The TechTheft Expanded Blacklist is a blocklist that automatically lists entire network ranges based on a high volume of automatic detections from spam and attack traps within those ranges.
The TechTheft Expanded Blacklist (bl.techtheft.info) is a semi-automatic, private IP-based blocklist. Its policy is to list entire network ranges where significant malicious activity has been automatically detected. According to its operators, the list is not available for public use and is provided only to subscribers who are invited to use the service. Additions to this blacklist are based on automatic data collection from spam and attack traps. Any internet-facing asset that interacts with their traps can be listed.
Assets that can be listed on this blocklist include:
The recommended use for this blacklist is to block traffic on sight, preferably at the firewall level. The operators do not accept public nominations to their main list.
TechTheft Expanded Blacklist is run by the TechTheft organization. Their mission is to combat what they call "Hi-Technology Theft," which includes spam, viral attacks, and other forms of network abuse. The organization was founded on the principle of taking a hardline stance against sources of malicious internet traffic.
They believe that earlier efforts by other groups were hampered by legal challenges or were too slow to react to evolving threats. TechTheft's philosophy is to implement an "Internet Death Penalty" against sources and supporters of abuse, cutting off the offense at the source rather than just filtering it. This involves blocking machines that relay email, host viruses, or act as support infrastructure for malicious actors.
Removal from the TechTheft Expanded Blacklist is an automatic process. There is no manual delisting request form. An IP address or range is removed only after all the underlying issues and open abuse complaints associated with it have been resolved. The listing is automatically removed when the last subordinate listing causing the entry is gone.
Before a delisting can occur, you must ensure you have addressed the reasons for the listing. TechTheft states that you must have a functioning abuse@ email address for your domain and IP ranges, and you must act quickly on any complaints sent to it. Resolving all active complaints is the key to removal from this particular blacklist.
If you find your IP listed, TechTheft indicates that information about the open complaints may be available on their site or through public newsgroup archives related to network abuse.
The impact of being on the TechTheft Expanded Blacklist is generally low for most senders. This is because the blacklist is not public. It is a private list available only to the organization's trusted subscribers by invitation.
While a listing should still be taken seriously, your email deliverability will only be affected if you are sending to a recipient whose organization subscribes to this specific blocklist. The impact is not widespread across major mailbox providers.
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
19 resources
Should I use blacklist or blocklist in email marketing?
Should I worry about being on UCEPROTECTL2 or UCEPROTECTL3 blocklists?
What are examples of insignificant or ineffective email blocklists?
What are the best blocklist monitoring services that offer timely alerts and customization options?
What is the distinction between Abusix 'black' and 'black_css' abuse lists?
What is the impact of being on the UCEPROTECTL3 blacklist and how to deal with it?