RBL Checks via the RBLTracker API

The RBLTracker API now includes the ability to perform a one-off RBL check, similar to the Manual Check feature in the RBLTracker Portal, via the API. This API feature can be used to build your own real-time RBL lookup page, or to perform one-off RBL checks as needed, rather than having them run on a … Continued

Read More
Blacklist Monitoring Locations

Improved Accuracy and False-Positive Mitigation

RBLTracker relies on data provided by third parties; whether it’s the RBL providers themselves, or Google and Yandex (for Safe Browsing data), or the data provided through the Facebook Threat Exchange. As such, we are somewhat subject to the accuracy of this data. The Accuracy Problem Occasionally, we’ll end up in a situation where the … Continued

Read More

Top 7 Tips for Getting Your Hosts Delisted

So you’ve been blacklisted? Before you click that button to get your hosts delisted, make sure to follow our top 7 tips for getting your hosts delisted: Check the description returned by the blacklist provider. Most blacklist providers include a text description, and often a URL that links to a page to be delisted. RBLTracker … Continued

Read More

Blacklist Monitoring for Cloud Hosting

  Since our inception, we’ve helped thousands of companies and individuals, from all around the world, stay on top of day-to-day threats related to their email and websites. Recently, with the addition of our Facebook Threat Exchange monitoring, we’re helping those same customers battle social media related threats. Some of our earliest customers have been … Continued

Read More
How RBLs Affect You

How Do Blacklists Affect Me? (Part 3)

In Part 1 and Part 2 of our series, I talked about what blacklists are, how they work, and how blacklists are used by administrators to control the day-to-day onslaught of SPAM on their email systems. In this article I’m going to talk about how blacklists affect you, your business, and why you should care. … Continued

Read More
How are RBLs Used

How Are Blacklists Used? (Part 2)

In Part 1 of our series we talked about what blacklists are, and the different types of blacklists. In this article, we’ll talk more about how they can be used by administrators to control the flow of SPAM into their networks. How Are They Used? Most mail server software can be configured to make requests … Continued

Read More