To have your IP removed from rbl.myrbldns.com, please use the “Contact Us” form at the top of the page.
The MyRBLDNS…
- …takes its source data from large spamtraps/mail systesms, and only lists IPs exhibiting characteristics which are specific to open proxies of various sorts and dedicated Spam BOTs which have been abused to send spam, worms/viruses that do their own direct mail delivery, or some types of trojan-horse or “stealth” spamware, dictionary mail harvesters etc.
- …only lists IPs that have attempted email connections to one of our servers in such a way as to indicate that the sending IP is infected, OR, IPs specifically dedicated to the propagation/use of Spam BOTs.
- …does NO probes. In other words, the MyRBLDNS NEVER makes connections to other machines to “test” anything.
- …does NOT test for, nor list, open SMTP relays.
- …does NOT care whether an IP is dynamic or not, if connections the IP makes indicate that it’s infected, it is listed regardless.
- …does NOT attempt to associate IP addresses to persons or organizations, and furthermore, a MyRBLDNS listing should NOT be construed as accusing anyone of spamming – virtually all listees are the victims of a virus or other compromise, not deliberately spamming.
- …does NOT accept external submissions for listing. Hence it is not possible for the MyRBLDNS to be used as an instrument of revenge (eg: “disgruntled ex-employee” or “competitor”).
- …tries very hard to avoid listing legitimate mail sources. It does not attempt to list every possible spam source.
- …is based on information believed to be reliable. No warranty is made that it is accurate or complete…. Use entirely at your own risk.
- …should be used in addition to Tier 1 RBL’s.
There is no supporting data or “evidence” file available for any given listing, and no mechanism to ask why any given listing took place. To counteract this, there is a no-questions-asked removals procedure allowing any affected party to delist a specific IP address. However, delisted IPs are relisted if new evidence of spam activity is subsequently detected.