Margaret Rouse is an award-winning technical writer and teacher known for her ability to explain complex technical subjects simply to a non-technical, business audience. Over…
Real-time blackhole list (RBL) is a dynamic list of IP address owners that are active spammers or spam sources. The RBL may include Internet service providers (ISP) with customers that are known spammers or ISP servers that are hijacked for spamming purposes.
RBL is also known as a DNS Black List (DNSBL).
The majority of spam is the result of online advertisements and unsolicited bulk email (UBE). When spam is delivered, the forwarding IP address is added to the RBL.
The RBL prevents system abuse by halting spam. However, the blacklisting process must be handled carefully. It cannot prohibit appropriate or authentic source connections or open-source networking. If an ISP subscribes to the RBL, the ISP may determine which IP addresses should be blocked and added to the RBL. If an IP address matches an IP address listed on the RBL, the connection is automatically dropped.
The RBL was first implemented by the Mail Abuse Prevention System (MAPS), which was acquired by Trend Micro in 2005. Trend Micro adheres to strict guidelines and policies in its continuous effort to nominate and remove spam IP addresses from its blackhole data listings.
Techopedia’s editorial policy is centered on delivering thoroughly researched, accurate, and unbiased content. We uphold strict sourcing standards, and each page undergoes diligent review by our team of top technology experts and seasoned editors. This process ensures the integrity, relevance, and value of our content for our readers.
Margaret is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret's idea of a fun day is helping IT and business professionals learn to speak each other’s highly specialized languages.
What is Differential Privacy? Differential privacy is a mathematical framework for determining a quantifiable and adjustable level of privacy protection....
Margaret RouseTechnology Expert
What are Tactics, Techniques, and Procedures (TTPs)? Tactics, techniques, and procedures (TTPs) are the strategic plans, methodologies, and actions an...
What is a Security Posture? Security posture definition refers to the ability an organization has to protect its information technology...
Trending NewsLatest GuidesReviewsTerm of the Day