Premium Data Sources and Updated Portal

After several months of development and testing, and lots of feedback from our valued customers, we’re excited to announce the latest release of the RBLTracker monitoring service. This release includes a long list of new features, bug fixes, and various changes- too many to list in one post. Some of the changes include: Premium Data … Continued

Read More
Blacklist Monitoring Locations

Improved Accuracy and False-Positive Mitigation

RBLTracker relies on data provided by third parties; whether it’s the RBL providers themselves, or Google and Yandex (for Safe Browsing data), or the data provided through the Facebook Threat Exchange. As such, we are somewhat subject to the accuracy of this data. The Accuracy Problem Occasionally, we’ll end up in a situation where the … Continued

Read More

Top 7 Tips for Getting Your Hosts Delisted

So you’ve been blacklisted? Before you click that button to get your hosts delisted, make sure to follow our top 7 tips for getting your hosts delisted: Check the description returned by the blacklist provider. Most blacklist providers include a text description, and often a URL that links to a page to be delisted. RBLTracker … Continued

Read More

Blacklist Monitoring for Cloud Hosting

  Since our inception, we’ve helped thousands of companies and individuals, from all around the world, stay on top of day-to-day threats related to their email and websites. Recently, with the addition of our Facebook Threat Exchange monitoring, we’re helping those same customers battle social media related threats. Some of our earliest customers have been … Continued

Read More
How RBLs Affect You

How Do Blacklists Affect Me? (Part 3)

In Part 1 and Part 2 of our series, I talked about what blacklists are, how they work, and how blacklists are used by administrators to control the day-to-day onslaught of SPAM on their email systems. In this article I’m going to talk about how blacklists affect you, your business, and why you should care. … Continued

Read More
How are RBLs Used

How Are Blacklists Used? (Part 2)

In Part 1 of our series we talked about what blacklists are, and the different types of blacklists. In this article, we’ll talk more about how they can be used by administrators to control the flow of SPAM into their networks. How Are They Used? Most mail server software can be configured to make requests … Continued

Read More
rev-terror