Skip to content

Unsubscore / Lashback Details (


Status: Active
Terms: Free
Zones: 1

Background, whose parent company is LashBack uses what is called an unsubscribe intelligence database for the creation and maintenance of it’s DNS blacklist. LashBack has been in operation since 2003. Spammers deploy what are known as suppression lists, also known as unsubscribe forms. When a spam is sent with a link to unsubscribe you address from the mailing, your address should in theory be removed. Often times, the opposite happens, and your address is then considered more valuable, and resold to other spammers as a known deliverable address. has systems in place that will use trackable email addresses to unsubscribe from the suppressions lists. Over time, they can track which suppressions lists are good, and which are actually sharing their suppression lists with other spammers. When this type of activity is apparent, the IP address of the sender is added to the DNS blacklist.

Listing criteria

LashBack uses 4 criteria when monitoring unsubscribe compliance.

  1. Which senders fail to provide a working unsubscribe mechanism
  2. Which senders do not honor unsubscribe requests within 10 business days
  3. Which senders allow consumers unsubscribe request to be abused (i.e., shared with other parties to send more spam)
  4. Which senders are taking suppression lists from other organizations and sending email to these lists

Criteria 1, 2, and 3 are used for internal purposes, as well as research. The data from criteria 1 through 3 can usually be obtains by making a request to LashBack’s support system. Only criteria 4 is used for the moderation of the actual DNS blacklist.


Like all other DNS blacklists, to use the LashBack DNSBL, a query is made against The criteria are to send in the reverse IP of the sending server, appending on the zone. In the case of, you will be looking for a specific response on, which means, that sender has been seen abusing unsubscribe data.

Removal Process

At this time, does not give any data on the process by which you can have your IP address removed. There is however, a IP based removal form, that if your IP is listed, should have instructions on who to contact in an effort to have your IP removed. Given that only lists the most egregious of offenders, removal may not be a top priority.

Related Articles

Related Articles

  • All
  • Easy Prey Podcast
  • General Topics
  • Home Computing
  • IP Addresses
  • Networking
  • Online Privacy
  • Online Safety
Image of a man standing next to a huge brain

Here’s How to Choose a VPN: Don’t Overthink It and It’ll Be Fine

We're not all IT (internet technology) types, but don't tell that to VPN review sites! They make...

[Read More]

Email Scams 101: How To De-Code Sketchy Emails

Why are they dangerous? Because most, if not all, of our accounts, are tied to our email….

[Read More]
Scammers are Everywhere! Who You Gonna Call?

SCAM PREVENTION: Call a Good Friend BEFORE You Get Scammed!

Make someone in the family the point-person to stop a scam in progress. Scam prevention tactics are…

[Read More]

How a Scam Works: It’s All in the Formula and You’re an Ingredient.

A scam works (for the con artist) when all the elements come together just right.

[Read More]
Scam Savy

Avoid a Scam and Stay Safe With these 8 Simple Tricks

Scammers have a bag of tricks to try to separate you from your money. However, you can...

[Read More]
Cyber Crime

The Top Scams Aren’t Going Away Anytime Soon

Some aren't only victims of scams, there also victims of circumstance. They may lose their job and...

[Read More]