fbpx
Select Page

DOMAIN REPUTATION DATABSE

Block Spam, Malware and Phishing email

Believe it or not, 90% of all malware is still delivered via boring old email.* (Verizon data breach report
2018) Prevent business critical data leaks, reputation damage, and loss of revenues by protecting your
inbox against email-based attacks.

Types of blocked domains

DBL is a list that contains many types of domains used in spam and abuse, ranging from malware to phishing to legitimate domains that have been hacked by spammers.

Spammer-owned domains are
classified as follows:

  • Spam domains

    Domains used to send spam, host websites for the purpose of spam or support spam operations.

  • Phish domains.

    Domains used to send phishing email, host websites for the purpose of phishing or support phishing operations.

  • Malware domains.

    Domains used to send malware, host malware websites or support malware distribution operations.

  • Botnet Command and Control (C&C) domains

    Domains used to control networks of computers that are infected and send malicious spam.

  • Legitimate spam domains.

    Hacked legitimate domains used to send spam, host websites for the purpose of spam or support spam operations.

  • Legitimate redirector domains.

    Hacked legitimate domains that redirect to a spam website.

  • Legitimate phishing domains.

    Hacked legitimate domains used to send phishing email, host websites for the purpose of phishing or support phishing operations.

  • Legitimate malware domains.

    Hacked domains used to send malware, host malware websites or support malware distribution operations.

  • Legitimate botnet C&C domains.

    Hacked domains used to control networks of computers that are infected and send malicious spam.

Legitimate domains that have been
hacked or participate in spam
activitiesare classified as follows:

Domain reputation database updates within minutes.
In order to cope with the latest spam campaigns the
Datafeed Service provides access to these updates in
almost real-time

Use Cases

Data feed customers usually load the DBL data onto an internal DNS server that is configured to act as a Datafeed for all their networks. However, based on preferences customers can configure their mailservers to query the internal Datafeed as well.

The DBL is designed to be used in a number of scenarios:

For more information

APPLY NOW

Related Resources

DATA

Mollis eget. Sem magna necias
euismod laculs auctior consec
tetuer, ullamcorper…

READ MORE

DATA

Mollis eget. Sem magna necias
euismod laculs auctior consec
tetuer, ullamcorper…

READ MORE

DATA

Mollis eget. Sem magna necias
euismod laculs auctior consec
tetuer, ullamcorper…

READ MORE