Lucy Awareness
Visit our WebsiteContact Support
  • Wiki Overview
  • Guides
    • Quick Guides
      • Create Your First Campaign
        • Adding a New Client
        • Register an Attack Domain
        • Campaign Setup
          • Selecting an Attack
          • Attack Settings
          • Awareness Settings
          • Recipients
          • Review
        • Whitelisting
    • Installing Lucy
      • On-Premise vs Cloud Installation
      • Architecture
      • Hardware Requirements
      • Network Communication
      • Installing Lucy
      • Post Installation
    • Manage Blacklisted Domains
      • Managing Google SafeBrowsing Alerts
    • Whitelisting a Lucy Server
      • Google Workspace Whitelisting
      • Microsoft O365 Whitelisting
      • File Attack Whitelisting
    • Attack Simulations
      • Attack Types
        • Data Entry Attack
        • Hyperlink Attack
        • File Attack
        • Portable Media
        • Smishing
        • Lures
        • QR Codes
        • Ransomware Emulation
        • Technical Malware Test
          • Malware Toolkit Test Suite
        • Mail & Web Filter Test
        • Email Spoofing Test
      • Attack Template Customization
      • Firewall Protection Interval
      • Email Tracking Technologies
      • Advanced Information Gathering
      • Regular Expressions in Login Fields
      • Copy a Website
      • Redirecting Users
    • Awareness Training
      • Awareness Template Customization
      • Awareness Only Campaigns
        • Using Multiple Awareness Trainings
      • Use extended method of tracking the end of the quiz
    • Reporting Plugin
      • Deploying Office 365
      • Deploying Outlook Native
      • Deploying Gmail
  • Application Screens Reference
    • Statistics Dashboard
    • Campaigns Dashboards
    • Campaigns
      • New Campaign
        • Wizard Mode
          • Selecting an Attack
          • Attack Settings
          • Awareness Settings
          • Recipients
          • Review
        • Expert Mode
      • Campaign Settings
        • Configuration
          • Base Settings
          • Awareness Settings
          • Attack Settings
          • Schedule
            • Schedule Plan
          • Recipients
        • Advanced Settings
          • User Settings
          • Filters
          • Custom Fields
          • Reminders
        • Campaign Checks
        • Logs
        • Results
          • Summary
          • Statistics
          • Reports
          • Exports
    • Templates
      • Attack Templates
      • Awareness Templates
      • File Templates
      • Report Templates
      • Campaign Templates
      • Training Diploma
      • Download templates
      • Variables in Lucy
    • Users
      • Recipient Groups
      • End Users
      • End User Portal Settings
      • Administrative Users
      • Reputation Levels
    • Settings
      • Common System Settings
        • Domains
          • Supported TLDs
        • Firewall
        • Web Proxy
        • Mail Settings
        • SMTP Servers
        • SSL Settings
          • SSL for Campaigns
        • SMS Settings
        • Filter Settings
        • API Whitelist
          • API Routes
        • LDAP Servers
          • LDAP Sync Tool
        • LDAP Settings
        • Azure Applications
        • Azure AD Settings
        • SSO Configuration
      • Advanced System Settings
        • Advanced Settings
        • SSH Password
      • Submitted Email Settings
        • Custom Rules & Score Factors
        • Abuse Reports
        • Incident Autoresponder
        • Plugin Settings
      • Clients
        • Client Invoices
        • Client Invoice Settings
      • Backup and Restore
        • Backup Settings
      • Benchmark Sectors
      • Whitelabeling
      • File Browser
    • Incidents
    • Support
      • Status
        • Status
        • System Monitoring
        • System Health Check
        • Notifications
      • System Tests
        • Test Email
        • Performance Test
        • Spam Test
        • Mail Spoofing Test
        • Mail and Web Filter Test
      • System Logs
      • Manual
      • Update
      • Reboot
      • Mail Manager
      • Terms & Conditions
    • Account Settings
      • Two Factor Authentication
      • License
      • Invoices
    • Notifications
  • Release Notes
    • 5.4
    • 5.3.5
    • 5.3.4
    • 5.3.3
    • 5.3.2
    • 5.3.1
    • 5.3
    • 5.2.1
    • 5.2
    • 5.1
    • 5.0
    • Version 4
      • 4.14
      • 4.13
      • 4.12.1
      • 4.11
      • 4.10.1
      • 4.9.5
      • 4.9.2
      • 4.9.1
  • Legal
    • EULA
    • Privacy Policy
    • DPA, Customer and Partner Info
    • Service Level Agreement
    • Confidentiality of Campaign Data
  • When to Contact Us
    • Contact Technical Support
Powered by GitBook
On this page
  • Identify Vendors That Have Blacklisted Your Domain
  • Delisting a Blacklisted Domain

Was this helpful?

  1. Guides

Manage Blacklisted Domains

PreviousPost InstallationNextManaging Google SafeBrowsing Alerts

Last updated 7 months ago

Was this helpful?

Domains used in phishing simulations are evaluated using the same security mechanisms and algorithms as any other domain to determine their legitimacy. Consequently, there isn't a singular reason a domain might be blacklisted. However, adhering to best practices can significantly reduce the risk of a domain being blacklisted.

Why was my domain blacklisted?

In the context of phishing simulations using Lucy, domains can be blacklisted based on several factors. Each security vendor uses different detection mechanisms to identify malicious domains. Here are some key factors:

  1. Spoofed Brands:

    • Domains mimicking well-known brands (e.g., Google, Facebook, Microsoft) can be flagged. For example, Google’s algorithms detect visual and structural similarities to known brands to prevent phishing.

  2. Phishing Indicators:

    • If the domain hosts landing pages that solicit login credentials, personal information, or payment details, it can be flagged as a phishing site.

  3. New or Untrusted Domains:

    • Newly registered domains often lack a reputation. If these domains are used for phishing simulations, they are more likely to be blacklisted.

  4. Domain Configuration:

    • The setup of SPF, MX, and A records pointing to the Lucy server is scrutinized. Misconfigurations or anomalies in these records can trigger blacklisting. Checks are done for alignment with typical usage patterns and legitimate email configurations.

  5. SSL Certificates:

    • Even with valid SSL certificates, if the domain shows signs of misuse or if the certificates are not from well-known Certificate Authorities, the domain can be flagged.

  6. Malware Distribution:

    • If the domain inadvertently hosts or distributes malware (e.g., through attachments or linked downloads), it will be blacklisted. Landing pages can be scanned for malicious software and scripts.

  7. Deceptive Content:

    • Inspecting content that is intentionally deceptive or misleading, designed to trick users into performing unsafe actions. This includes fake warnings, alerts, and instructions.

  8. Suspicious Behavior Patterns:

    • High volumes of emails sent from the domain, especially those resembling phishing emails, can raise red flags. Monitoring is done for sending patterns and email content for suspicious activities.

  9. User Reports:

    • If users report the domain as suspicious or harmful, Google/Microsoft will take these reports into consideration. High numbers of user complaints can lead to a domain being blacklisted.

  10. Embedded Links and Redirects:

    • Checks are implemented for suspicious links and redirects within the domain. If the site redirects to known malicious or phishing sites, it can be flagged.

What can I do to prevent Blacklisting?

To minimize the risk of your newly spoofed domains being blacklisted when conducting phishing simulations with content related to known brands like Google, Facebook, and Microsoft, follow these best practices:

Choose Reputable Domain Providers:

  • Register your domains with well-known and reputable domain providers. This helps establish initial trust. You can use the built-in for registration with GoDaddy.

Set Up Proper DNS Records:

  • Ensure your SPF, DKIM, and DMARC records are correctly configured to authenticate your emails.

  • v=spf1 ip4:{your_lucy_ip_address} ~all
  • default._domainkey IN TXT "v=DKIM1; k=rsa; p=<public_key>"
  • Example DMARC record:

    _dmarc IN TXT "v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com"

See our platform reference article on

Implement HTTPS:

  • Use SSL/TLS certificates from reputable Certificate Authorities (CAs) to secure your domains. Use the built-in for your domains.

Regularly Update Your DNS Records:

  • Keep your DNS records up-to-date and ensure there are no misconfigurations.

Content and Email Practices:

Avoid Exact Brand Imitation:

  • Avoid replicating the exact appearance of well-known brands like Google, Facebook, or Microsoft. Introduce subtle changes to the email and landing pages to prevent detection by algorithms.

Use Clear Disclaimers:

  • Include disclaimers in your emails and landing pages stating that they are part of a security awareness program.

Limit Email Volume:

  • Send your phishing simulation emails in small batches to avoid triggering spam filters. Use the built-in to achieve this.

Monitor Email Content:

  • Ensure your emails do not contain elements commonly associated with spam or phishing, such as excessive links or suspicious attachments.

Test Content with Spam Checkers:

  • Use tools like Mail-Tester or Litmus to test your emails for spammy elements before sending them out.

Domain Management and Monitoring:

Warm-Up Your Domain:

  • Gradually increase your email sending volume to establish a good sending reputation. Use the built-in to achieve this.

Monitor Domain Health:

  • Use tools like to monitor your domain’s health and address any issues promptly.

Engage in Regular Clean-Up:

  • Periodically review and clean your email lists to ensure you are sending to valid addresses. Use to automatically keep your users up to date with your organization's directory.

Google Safe Browsing and User Reports:

Regularly Check for Blacklisting:

  • Periodically check your domains using tools like Google Safe Browsing to ensure they are not blacklisted.

Promptly Address User Reports:

  • Respond quickly to any user reports of suspicious activity related to your domains.

Verify and Whitelist Your Domain:

  • Verify your domain ownership with Google Search Console and request reviews if blacklisting occurs.

Legal and Ethical Considerations:

Stay Within Legal Boundaries:

  • Ensure your simulations comply with local laws and regulations regarding email communications and data privacy.

Communicate with Stakeholders:

  • Inform relevant stakeholders within your organization about the phishing simulations to avoid misunderstandings and false reports to Google.


Identify Vendors That Have Blacklisted Your Domain

You can use common tools like:

MXToolbox ->

Google SafeBrowsing ->

Virus Total ->

  • Enter your blacklisted domain

  • Make a note of all blacklisted vendors

If your domain is displaying "Deceptive Site Ahead" in Chrome, see our guide on


Delisting a Blacklisted Domain

Most vendors allow you to submit a false positive claim to remove a blacklisted domain. Each vendor has specific procedures for this. Below is a list of vendors and their respective whitelisting processes:

Vendor
Contact Email
False Positive Reporting

360

kefu@360.cn

N/A

Abusix

support@abusix.com

Acronis

virustotal-falsepositive@acronis.com

N/A

ADMINUSLabs

info@adminuslabs.net, samples@adminus.net, falsepositive@adminuslabs.net

N/A

AegisLab

support@aegislab.com

N/A

Ahnlab

e-support@ahnlab.com, samples@ahnlab.com

N/A

AILabs (Monitorapp)

aicc@monitorapp.com

N/A

Alibaba

virustotal@list.alibaba-inc.com

N/A

AliCloud

antivirus@alibabacloud.comm

N/A

AlienVault

otx-support@alienvault.com

N/A

AlphaMountain

support@alphamountain.freshdesk.com

N/A

AlphaSOC

virustotal@alphasoc.com

N/A

Alyac (Estsoft)

esrc@estsecurity.com

N/A

Antivir (Avira)

N/A

Antiy

avlsdk_support@antiy.cn

N/A

Arcabit

vt.fp@arcabit.pl

N/A

ArcSight Threat Intelligence

arcsight-virustotal@microfocus.com

N/A

AutoShun

info@autoshun.org

N/A

Avast

DL-Virus@gendigital.com

N/A

AVG

N/A

Baidu

bav@baidu.com, gaoyingchun@baidu.com

N/A

BitDefender

virus_submission@bitdefender.com

N/A

BforeAi

N/A

Bkav

fpreport@bkav.com, bkav@bkav.com

N/A

Certego

N/A

Chong Lua Dao

info@chongluadao.vn

N/A

CINS Army (Sentinel IPS)

cins@sentinelips.com

ClamAV

N/A

Clean-MX

abuse@clean-mx.de

N/A

Cluster25

threatintel@cluster25.io

N/A

CMC

PSIRT@cmccybersecurity.com

N/A

CRDF

N/A

Criminal IP (AI Spera)

support@aispera.com

N/A

CrowdStrike

VTscanner@crowdstrike.com

N/A

CSIS Security Group

abuse-reporting@csis.com

N/A

CyanSecurity

virustotal@cyansecurity.com

N/A

Cybereason

vt-feedback@cybereason.com

N/A

Cyble

cyblevt_patnership@cyble.com

N/A

Cylance

cylancefilesubmit@cylance.com

N/A

Cynet

soc@cynet.com

N/A

CyRadar

virustotal@cyradar.com

N/A

Deep Instinct

vt-fps-requests@deepinstinct.com

N/A

DNS8

dns8@layer8.pt

N/A

DrWeb

vms@drweb.com

N/A

eGambit (Tehtris)

virus@tehtris.com

Elastic

fp_reports@elastic.co

Emsisoft

submit@emsisoft.com, fp@emsisoft.com

ESET

N/A

FireEye

virustotal@fireeye.com

N/A

F-Prot

viruslab@f-prot.com

N/A

F-Secure/WithSecure

spyware-samples@f-secure.com, vsamples@f-secure.com

N/A

Forcepoint ThreatSeeker

reviewmysite@forcepoint.com

N/A

Fortinet

GData

N/A

Google (File Scanner)

google-at-virustotal@google.com

N/A

Google Safe Browsing (URL/Netloc Scanner)

N/A

GreenSnow

N/A

Gridinsoft

virus@gridinsoft.com

N/A

Hacksoft

virus@hacksoft.com.pe

N/A

Hauri

viruslab@hauri.co.kr

N/A

Heimdal

report-vt@heimdalsecurity.com

N/A

Hunt.io Intelligence

k.lo@hunt.io

N/A

Hoplite Industries

vt-info@hopliteindustries.com

N/A

Ikarus

fp@ikarus.at

N/A

IPsum

N/A

Jiangmin

support@jiangmin.com, shaojia@jiangmin.com

N/A

K7

reportfp@labs.k7computing.com, k7viruslab@labs.k7computing.com

N/A

Kaspersky

newvirus@kaspersky.com

N/A

Kingsoft

ti@mingting.cn

N/A

Lionic

support@lionic.com

Lumu

vt@lumu.io

N/A

Malbeacon

vtreport@malbeacon.com

N/A

Malwarebytes

N/A

Malwares.com (Saint Security)

kog@stsc.com

N/A

MalwareURL

team@malwareurl.com

N/A

MAX (SaintSecurity)

root@malwares.com

N/A

MaxSecure

tech@maxpcsecure.com

N/A

McAfee

virus_research@mcafee.com

N/A

Skyhigh

virus_research_gateway@avertlabs.com

N/A

Microsoft

N/A

Microworld

samples@escanav.com

N/A

NANO

false@nanoav.ru

N/A

Netcraft

N/A

Inca (previous nProtect)

virus_info@inca.co.kr

N/A

Palo Alto

vt-pan-false-positive@paloaltonetworks.com

N/A

Panda

falsepositives@pandasecurity.com, virussamples@pandasecurity.com

N/A

Phishing Database

N/A

PhishLabs

info@phishlabs.com

N/A

Qihoo360

support@360safe.com

N/A

QuickHeal

viruslab@quickheal.com

N/A

Quttera

support@quttera.com

N/A

Rising

N/A

Sansec eComscan

support@sansec.io

N/A

Sangfor

virustotal@sangfor.com.cn

N/A

Scumware.org

N/A

SecureAge

N/A

Seclookup

info@seclookup.com

N/A

Segasec

support@segasec.com

N/A

Sentinel One

report@sentinelone.com

N/A

SOCRadar

vt@socradar.io

N/A

Sophos

samples@sophos.com

Spamhaus

N/A

Sucuri

soc@sucuri.net

N/A

Symantec

N/A

Tencent

TAVfp@tencent.com

N/A

TheHacker

virus@hacksoft.com.pe, falsopositivo@hacksoft.com.pe

N/A

Trapmine

fp@trapmine.com

N/A

TrendMicro

virus@trendmicro.com, virus_doctor@trendmicro.com

Trustwave

N/A

Trustlook

bd@trustlook.com

N/A

Underworld

post@helsecert.no

N/A

URLQuery

contact@urlquery.net

N/A

Varist

support@varist.com, virus@avsubmit.com

N/A

VBA32

feedback@anti-virus.by

N/A

Viettel Threat Intelligence

cyberthreat@viettel.com.vn

N/A

Vipre

productsupport@vipre.com

N/A

VirIT

virustotal@viritpro.com

N/A

VirusDie

partners@virusdie.com

N/A

Webroot

N/A

WithSecure/F-Secure

spyware-samples@f-secure.com, vsamples@f-secure.com

N/A

Xcitium Verdict Cloud (Comodo)

support@xcitium.com

N/A

Yomi

yomi-false-positives@yoroi.company

N/A

Yandex

yandex-antivir@support.yandex.ru

N/A

Yandex Safebrowsing

sbapi@support.yandex.ru

N/A

Zillya

virus@zillya.com

N/A

ZoneAlarm

zonealarm_VT_reports@checkpoint.com

N/A

Zoner

false@zonerantivirus.com

N/A

Our team is available to assist you with de-listing your domain.

,

,

Technical Support
Abusix Lookup
Avira Submit URL
AVG Submit Sample
AVG Whitelist
BforeAi Support
Certego Contact
CINS Army Contact
ClamAV Reports
CRDF False Positive
Tehtris eGambit FP
Elastic Discuss
Emsisoft Contact
ESET Support
Fortinet Contact Support
Fortinet Classification Dispute
GData Submit Suspicious File
Google Safe Browsing Report
GreenSnow Contact
IPsum GitHub
Lionic Report FP
Malwarebytes False Positives
sender.office.com
Netcraft Report Mistake
Phishing Database GitHub
Rising File Check
Scumware Removals
SecureAge Report FP
Sophos Support
Spamhaus DBL Removal
Symantec Submit FP
Symantec Content Submission
TrendMicro Detection Re-evaluation
Trustwave Detection Review
Webroot Vendor Dispute
Let's Encrypt certificate generator
Scheduler
Scheduler
Google Search Console
https://mxtoolbox.com/blacklists.aspx
https://www.google.com/webmasters/tools/security-issues
https://www.virustotal.com/gui/home/url
Google SafeBrowsing
Domain wizard
Example SPF record:
DNS records
Lucy's built-in automation
Example DKIM record: