Skip to content

The Composite Blocking List


Status: Active
Terms: Free
Zones: 1


The CBL, otherwise known as The Composite Blocking List is a DNS based blacklist similar to the majority of other DNS based blacklists. The CBL does not list URL’s or URI’s, and like other DNSBL’s lists large quantities of IP addresses. Current averages of number of IP addresses in the CBL are approximately 5 million. The CBL can be used as a scoring based blacklist, or as a immediate block blacklist, where the message is dropped early on in the SMTP conversation. Administrators of the CBL recommend that it be used as an immediate block type of blacklist, and are available at all times for support via email. However, they do recommend you first use the tools on their website to try to solve any problems you may have on your own.

Listing criteria

The CBL receives its data from large spamtraps. The only IP addresses that are listed are those that have characteristics defined as open proxies. Some such characteristics are open proxies, HTTP Proxies, SOCKS Proxies, WinGate, AnalogX and dedicated custom spambots. Efforts are also taken to include email address harvesting machines, and well as machines that have been seen performing dictionary attacks. The only IP’s that are listed are those that have actively made a connection to one of the CBL listing machines. The CBL does not actively scan other machines looking for IP addresses to list.

Further, The CBL does not list open relays. It is important to understand the distinction of an open relay, and an open proxy. An open relay is a misconfigured email server that allows anonymous SMTP sending of third part email through a remote system. The CBL makes no effort to list such servers. An open proxy is generally a web server that will allow email sending to piggy back on a script that sends email. The CBL will notice and block such systems.

There are more reasons The CBL will not list and IP address than reasons that it will list an IP address. The CBL primarily exists to list infected and compromised machines. They do not list dynamic IP address space, ranges of IP addresses, known IP addresses owned by spammers, and certainly do not take suggestions for listings. As a result, it is not possible for the data in THE CBL to ever become compromised. Only CBL identified IP addresses that have been seen contacting CBL equipment, and noticed to be infected or compromised are ever listed.


The primary DNS zone for The CBL is You can perform a lookup against it in the same way you would lookup against any other DNSBL, where a positive listing will return The CBL is also available for download in full, via rsync, to members. Membership is free.

One unique aspect of The CBL is that they discourage you from querying them directly. The CBL either asks that you rsync their zone, or, though a cooperative with Spamhaus, perform your lookups there. A complete and full copy of is maintained by Spamhaus at

Removal Process

Removal from The CBL is simple; go to The CBL IP address lookup page and request that your IP address be removed. If your IP address is listed, the returned result will have instructions that explain in some detail, why you were listed, and how to go about removal. In most cases, to be delisted, you will need to secure your machine, and ask The CBL system to test your IP address again through The CBL IP address lookup page.

The CBL intentionally discloses as little information as possible about their processes in an effort to keep spammers in the dark. That which spammers do not know, can not be used in an attempt to circumvent The CBL systems.

Related Articles

Related Articles

  • All
  • Easy Prey Podcast
  • General Topics
  • Home Computing
  • IP Addresses
  • Networking
  • Online Privacy
  • Online Safety
Image of a man standing next to a huge brain

Here’s How to Choose a VPN: Don’t Overthink It and It’ll Be Fine

We're not all IT (internet technology) types, but don't tell that to VPN review sites! They make...

[Read More]

Email Scams 101: How To De-Code Sketchy Emails

Why are they dangerous? Because most, if not all, of our accounts, are tied to our email….

[Read More]
Scammers are Everywhere! Who You Gonna Call?

SCAM PREVENTION: Call a Good Friend BEFORE You Get Scammed!

Make someone in the family the point-person to stop a scam in progress. Scam prevention tactics are…

[Read More]

How a Scam Works: It’s All in the Formula and You’re an Ingredient.

A scam works (for the con artist) when all the elements come together just right.

[Read More]
Scam Savy

Avoid a Scam and Stay Safe With these 8 Simple Tricks

Scammers have a bag of tricks to try to separate you from your money. However, you can...

[Read More]
Cyber Crime

The Top Scams Aren’t Going Away Anytime Soon

Some aren't only victims of scams, there also victims of circumstance. They may lose their job and...

[Read More]