Truncate is very conservative. On most systems it can be safely used to reject connections!
The truncate zone is: truncate.gbudb.net
Q: What is returned for a bad IP?
Q: What IPs are listed in truncate?
A: Message sources that produce exclusively (> 95%) spam and malware as seen by the worldwide network of Message Sniffer scanning engines.
Q: How do I submit IPs for truncate?
A: You cannot. IPs are listed in truncate automatically based on data from GBUdb.
Q: What is GBUdb?
A: GBUdb is a real-time, collaborative IP reputation system that is built into Message Sniffer.
Q: How do I get an IP removed from truncate?
A: You cannot. IPs are removed automatically when the statistics change. If a system stops sending bad messages it's IP will be removed automatically.
Q: Do I need to use Message Sniffer to get / stay off of Truncate?
A: NO! We do recommend that you use some kind of outbound message scanning to detect and prevent abuse. Message Sniffer is an excellent choice but you could use any tool you wish. For example, Spam Assassin is ubiquitous and free.
Q: I fixed the problem. How long does it take for an IP to be removed from truncate?
A: If the event was severe and a lot of bad messages were detected then it can take a week or more for the statistics to degrade enough for the IP to be removed. If the event was smaller then it might take only a couple of days. This assumes that no "good" messages are detected to offset these statistics. If good messages are detected from an IP by a system running Message Sniffer then the statistics will be offset much more quickly.
Q: Do you provide or recommend any tools to resolve or prevent truncate listings?
A: Upon request we may be able to put a trace on the IP to monitor GBUdb events. If GBUdb nodes are still "discussing" the IP then we can provide you with statistical data about these events along with UTC timestamps to help you track down the source of the problem. Beyond that we can recommend that you use Message Sniffer to protect your system from inbound spam and malware that might infect your customers or be forwarded by them; and also possibly for outbound message scanning to prevent abusive messages from escaping your system.