Generator Labs monitors several of the most widely used DNS security filters as part of its RBL and threat intelligence coverage. If one of your domains or IP addresses gets flagged by a DNS filter, you'll see exactly which service blocked it and what you need to do to get removed.

How Does DNS Filtering Work?

DNS filtering (also called DNS blocking) prevents access to websites, web applications, or IP addresses that have been flagged as malicious or otherwise unwanted. The most common reasons for being flagged are hosting malware or phishing content. Some filters also cover adult content, allowing organizations to restrict access to certain categories of websites.

When a user on a DNS-filtered network tries to visit a flagged site, they see either a generic "page not found" error or a specific block page from the filter provider. A single flagging can cut off visibility to tens of millions of users, which translates quickly into lost traffic and lost revenue.

Can Users Bypass DNS Filtering?

In most cases, yes. Switching DNS servers to something like Google Public DNS (8.8.8.8) or Cloudflare (1.1.1.1) bypasses these filters, assuming the ISP doesn't restrict that. But the average internet user doesn't know how to do this, or even what DNS is. From their perspective, the site simply doesn't load, or the app has stopped working. That's what makes DNS security filters so effective at limiting access to flagged content.

How Generator Labs Monitors DNS Filters

Generator Labs checks your hosts against the most widely used DNS security filters, including:

While checking your domains and IP addresses against hundreds of RBLs and URIBLs, we also run checks against these DNS security filters. If any of your hosts are being actively blocked or redirected, you'll get an alert with the details you need to get removed. See the DNS Security Filters documentation for details on enabling this in your account.

Sign up for Generator Labs and find out if your sites are being filtered.

Back to Blog