Do not send e-mail to me!


URIBL based on SPFBL

The abuse database is collected from our customers and contributors, where complaints are made by their own recipients and processed by our URIBL server, which returns:


  • listed for inappropriate use of the URL, such as phishing or used by spammer.




To collaborate with this list, please forward the message to if you receive any SPAM or phishing. We will process any complaint sent to this address.


IMPORTANT: We do not provide any guarantees, despite the best efforts to maintain a stable and coherent system. Use at your own risk and take into consideration that our systems works based on complains, without privileges to any system, including Internet providers and email marketing systems. For this reason, we suggest you use our URIBL to mark emails as spam, rather than by rejecting emails. Check your MTA documentation for details or, if it is not feasible, consider using rspamd (see below).


IMPORTANT: Current limit is 100 ms per IP block. Lower frequencies require contribution. Please contact us informing your IP or range, for further details.

Domain queries on rspamd


Create a file called /etc/rspamd/local.d/surbl.conf with this:

rules {
suffix = "";
resolve_ip = false;
ips {

in /etc/rspamd/local.d/metrics.conf add

symbol "URIBL_SPFBL" {
weight = 1;
score = 2.5;

Sophisticated script query


Some spammers and fraudsters use URL shorteners to hide the actual identity of your website from conventional URIBLs. To solve this problem, we created this URIBL query script:


Although they use shorteners, the query at our URIBL always considers the last URL of a redirection chain:

ubuntu:~$ ./ is listed in ''.

The script can be used to scan an HTML file by checking each href of this file.

ubuntu:~$ ./ test.html is listed in ''.

The script will return 0 for unlisted and 1 for listed. Adapt this script to your needs.