Net::RBLClient - Queries multiple Realtime Blackhole Lists in parallel
use Net::RBLClient; my $rbl = Net::RBLClient->new; $rbl->lookup('188.8.131.52'); my @listed_by = $rbl->listed_by;
This module is used to discover what RBL's are listing a particular IP address. It parallelizes requests for fast response.
An RBL, or Realtime Blackhole List, is a list of IP addresses meeting some criteria such as involvement in Unsolicited Bulk Email. Each RBL has its own criteria for addition and removal of addresses. If you want to block email or other traffic to/from your network based on one or more RBL's, you should carefully study the behavior of those RBL's before and during such blocking.
max_time + timeoutseconds. Max_time need not be integer. Of course, if the lookup returns due to max_time, some DNS replies will be missed.
Default: 8 seconds.
max_timeis decreased to a small value.
Default: 1 second.
max_hitshits are received,
lookup()returns immediately. This lets the calling program save time.
Default: 1000 (effectively out of the picture).
max_repliesreplies have been received.
By default, the first nameserver in /etc/resolv.conf will be used.
listed_by(). If the RBL returned an A record, the value for that key will be the IP address in the A record - typically 127.0.0.1 - 127.0.0.4. If the RBL returned a CNAME, the value will be the hostname, typically used for a comment on why the IP address is listed.
listed_by(). If the RBL returned TXT records containing additional information, the value will contain this information (several TXT records from one RBL will be joined by semicolons, but this should not happen), if not, it will be perlfunc/undef.
Asher Blum <firstname.lastname@example.org>
Martin H. Sluka <email@example.com>
Copyright (C) 2002 Asher Blum. All rights reserved. This code is free software; you can redistribute it and/or modify it under the same terms as Perl itself.