DOCUMENTATION

Comprehensive technical documentation for integrating and utilizing the DNSBL Reporting Service.

GETTING STARTED

SERVICE OVERVIEW

The DNSBL Reporting Service provides a comprehensive IPv6-first blacklist management system for tracking and reporting malicious IP addresses. The service supports multiple reporting methods including web forms, email ingestion, and X-ARF formatted reports.

KEY FEATURES

  • • Native IPv6 and IPv4 address support
  • • CIDR subnet notation for network ranges
  • • Real-time IP lookup API
  • • Automated email report processing
  • • X-ARF standard compliance (RFC 5965)
  • • Fail2Ban integration support

IP ADDRESS LOOKUP

WEB INTERFACE

Access the lookup tool at /lookup to query individual IP addresses or subnets.

Supported formats:

IPv4: 192.0.2.100

IPv6: 2001:db8::1

CIDR: 192.0.2.0/24 or 2001:db8::/32

QUERY RESULTS

Results include IP address, category, severity classification, reason for listing, reporter information, first and last report timestamps, and total report count.

SUBMITTING REPORTS

WEB FORM SUBMISSION

Use the web interface at /report for manual report submission.

Required fields:

  • • Reporter email address
  • • IP address or subnet
  • • Category classification
  • • Severity level
  • • Detailed reason

EMAIL REPORTING

Send automated reports to:

abuse@api.dnsbl.io

Email format:

  • • Subject: Include category
  • • Body: IP address and description
  • • Automated parsing enabled

X-ARF INTEGRATION

ENDPOINT

POST

https://api.dnsbl.io/api/xarf

Content-Type: application/json

EXAMPLE REQUEST

{
  "Report-ID": "XARF-2025-001",
  "Report-Type": "abuse",
  "Category": "spam",
  "Report-Date": "2025-01-15T10:30:00Z",
  "Reported-From": "security@example.com",
  "Date": "2025-01-15T10:00:00Z",
  "Source-IP": "2001:db8::bad:1",
  "Source-Port": 25,
  "Protocol": "SMTP"
}

Full X-ARF documentation and testing interface available at /xarf

FAIL2BAN INTEGRATION

ACTION SCRIPT

Configure Fail2Ban to automatically report banned IPs to the DNSBL service.

[Definition]
actionban = curl -X POST https://api.dnsbl.io/api/xarf \
  -H "Content-Type: application/json" \
  -d '{
    "Report-ID": "F2B-<ip>-<time>",
    "Report-Type": "abuse",
    "Category": "<category>",
    "Report-Date": "<date>",
    "Reported-From": "fail2ban@yourdomain.com",
    "Date": "<date>",
    "Source-IP": "<ip>"
  }'

CONFIGURATION

Add the action script to /etc/fail2ban/action.d/ and reference it in your jail configuration. Supports both IPv4 and IPv6 addresses automatically.

CATEGORY CLASSIFICATIONS

SUPPORTED CATEGORIES

  • • SPAM - Unsolicited email distribution
  • • SSH-ATTACK - SSH brute force attempts
  • • PORT-SCAN - Network port scanning
  • • DDOS - Distributed denial of service
  • • BOTNET - Botnet activity
  • • MALWARE - Malware distribution
  • • PHISHING - Phishing campaigns
  • • BRUTE-FORCE - Authentication attacks
  • • OTHER - Miscellaneous abuse

SEVERITY LEVELS

  • • LOW - Minor infractions
  • • MEDIUM - Moderate threat level
  • • HIGH - Significant security concern
  • • CRITICAL - Immediate action required