Removal from DNSBL AntiCaptcha.NET

Here you can check the reputation of your address. To obtain additional information.

YOU ARE ISP AND YOUR IP GOT BLACKLISTED?

  • Spam Zombies

    Block all outgoing connections from client dynamic/dialups/homeusers to destination-port 25 TCP UNIVERSE if that destination is not your mailrelay/smarthosts and force them to connect to your mailrelays/smarthosts or smtp-submission.

  • Mailservers / Smarthosts

    Spammers will always try to send millions of emails for it to be worthwhile, it is a numbers game for them. On the other hand, you will not find many end users having a genuine need to send more than a few hundred, or at most a few thousand.

  • Open Relays

    Examine the IP addresses of customers with ‘statics’ regularly (e.g. weekly) with automated scripts for known weaknesses. Temporarily shut down those IP addresses that you find to have exploitable security holes that can lead to email abuse.

New on this DNSBL?

  • Help
  • Price
  • F.A.Q
  • Close All Open Relays

    Mail servers that allow third parties (unrelated to the owner of the server) to relay mail through them without any formal authentication are considered open relays. Open relays let spammers remain anonymous.

  • Detect and Quarantine

    Using viruses, worms, and malicious software (malware like BAGEL, MyDoom, SoBig, and so on), hackers and spammers have intentionally deposited millions of "backdoor" open relays and proxies on the personal computers of unsuspecting users.

  • Authenticated E-mail

    ISPs should implement authenticated e-mail solutions that require valid credentials from users before they can send mail. This can be accomplished in many ways, but it is usually implemented by requiring some form of a username and password to validate the user account on the system.

  • Implement Rate Limits

    Over the last year, hackers have begun to conspire with spammers, resulting in new e-mail viruses and worms that commandeer personal computers for use by spammers.

  • Control Automated Registration

    Spammers and hackers have found methods for automatically registering millions of accounts with ISPs, especially free e-mail account providers. These accounts can be used for many purposes including sending spam and mounting DoS attacks.

  • Bulk E-mail

    Monitor SMTP responses from recipient’s mail servers. Promptly remove all e-mail addresses for which the receiving mail server responds with a 55x SMTP error code (for example, user doesn’t exist ).

  • FREE

    automatic delist after 30 days

  • EXPRES

    from $149.99

  • How do spammers get my email address?

    They run modified search engines, so called "harvesters" on the web, which index everything before and after the @ sign.

  • What can I do to protect my email address?

    First, your email address should never be listed on any website, otherwise harvesters will find it and spammers will abuse it.

  • If IP address is your provider's mail server we recommend the following

    Please send a complaint to your provider and request they fix this problem immediatly. Think about this: You pay them so that you can use the Internet without problems; If they are ignoring your complaint or claiming they can't do anything, you should consider changing your provider.

  • How can the IP be removed from DNSBL?

    If you don't want to wait for expiration, expedited express delisting of this IP from DNSBL can be optionally available at a $150 charge by using one of the payservicebuttons above.

  • How to use this DNSBL.

    All listed IPs exists as reverse format subdomains under the dnsbl.anticaptcha.net zone, as defined in RFC 5782. The nameserver at ns.anticaptcha.net runs NSD on a Debian GNU/Linux platform.

    Looking up IP 1.2.3.4 is done by querying any nameserver for all records in the zone 4.3.2.1.dnsbl.anticaptcha.net and look at the answer received:

    If the zone doesn't exist (status: NXDOMAIN), the IP is clean (not blocked).

    If the zone exists (status: NOERROR), an A-record with the IP 127.0.0.3 or 127.0.0.10 and a TXT-record with additional info is returned, marking this IP as blocked.