By: Mxtools  09-12-2011

Check The Price For Your Organization

Organization Type:



Spamhaus Block List (SBL)
Contains IP addresses that are controlled by known spammers;

Exploits Block List (XBL)
Contains IP addresses of virus-compromised computers that are sending spam;

Policy Block List (PBL)
Contains IP addresses that should not be delivering unauthenticated SMTP email.

Domain Block List (DBL)
List of domains used in spam which link to fraud, phishing and malware sites.

Spamhaus’ anti-spam datafeed service is used by organisations large and small throughout the world to help them fight the scourge of spam. Maintained around the clock by Spamhaus’ team of dedicated professionals, the blocklists draw on a mixture of automated and manual systems, blocklists and whitelists, IPs and domains to block over 90% of spam at SMTP connect time. This means that you:

  • Don’t waste bandwidth accepting spam
  • Don’t waste space storing spam
  • Don’t waste time processing spam

As you’d expect from a service used by so many, the Spamhaus blocklists have been available consistently for over 10 years. Distributed services mean that resiliance is built in. Experience, care and processes mean that spam capture rates are consistently high with markedly low false positive rates. And constant innovation delivers solutions to today’s spam problems as they appear.

Rejecting the majority of spam at SMTP connect time is the most cost effective way of dealing with the spam problem as it frees up resources so that they can be employed to better effect elsewhere. Despite this, the Spamhaus Datafeed Query Service is available from only US$250 per annum through to subscription rates costing a few cents per user per annum.

When talking with the majority of our customers, the question isn't whether they can afford the Spamhaus subscription service, rather it's one of whether they can afford NOT to use the service.

The information in this article was current at 06 Dec 2011

Other products and services from Mxtools



Small to medium-sizedorganizations may use the free public DNS servers, while large organizations ofmore than 1,000 users should retrieve the data by rsync and serve it from a localDNS mirror or other internal database. Sender lists like can be used in a first stage filter to help identify 80% to 90% of unsolicited messages.