This service is based in Australia where the Courts have ruled blacklists are not liable for any losses or damages that may be experienced by those in DNSBL listings, and we have the right to list problematic netizens, spammers, miscreants, or whoever the hell we like, since nobody is forced to use, nor pays for access to, this service.
This service was originally created in early 2000's whilst at my employers at the time so we could have multiple mail servers access a single blacklist, as it was getting time consuming constantly updating all the mail servers access lists, it grew from there, with others finding and using it, originally known as dnsbl.lan, dnsbl.uni and later alt-backspace.org, nobody was or is forced to use any blacklists, if they do, it's because they must find them effective, so if you're listed, deal with it, clean up your act.
Most of our lists are created from various honeypots, so if you're listed, it's because you or a PC on your LAN were up to no good.
We understand and accept that a listing may relate to a previous user of your IP, there may have been a breach of your WiFi security, or a PC that has been hit with malware/viruses, in which case you need to locate and clean the device responsible before asking for a delisting.
Note: We cannot and will not remove any IP's from the countries lists, as these are static RIR country allocations, they are not claiming you were a bad actor.
Once an entry is added it can remain until a delisting request is made.
Some Usage Configuration Examples
POSTFIX smtpd_recipient_restrictions = ...(other options)... reject_rbl_client bl.zonecheck.org reject_rhsbl_client rhsbl.bl.zonecheck.org warn_if_reject reject_rbl_client netblocks.bl.zonecheck.org ...(other options)... * We recommend using warn_if_reject on lists that are not marked as safe for a few weeks to make sure there is no negative impacts, this is typcially for lists like netblocks SENDMAIL FEATURE(`enhdnsbl', `bl.zonecheck.org', `553 rejected Blocked by bl.zonecheck.org', `')dnl EXIM In acl_check_rcpt: deny message = Access denied - $sender_host_address listed at $dnslist_domain\n$dnslist_text dnslists = bl.zonecheck.org:netblocks.bl.zonecheck.org QMAIL Add rblsmtpd -r bl.zonecheck.org to the startup arguments for tcpserver. MS EXCHANGE Enable Message Filtering (from MS KB 261087): Click Start, point to Programs, point to Microsoft Exchange, and then click System Manager 1/ If the Administrative Groups container exists in the left pane, expand it, expand the appropriate administrative group container, expand Servers container, expand appropriate server container, then expand the Protocols container. 2/ If the Administrative Groups container does not exist, expand the Servers container in the left pane, expand the appropriate server container, and then expand the Protocols container. To expand a container, double-click the container to the left of the container. In the left pane, click the SMTP container, right-click the appropriate SMTP virtual server in the right pane, and then click Properties, then Advanced and select the IP address that you want to enable message filtering for, and then click Edit and select the Apply Filter checkbox, then click OK, three times. Goto System Manager -> Global Settings -> right-click Message Delivery, then select Properties. To expand a container, double-click the container or click the plus sign to the left of the container. Click the Connection Filtering tab and set Display Name: zonecheck.org DNS Suffix: bl.zonecheck.org SPAMASSASSIN urirhsbl ALT_URI uri.bl.zonecheck.org. A body ALT_URI eval:check_uridnsbl('ALT_URI') describe ALT_URI Contains a URI listed in uri.bl.zonecheck.org tflags ALT_URI net score ALT_URI 2.1 uridnsbl ALT_URI2 netblocks.bl.zonecheck.org. A body ALT_URI2 eval:check_uridnsbl('ALT_URI2') describe ALT_URI2 URL's domain A record listed in netblocks.bl.zonecheck.org score ALT_URI2 4.0 tflags ALT_URI2 net a uridnssub ALT_URI3 bl.zonecheck.org. A 127.0.0.3-127.0.0.122 body ALT_URI3 eval:check_uridnsbl('ALT_URI3') describe ALT_URI3 URL's domain A record listed in bl.zonecheck.org score ALT_URI3 3.0 tflags ALT_URI3 net a ** NOTE: SpamAssassin has internal skip lists, this is a list of predefined domains that should never be checked. Many of the domains are old, and some, like mail.ru are for sometime used for malicious purposes. To disable this, at the end of local.cf place the line: clear_uridnsbl_skip_domain
We accept no responsibility for anything and we give no warranties, we try to minimise false listings, but like everything in the fight to rid spam, false positives are always posible, to help eliminate this, only trusted admins can enter spam IP's, apart from our honeypots that by their very nature, will never see legitimate messages, there is never such a thing as a perfect solution in the fight against spam, and anyone who tells you this,or tries to sell you a solution with those claims, are full of shit!