{"id":600,"date":"2015-05-26T11:23:35","date_gmt":"2015-05-26T16:23:35","guid":{"rendered":"https:\/\/nodored.com\/blog\/?p=524"},"modified":"2022-06-23T09:38:34","modified_gmt":"2022-06-23T14:38:34","slug":"que-es-una-rbl","status":"publish","type":"post","link":"https:\/\/gigacore.io\/docs\/que-es-una-rbl\/","title":{"rendered":"\u00bfQu\u00e9 es una RBL? | Realtime Blackhole List"},"content":{"rendered":"<p>RBL es el acr\u00f3nimo de \u00abRealtime Blackhole List\u00bb (Lista de agujeros negros en tiempo real), es un listado de IP&#8217;s que son detectadas como posibles amenazas de spam, o que han sido detectadas enviando spam. Estos listados pueden ser consultados (Aquellos que son gratuitos) por servidores de correo en tiempo real, y si se detecta un mail proveniente de una IP que est\u00e9 en estas listas el correo es bloqueado (Se produce un rebote).<\/p>\n<blockquote>\n<p><strong>RECOMENDADO: <a href=\"https:\/\/gigacore.io\/docs\/3-formas-en-que-una-cuenta-de-correo-destruye-la-credibilidad-de-tu-negocio\/\" target=\"_blank\" rel=\"noopener\">3 Formas en que una cuenta de correo destruye la credibilidad de tu negocio<\/a><\/strong><\/p>\n<\/blockquote>\n<p>Usualmente estas listas son elaboradas por grupos y se puedes usar de manera gratuita, pero hay que saber muy bien cuales son los criterios de las decenas de listas que existen, ya que hay muchas que son tan dr\u00e1sticas terminan bloqueando IP&#8217;s que no env\u00edan spam.<\/p>\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-text-color has-background is-layout-flow wp-block-group-is-layout-flow\" style=\"background-color:#ebf2fa;color:#000000\">\n<div style=\"height:64px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:20px;line-height:.9\"><strong>\u00a1Que tus correos no reboten por aplicar malas pr\u00e1cticas!<\/strong><\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\" id=\"schedule-a-visit\" style=\"font-size:40px;line-height:1.15\"><strong>Gestiona tus correos de manera profesional<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-03627597 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50 has-custom-font-size\" style=\"font-size:20px\"><a class=\"wp-block-button__link has-text-color has-background\" href=\"https:\/\/nodored.com\/email.php\" style=\"border-radius:0px;background-color:#022268;color:#ffffff\" target=\"_blank\" rel=\"noreferrer noopener\">CONSULTA NUESTROS PLANES<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:64px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Una RBL por sus sigas en Ingles (Realtime Blackhole List) es un listado de IPs que son detectadas como posibles amenazas de spam, o que han sido detectados enviando spam.<\/p>\n","protected":false},"author":3073,"featured_media":61482,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[62,53,60],"tags":[3358,3367,63],"class_list":["post-600","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad","category-email","category-spam","tag-ciberseguridad","tag-email","tag-spam"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00bfQu\u00e9 es una RBL? | Realtime Blackhole List - Documentacion Gigacore<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/aprende.gigacore.io\/que-es-una-rbl\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfQu\u00e9 es una RBL? | Realtime Blackhole List - Documentacion Gigacore\" \/>\n<meta property=\"og:description\" content=\"Una RBL por sus sigas en Ingles (Realtime Blackhole List) es un listado de IPs que son detectadas como posibles amenazas de spam, o que han sido detectados enviando spam.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aprende.gigacore.io\/que-es-una-rbl\/\" \/>\n<meta property=\"og:site_name\" content=\"Documentacion Gigacore\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/gigacore.io\" \/>\n<meta property=\"article:published_time\" content=\"2015-05-26T16:23:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-23T14:38:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aprende.gigacore.io\/wp-content\/uploads\/2015\/05\/que-es-una-rbl-realtime-blackhole-list-nodored.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alexis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/que-es-una-rbl\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/que-es-una-rbl\\\/\"},\"author\":{\"name\":\"Alexis\",\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/#\\\/schema\\\/person\\\/7feb6a17d7f57a767169bd3c83225b2d\"},\"headline\":\"\u00bfQu\u00e9 es una RBL? | Realtime Blackhole List\",\"datePublished\":\"2015-05-26T16:23:35+00:00\",\"dateModified\":\"2022-06-23T14:38:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/que-es-una-rbl\\\/\"},\"wordCount\":165,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/que-es-una-rbl\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/gigacore.io\\\/docs\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/que-es-una-rbl-realtime-blackhole-list-nodored.png\",\"keywords\":[\"Ciberseguridad\",\"Email\",\"Spam\"],\"articleSection\":[\"Ciberseguridad\",\"Email\",\"Spam\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/aprende.gigacore.io\\\/que-es-una-rbl\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/que-es-una-rbl\\\/\",\"url\":\"https:\\\/\\\/aprende.gigacore.io\\\/que-es-una-rbl\\\/\",\"name\":\"\u00bfQu\u00e9 es una RBL? | Realtime Blackhole List - Documentacion Gigacore\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/que-es-una-rbl\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/que-es-una-rbl\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/gigacore.io\\\/docs\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/que-es-una-rbl-realtime-blackhole-list-nodored.png\",\"datePublished\":\"2015-05-26T16:23:35+00:00\",\"dateModified\":\"2022-06-23T14:38:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/que-es-una-rbl\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/aprende.gigacore.io\\\/que-es-una-rbl\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/que-es-una-rbl\\\/#primaryimage\",\"url\":\"https:\\\/\\\/gigacore.io\\\/docs\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/que-es-una-rbl-realtime-blackhole-list-nodored.png\",\"contentUrl\":\"https:\\\/\\\/gigacore.io\\\/docs\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/que-es-una-rbl-realtime-blackhole-list-nodored.png\",\"width\":1000,\"height\":250,\"caption\":\"qu\u00e9 es una rbl realtime blackhole list nodored\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/que-es-una-rbl\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/aprende.gigacore.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfQu\u00e9 es una RBL? | Realtime Blackhole List\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/#website\",\"url\":\"https:\\\/\\\/aprende.gigacore.io\\\/\",\"name\":\"Documentacion Gigacore\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/aprende.gigacore.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/#organization\",\"name\":\"Gigacore\",\"url\":\"https:\\\/\\\/aprende.gigacore.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/gigacore.io\\\/docs\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/cropped-cropped-cropped-aprende.png\",\"contentUrl\":\"https:\\\/\\\/gigacore.io\\\/docs\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/cropped-cropped-cropped-aprende.png\",\"width\":444,\"height\":111,\"caption\":\"Gigacore\"},\"image\":{\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/gigacore.io\",\"https:\\\/\\\/youtube.com\\\/@gigacore-io\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/#\\\/schema\\\/person\\\/7feb6a17d7f57a767169bd3c83225b2d\",\"name\":\"Alexis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/gigacore.io\\\/docs\\\/wp-content\\\/litespeed\\\/avatar\\\/a1656afde93f7d145dac822480506dcf.jpg?ver=1777431363\",\"url\":\"https:\\\/\\\/gigacore.io\\\/docs\\\/wp-content\\\/litespeed\\\/avatar\\\/a1656afde93f7d145dac822480506dcf.jpg?ver=1777431363\",\"contentUrl\":\"https:\\\/\\\/gigacore.io\\\/docs\\\/wp-content\\\/litespeed\\\/avatar\\\/a1656afde93f7d145dac822480506dcf.jpg?ver=1777431363\",\"caption\":\"Alexis\"},\"description\":\"CTO | Director de Operaciones y Tecnolog\u00eda en NODORED.COM\",\"sameAs\":[\"https:\\\/\\\/gigacore.io\\\/docs\"],\"url\":\"https:\\\/\\\/gigacore.io\\\/docs\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfQu\u00e9 es una RBL? | Realtime Blackhole List - Documentacion Gigacore","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/aprende.gigacore.io\/que-es-una-rbl\/","og_locale":"es_ES","og_type":"article","og_title":"\u00bfQu\u00e9 es una RBL? | Realtime Blackhole List - Documentacion Gigacore","og_description":"Una RBL por sus sigas en Ingles (Realtime Blackhole List) es un listado de IPs que son detectadas como posibles amenazas de spam, o que han sido detectados enviando spam.","og_url":"https:\/\/aprende.gigacore.io\/que-es-una-rbl\/","og_site_name":"Documentacion Gigacore","article_publisher":"https:\/\/www.facebook.com\/gigacore.io","article_published_time":"2015-05-26T16:23:35+00:00","article_modified_time":"2022-06-23T14:38:34+00:00","og_image":[{"width":1000,"height":250,"url":"https:\/\/aprende.gigacore.io\/wp-content\/uploads\/2015\/05\/que-es-una-rbl-realtime-blackhole-list-nodored.png","type":"image\/png"}],"author":"Alexis","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Alexis","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/aprende.gigacore.io\/que-es-una-rbl\/#article","isPartOf":{"@id":"https:\/\/aprende.gigacore.io\/que-es-una-rbl\/"},"author":{"name":"Alexis","@id":"https:\/\/aprende.gigacore.io\/#\/schema\/person\/7feb6a17d7f57a767169bd3c83225b2d"},"headline":"\u00bfQu\u00e9 es una RBL? | Realtime Blackhole List","datePublished":"2015-05-26T16:23:35+00:00","dateModified":"2022-06-23T14:38:34+00:00","mainEntityOfPage":{"@id":"https:\/\/aprende.gigacore.io\/que-es-una-rbl\/"},"wordCount":165,"commentCount":0,"publisher":{"@id":"https:\/\/aprende.gigacore.io\/#organization"},"image":{"@id":"https:\/\/aprende.gigacore.io\/que-es-una-rbl\/#primaryimage"},"thumbnailUrl":"https:\/\/gigacore.io\/docs\/wp-content\/uploads\/2015\/05\/que-es-una-rbl-realtime-blackhole-list-nodored.png","keywords":["Ciberseguridad","Email","Spam"],"articleSection":["Ciberseguridad","Email","Spam"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/aprende.gigacore.io\/que-es-una-rbl\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/aprende.gigacore.io\/que-es-una-rbl\/","url":"https:\/\/aprende.gigacore.io\/que-es-una-rbl\/","name":"\u00bfQu\u00e9 es una RBL? | Realtime Blackhole List - Documentacion Gigacore","isPartOf":{"@id":"https:\/\/aprende.gigacore.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/aprende.gigacore.io\/que-es-una-rbl\/#primaryimage"},"image":{"@id":"https:\/\/aprende.gigacore.io\/que-es-una-rbl\/#primaryimage"},"thumbnailUrl":"https:\/\/gigacore.io\/docs\/wp-content\/uploads\/2015\/05\/que-es-una-rbl-realtime-blackhole-list-nodored.png","datePublished":"2015-05-26T16:23:35+00:00","dateModified":"2022-06-23T14:38:34+00:00","breadcrumb":{"@id":"https:\/\/aprende.gigacore.io\/que-es-una-rbl\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aprende.gigacore.io\/que-es-una-rbl\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/aprende.gigacore.io\/que-es-una-rbl\/#primaryimage","url":"https:\/\/gigacore.io\/docs\/wp-content\/uploads\/2015\/05\/que-es-una-rbl-realtime-blackhole-list-nodored.png","contentUrl":"https:\/\/gigacore.io\/docs\/wp-content\/uploads\/2015\/05\/que-es-una-rbl-realtime-blackhole-list-nodored.png","width":1000,"height":250,"caption":"qu\u00e9 es una rbl realtime blackhole list nodored"},{"@type":"BreadcrumbList","@id":"https:\/\/aprende.gigacore.io\/que-es-una-rbl\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/aprende.gigacore.io\/"},{"@type":"ListItem","position":2,"name":"\u00bfQu\u00e9 es una RBL? | Realtime Blackhole List"}]},{"@type":"WebSite","@id":"https:\/\/aprende.gigacore.io\/#website","url":"https:\/\/aprende.gigacore.io\/","name":"Documentacion Gigacore","description":"","publisher":{"@id":"https:\/\/aprende.gigacore.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aprende.gigacore.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/aprende.gigacore.io\/#organization","name":"Gigacore","url":"https:\/\/aprende.gigacore.io\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/aprende.gigacore.io\/#\/schema\/logo\/image\/","url":"https:\/\/gigacore.io\/docs\/wp-content\/uploads\/2024\/06\/cropped-cropped-cropped-aprende.png","contentUrl":"https:\/\/gigacore.io\/docs\/wp-content\/uploads\/2024\/06\/cropped-cropped-cropped-aprende.png","width":444,"height":111,"caption":"Gigacore"},"image":{"@id":"https:\/\/aprende.gigacore.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gigacore.io","https:\/\/youtube.com\/@gigacore-io"]},{"@type":"Person","@id":"https:\/\/aprende.gigacore.io\/#\/schema\/person\/7feb6a17d7f57a767169bd3c83225b2d","name":"Alexis","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/gigacore.io\/docs\/wp-content\/litespeed\/avatar\/a1656afde93f7d145dac822480506dcf.jpg?ver=1777431363","url":"https:\/\/gigacore.io\/docs\/wp-content\/litespeed\/avatar\/a1656afde93f7d145dac822480506dcf.jpg?ver=1777431363","contentUrl":"https:\/\/gigacore.io\/docs\/wp-content\/litespeed\/avatar\/a1656afde93f7d145dac822480506dcf.jpg?ver=1777431363","caption":"Alexis"},"description":"CTO | Director de Operaciones y Tecnolog\u00eda en NODORED.COM","sameAs":["https:\/\/gigacore.io\/docs"],"url":"https:\/\/gigacore.io\/docs\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/gigacore.io\/docs\/wp-json\/wp\/v2\/posts\/600","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gigacore.io\/docs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gigacore.io\/docs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gigacore.io\/docs\/wp-json\/wp\/v2\/users\/3073"}],"replies":[{"embeddable":true,"href":"https:\/\/gigacore.io\/docs\/wp-json\/wp\/v2\/comments?post=600"}],"version-history":[{"count":0,"href":"https:\/\/gigacore.io\/docs\/wp-json\/wp\/v2\/posts\/600\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gigacore.io\/docs\/wp-json\/wp\/v2\/media\/61482"}],"wp:attachment":[{"href":"https:\/\/gigacore.io\/docs\/wp-json\/wp\/v2\/media?parent=600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gigacore.io\/docs\/wp-json\/wp\/v2\/categories?post=600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gigacore.io\/docs\/wp-json\/wp\/v2\/tags?post=600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}