PDR IP Lookup - Frequently Asked Questions | Proofpoint US (2024)

  • Platform
  • Products
  • Solutions
  • Partners
  • Resources
  • Company

Search

Login

English (Americas)

Platform

    Products

      Solutions

        Partners

          Resources

            Company

              Protect People Multi-layered, adaptive defenses for threat detection, impersonation, and supplier risk.

              Email Security

              Impersonation Protection

              More products

              Defend Data Transform your information protection with a human-centric, omni-channel approach.

              Enterprise DLP

              Adaptive Email DLP

              Insider Threat Management

              Intelligent Compliance

              Mitigate Human Risk

              Unlock full user risk visibility and drive behavior change.

              Security Awareness

              Augment Your Capabilities

              Managed Services

              Product Packages

              More Protect People Products

              Account Take-Over and Identity Protection

              Secure vulnerable identities, stop lateral movement and privilege escalation.

              Adaptive Email Security

              Stop more threats with a fully integrated layer of behavioral AI.

              Secure Email Relay

              Secure your application email and accelerate DMARC implementation

              Solutions by Use Case

              How Proofpoint protects your people and data.

              Authenticate Your Email

              Protect your email deliverability with DMARC.

              Combat Email and Cloud Threats

              Protect your people from email and cloud threats with an intelligent and holistic approach.

              More use cases

              Solutions by Industry

              People-centric solutions for your organization.

              Federal Government

              Cybersecurity for federal government agencies.

              State and Local Government

              Protecting the public sector, and the public from cyber threats.

              More industries

              Comparing Proofpoint Evaluating cybersecurity vendors? Check out our side-by-side comparisons.

              View comparisons

              Solutions By Use Case

              How Proofpoint protects your people and data.

              Change User Behavior

              Help your employees identify, resist and report attacks before the damage is done.

              Combat Data Loss and Insider Risk

              Prevent data loss via negligent, compromised and malicious insiders.

              Modernize Compliance and Archiving

              Manage risk and data retention needs with a modern compliance and archiving solution.

              Protect Cloud Apps

              Keep your people and their cloud apps secure by eliminating threats and data loss.

              Prevent Loss from Ransomware

              Learn about this growing threat and stop attacks by securing ransomware's top vector: email.

              Secure Microsoft 365

              Implement the best security and compliance solution for Microsoft 365.

              Solutions By Industry

              People-centric solutions for your organization.

              Higher Education

              A higher level of security for higher education.

              Financial Services

              Eliminate threats, build trust and foster growth for your organization.

              Healthcare

              Protect clinicians, patient data, and your intellectual property against advanced threats.

              Mobile Operators

              Make your messaging environment a secure environment.

              Internet Service Providers

              Cloudmark email protection.

              Small and Medium Businesses

              Big-time security for small business.

              Proofpoint vs. the competition

              Side-by-side comparisons.

              Proofpoint vs. Abnormal Security

              Proofpoint vs. Mimecast

              Proofpoint vs. Cisco

              Proofpoint vs Microsoft

              Proofpoint vs. Microsoft Purview

              See Also
              community

              Proofpoint vs. Legacy DLP

              Partners

              Deliver Proofpoint solutions to your customers.

              Channel Partners

              Archive Extraction Partners

              Learn about Extraction Partners.

              GSI and MSP Partners

              Learn about our global consulting.

              Technology and Alliance Partners

              Learn about our relationships.

              Social Media Protection Partners

              Learn about the technology and....

              Proofpoint Essentials Partner Programs

              Small Business Solutions .

              Become a Channel Partner

              Resources

              Find reports, webinars, blogs, events, podcasts and more.

              Resource Library

              Blog

              Keep up with the latest news and happenings.

              Webinars

              Browse our webinar library to learn about the latest threats, trends and issues in cybersecurity.

              Cybersecurity Academy

              Earn your certification to become a Proofpoint Certified Guardian.

              Podcasts

              Learn about the human side of cybersecurity.

              New Perimeters Magazine

              Get the latest cybersecurity insights in your hands.

              Threat Glossary

              Learn about the latest security threats.

              Events

              Connect with us at events to learn how to protect your people and data from ever-evolving threats.

              Customer Stories

              Read how our customers solve their most pressing cybersecurity challenges.

              Company

              Proofpoint protects organizations' greatest assets and biggest risks: their people.

              About Proofpoint

              Why Proofpoint

              Learn about our unique people-centric approach to protection.

              Careers

              Stand out and make a difference at one of the world's leading cybersecurity companies.

              News Center

              Read the latest press releases, news stories and media highlights about Proofpoint.

              Privacy and Trust

              Learn about how we handle data and make commitments to privacy and other regulations.

              Environmental, Social, and Governance

              Learn how we apply our principles to positively impact our community.

              Support

              Access the full range of Proofpoint support services.

              Platform

              Discover the Proofpoint human-centric platform.

              Learn More

              Proofpoint Nexus

              Detection technologies to protect people and defend data

              Proofpoint Zen

              Protect and engage users wherever they work

              Search Proofpoint

              Try searching for

              Email SecurityPhishingDLPEmail Fraud

              Select Product Login

              Select Language

              • English (Americas)
              • English (Europe, Middle East, Africa)
              • English (Asia-Pacific)
              • Español
              • Deutsch
              • Français
              • Italiano
              • Português
              • 日本語
              • 한국어

              PDR IP Lookup Frequently Asked Questions

              Contact Us

              There are some questions:

              Why am I being delayed or blocked?

              The IP you are reporting is delayed or blocked because we have indications that messages scoring as spam or virus are being received from the IP. We do not delay or block based on a particular domain or bulk email or for any reason other than we are receiving spam from the IP.

              How do you decide to delay or block an IP?

              Proofpoint Dynamic Reputation uses hundreds of features to determine the reputation of a particular IP. Features indicating that an IP is sending spam, and is not an actual mail server for a legitimate company, will cause the IP to have a poor reputation and the IP will become delayed or blocked.

              How long will an IP stay on the delay or block list?

              An IP that presents indications of spam may be delayed for a short time. You do not need to do anything to get your IP removed from delay status; this will happen automatically, usually within a few minutes.

              An IP that continuously sends spam to our systems will be blocked and remain blocked. Once an IP stops sending spam for a period of time, it will be removed from the block list. If we receive intermittent spam from an IP (e.g. a public access point where infected machines may come and go), the IP may fluctuate between delayed and not delayed, or blocked and not blocked.

              What information do you need to unblock my IP?

              If you are aware of any recent problems on your network (e.g. you have just removed an infected computer), include that in your request. Also include information and supporting data as shown below so we can evaluate and verify your request. The more information you provide, the faster we can evaluate the issue. Help us help you because we take pride in maintaining an accurate reputation system.

              Here's the information we'll need from you:

              • Recipient of blocked email
              • Type of email blocked
                • Personal correspondence
                • Newsletters
                • Company communications
                • If company communications
                  • type of company and what your company does - ISP, small business, etc.

              How long will it take to review my report?

              We strive to review submitted reports within one business day.

              How do I prevent my IP from becoming delayed or blocked again?

              Keep your operating system, anti-virus and anti-spam software up to date to prevent getting infected again. Be aware of suspicious emails and think twice before clicking links.

              If you are using a shared email service, be proactive with your provider to ensure they are keeping their anti-virus and anti-spam software up to date. If they do not scan outbound email, it is possible that anyone on their service can knowingly or unknowingly send spam and cause everyone to get blocked.

              If you are running your own email server, be sure you have outbound mail protection to avoid unknowingly sending spam and becoming delayed or blocked.
              If your email server's reverse DNS pointer is controlled by your ISP, ask that it reflect your mail server's host name.

              How do I find my IP?

              If you do not know what IP address to lookup, check the email 'reject' message. The IP address is a series of four numbers separated by dots (like '1.2.3.4') and is normally visible in the mail rejection message you received. A 'reject' message from a server that uses the Proofpoint Email Security solution typically looks like this:

              550 5.7.1 Email rejected because 1.2.3.4 is listed by Proofpoint.com

              If you can't find what IP address to lookup, or you are not sure what an IP address is, please contact your local network administrator or your ISP for assistance.

              For Japanese, please see IP ルックアップについてよくあるご質問page.

              PDR IP Lookup - Frequently Asked Questions | Proofpoint US (2024)
              Top Articles
              Alter (character)
              US Tax of Philippine Income, Accounts & Assets: IRS Offshore
              English Bulldog Puppies For Sale Under 1000 In Florida
              Katie Pavlich Bikini Photos
              Gamevault Agent
              Pieology Nutrition Calculator Mobile
              Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
              Hendersonville (Tennessee) – Travel guide at Wikivoyage
              Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
              Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
              Craigslist Dog Kennels For Sale
              Things To Do In Atlanta Tomorrow Night
              Non Sequitur
              Crossword Nexus Solver
              How To Cut Eelgrass Grounded
              Pac Man Deviantart
              Alexander Funeral Home Gallatin Obituaries
              Shasta County Most Wanted 2022
              Energy Healing Conference Utah
              Geometry Review Quiz 5 Answer Key
              Hobby Stores Near Me Now
              Icivics The Electoral Process Answer Key
              Allybearloves
              Bible Gateway passage: Revelation 3 - New Living Translation
              Yisd Home Access Center
              Home
              Shadbase Get Out Of Jail
              Gina Wilson Angle Addition Postulate
              Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
              Walmart Pharmacy Near Me Open
              Marquette Gas Prices
              A Christmas Horse - Alison Senxation
              Ou Football Brainiacs
              Access a Shared Resource | Computing for Arts + Sciences
              Vera Bradley Factory Outlet Sunbury Products
              Pixel Combat Unblocked
              Movies - EPIC Theatres
              Cvs Sport Physicals
              Mercedes W204 Belt Diagram
              Mia Malkova Bio, Net Worth, Age & More - Magzica
              'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
              Teenbeautyfitness
              Where Can I Cash A Huntington National Bank Check
              Topos De Bolos Engraçados
              Sand Castle Parents Guide
              Gregory (Five Nights at Freddy's)
              Grand Valley State University Library Hours
              Holzer Athena Portal
              Hello – Cornerstone Chapel
              Stoughton Commuter Rail Schedule
              Selly Medaline
              Latest Posts
              Article information

              Author: Catherine Tremblay

              Last Updated:

              Views: 5675

              Rating: 4.7 / 5 (47 voted)

              Reviews: 86% of readers found this page helpful

              Author information

              Name: Catherine Tremblay

              Birthday: 1999-09-23

              Address: Suite 461 73643 Sherril Loaf, Dickinsonland, AZ 47941-2379

              Phone: +2678139151039

              Job: International Administration Supervisor

              Hobby: Dowsing, Snowboarding, Rowing, Beekeeping, Calligraphy, Shooting, Air sports

              Introduction: My name is Catherine Tremblay, I am a precious, perfect, tasty, enthusiastic, inexpensive, vast, kind person who loves writing and wants to share my knowledge and understanding with you.