Need to Know

These are things you need to know if you are not directly responsible for a particular IP address segment or network on the blocked lists:

When you contact your ISP, provide the following:

Information for Known Spam Source List or RBL (Real-time Blackhole List)

If the IP address is in the RBL list, it may be a spam source, or supports a service that sends spam, or a multi-hop (multiple IP) open relay. If this happens, contact your ISP and provide the necessary information. For more information, refer to Blocked?.

Information for dynamically assigned IP addresses or DUL (Dynamic User List)

If you are a mail user with a standard mail client and you cannot send email because your IP address appears on the DUL list, it is probably because your mail program is set to use a mail server other than the one your current ISP provided you. But if you use a mail (SMTP) server on your own computer, or you share your Internet connection with several other people on a local network with a proxy server, and you cannot send mail because of this list, it is because your recipients cannot tell the difference between your legitimate mail delivery and a spammer's trespassing on their equipment.

In these situations, you can try to do either of the following:

Information for dynamic reputation IP addresses or QIL (Quick IP List)

The QIL database is highly dynamic and IP addresses are added as soon as the monitors detect spam involvement. This database is continuously updated with IP addresses being added and removed as their behavior warrants. Decisions to add or remove an IP are based on a combination of history and current spamming activity.

If your address is on this database, check your computer for signs of unauthorized activity. If you are running a Windows-based PC, it is highly probable that your computer has been compromised by a virus or spyware application. Running an antivirus program is certainly a good first step, but not all compromises are found even by the best antivirus programs and you may need to contact an expert. If you are running a web server, check for other unauthorized activities, such as exploitable scripts and PHP software.

You can request removal of the address from the QIL database, but be aware that it may be placed back on the database if additional spam is sent. To prevent abuse, Trend Micro Email Reputation Services limits the number of removal requests in a given period.

See Also: