
RBL can be used to block the IP addresses of: It is best to use your own or your ISP's DNS servers to ensure accurate replies. Note, free DNS services will most likely not respond to RBL queries or stop responding after a period of time. RBL works via DNS - a DNS query containing the IP address to be checked and the name of the RBL returns either nothing (IP is not on the RBL) or a 127.0.0.x result (IP is on the RBL). This can greatly reduce the processing load on your mail server. RBLs can block a large percentage of unwanted mail at the point of connection, meaning the body of the mail is not delivered.

There are now a multitude of companies providing both free and subscription based lists with IP addresses harvested from a variety of sources. Since their creation in 1997, RBLs have been on the front line in the fight against spam. Realtime blackhole list (RBL) or DNS-based blackhole list (DNSBL) To aid you in your battle against spam, I’d like to share some nuggets of spam-blocking information - four highly effective and often overlooked or unheralded weapons to beef up your email security arsenal.ġ. With firewall software incorporated into most desktop operating systems, email has become the vector of choice for those insidious minds aiming to deliver malware, viruses, advertising and numerous other threats directly to users’ devices.

If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, DNS, or MSPs for the series PM Eric to get started.

This is the 161st article in the Spotlight on IT series.
