS-based Blackhole List (DNSBL, Real-time Blackhole List or RBL), is a means by which an Internet site may publish a list of IP addresses, in a format which can be easily queried by computer programs on the Internet. As the name suggests, the technology is built on top of the Internet DNS or Domain Name System. DNSBLs are chiefly used to publish lists of addresses linked to spamming. Most mail transport agent (mail server) software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists (Source)
We are regularly scanning new proxies that are reported to us and we're also trying to keep updated with the "Tor"-network proxies, a network that forgets that anonymity can be a problem when we are speaking abuse.
dnsbl.tornevall.org: Default zone
opm.tornevall.org: Removed 30 june 2013, reinstated 1 june 2016 due to high use
bl.fraudbl.org: New zone since 22 june 2016
|1||IP has been reported|
Meaning: The ip has been reported from a third party application, honeypot, but may not necessarily be confirmed by our local sweepers (this is for proxies)
As there may be SMTP-servers amongst our hosts, this bit value may be unsafe to use and in the case of SMTP, there is no available confirmation.
|2||IP has been confirmed as working proxy|
June 2016: When FraudBL is used, this mask confirms the host as fraudible (Servers used for phishing, fraud, etc)
|8||IP was tested, but was never returning anything|
Meaning: The ip may be fixed by the owner and therefore it's not working anymore
|16||June 2016: E-Mail spammer|
This is the former field for failed connections, which there is no interest in
|32||IP is tested and is fully functional but there is a second entry point (meaning this ip is not the same as the one that has been used by the user"), or the address is an exit node in TOR-network|
|64||IP is marked as "abusive". Primary used to point out spam or attacks through webforms, forum, telnet, etc.|
June 2016: When FraudBL is used, this mask are also added, which means that - for example - if there is a phishing case (mail) the bit will be set to over 64 (4+16+64).
|128||IP has a different anonymous-state (web-based proxies, like anonymouse, etc)|
FraudBL has just been started as a separate project - for the moment you can reach the site at https://fraudbl.org. FraudBL - Explained has been added here at the docs (from fraudbl.org), for your convenience.
Probably, it should be shorter than a regular host.
We are currently working on a complete migration to a new system. Here, you can find the status of that project.
Older versions from 2006 are following TornevallWEB versioning (1.x-4.x).