As an IP-based blocklist, the TechTheft Other Blacklist automatically lists addresses for generally problematic behavior like port scanning, distinct from spam or virus activity, making it a high-collateral-damage blacklist intended only for scoring email.
The TechTheft Other Blacklist is a private, automatically managed IP-based blocklist. It lists IP addresses that exhibit generally malicious behavior detected through server and firewall logs. This blacklist (or blocklist) is not focused on traditional spam activity but rather on other forms of network abuse.
According to its operators, the policy is to automatically list IPs for actions like scanning unusual ports or sending data that violates standard protocols. Due to its automated nature and broad criteria, the list is noted as having a high risk of collateral damage. For this reason, its intended use is for scoring or tagging inbound mail, not for outright blocking. Access to this blacklist is private and by invitation only.
The types of internet assets that can be listed include:
The blocklist is run by an organization called TechTheft. Their mission is to combat what they term "Hi-Technology Theft," which includes viral attacks, spam, DDoS attacks, and IP or PC hijacking. They believe that such abuse has been rampant for too long and that a more aggressive solution is needed.
TechTheft's philosophy stems from the history of other anti-spam efforts. They argue that early open-source blocklists became vulnerable to legal action, while subsequent anonymous systems were too slow to counter the collaboration between spammers and virus writers. In response, TechTheft advocates for what they call an "Internet Death Penalty" against all sources and supporters of abuse, aiming to cut off malicious activity at its source rather than just filtering it.
Removal from the TechTheft Other Blacklist has both automatic and manual pathways. An IP address is automatically removed from the blacklist 120 days after the last malicious activity was detected.
For a manual removal request, the quarantine period can potentially be reduced to 15 days. However, before requesting delisting, you must take corrective action. If the abusive behavior continues after a manual removal, the IP address will be added back to the blocklist. There is no public delisting form; the process is tied to resolving the underlying issues.
The impact of being on the TechTheft Other Blacklist is generally considered low. This is primarily because it is a private list, available only to a select group of subscribers by invitation. It is not a public blacklist that any mail server administrator can freely use to filter email.
Furthermore, the operators explicitly state that the blocklist should only be used for tagging messages or for scoring systems due to the high risk of "collateral damage" (false positives). They advise against using it to block emails outright. This policy means a listing is more likely to cause your emails to be sent to the spam folder rather than being rejected completely, thus limiting its overall impact on your email deliverability.
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
Organization
Zone
Type
Impact
Delisting
19 resources
Do blacklists exist for newly registered domain names?
Should I use blacklist or blocklist in email marketing?
What are examples of insignificant or ineffective email blocklists?
What are the best blocklist monitoring services that offer timely alerts and customization options?
What is the distinction between Abusix 'black' and 'black_css' abuse lists?
What is the impact of being on the UCEPROTECTL3 blacklist and how to deal with it?