Polspam BL-H3
Status: | Active |
---|---|
Website: | polspam.pl |
Removal: | polspam.pl/dlst.php |
RBL polspam.pl does not ban anyone. Neither does it block anyone from sending and/or receiving e-mails. RBL polspam.pl is only there to inform other MTA administrators about the given address, class or ASN that seems to take part in spamming. It’s the MTA administrators’ jobs to decide what to do with this information.
Listing Policy
bl-h3.rbl.polspam.pl lists IPv4 addresses and ASN level 3. RBL polspam.pl blacklists list a host domain, its IP address and its address classes or whole ASN if any of the following activities has been detected:
- Independent sending of spam. The operator’s domain or IP addresses belonging to the operator’s domain may send spam on their own for the purpose of self-advertising or on behalf of third parties, trademarks, third-party services, etc.
- Lack of network supervision. This includes, but isn’t limited to: providing infrastructure to spam, (intentional or otherwise) help in sending out spam, owning computers with a lot of viruses, owning www. domains with viruses (without any effort to get rid of said viruses).
- The sending of spam by a host’s client(s). An operator’s domain can be used as an SMTP server by any of its clients. Very often, then, the main hosting domain happens to also be an email server for its own clients. If one client gets blacklisted, all of the email servers they use will also get blacklisted.
- Receiving e-mail responses to spam sent from third-party servers. Often, spam is sent from beyond the borders of the target country, however victims’ responses are supposed to be sent to e-mail accounts located in the hosting operator’s infrastructure. In this way, spammers hide the fact that millions of e-mails are being sent every day.
- Hosting of spam-related domains, including spam requests, but not local email services. The hosting company itself and the hosting client do not send or receive e-mails at all, but the hosting infrastructure includes spammers’ ‘websites or landing pages, phishing victims’ data and redirects it to other websites. Once again- In this way, spammers hide the fact that millions of e-mails are being sent out, encouraging people to visit specific websites.
- Outsourcing of spam. This includes domains that advertise spam-related services on order, ways to send out emails en masse. These are called SMTP services.
- Use of rented address classes with BGP-level routing redirection. Sometimes, spammers borrow IP address classes from third parties and, at the BGP routing level, place them in the data centers of different hosting companies. In this case, these classes, the domains within them, and the ASN of the new hosting domain may be blacklisted. This is however a much more elaborate and advanced way to provide spamming infrastructure.