IP blacklist: Difference between revisions
Jump to navigation
Jump to search
imported>Meg Taylor (subpages) |
imported>David MacQuigg (Add links, discussion of honeypots) |
||
Line 2: | Line 2: | ||
An '''IP blacklist''' is a database or list of [[IP address|IP addresses]] that should be blocked from connecting to a protected system. These blacklists (aka blocklists, blackhole lists, or DNSBL's) are most commonly used by email receivers to screen out spam and other abusive emails flooding the Internet. | An '''IP blacklist''' is a database or list of [[IP address|IP addresses]] that should be blocked from connecting to a protected system. These blacklists (aka blocklists, blackhole lists, or DNSBL's) are most commonly used by email receivers to screen out spam and other abusive emails flooding the Internet. | ||
1. DNSBL is an acronym meaning a BlackList that is published in DNS, the [[Domain Name System]]. | 1. DNSBL is an acronym meaning a BlackList that is published in DNS, the [[Domain Name System]]. | ||
=== Links === | |||
[http://en.wikipedia.org/wiki/DNSBL DNS Blacklist] - WP article | |||
=== Links to this page === | |||
[[Email authentication]] - The best IP blacklists use "honeypots" to detect new sources of abuse, and publish the source address within hours. Honeypots have addresses that are never used in a legitimate email, but are posted on various websites and other locations where criminals typically "harvest" addresses. |
Revision as of 11:57, 17 October 2009
An IP blacklist is a database or list of IP addresses that should be blocked from connecting to a protected system. These blacklists (aka blocklists, blackhole lists, or DNSBL's) are most commonly used by email receivers to screen out spam and other abusive emails flooding the Internet.
1. DNSBL is an acronym meaning a BlackList that is published in DNS, the Domain Name System.
Links
DNS Blacklist - WP article
Links to this page
Email authentication - The best IP blacklists use "honeypots" to detect new sources of abuse, and publish the source address within hours. Honeypots have addresses that are never used in a legitimate email, but are posted on various websites and other locations where criminals typically "harvest" addresses.