IFTAS Abandoned and Unmanaged Domain (AUD) Denylist
Table of Contents
About this denylist
The Abandoned and Unmanaged list is an IFTAS-curated list of domains that are highly recommended for defederation or limited delivery. Each domain is labelled using a shared vocabulary label. Each domain is investigated by human review for governance, common content, network and service activities, hosting location and more.
Before including any domain on this list we perform the following efforts to ascertain the service status:
- spam accounts are reported to the domain and reviewed one week later,
- the listed admin is contacted on network,
- if no response, then via email if available,
- if no response, then via DNS contact if available.
Inclusion on this list means we have observed this domain:
- is a dedicated spam service, or
- has been clearly abandoned but still allows creation of new accounts, or
- chooses to not delete known spam accounts, even when reported; and
- we are highly unlikely to ever retract an entry.
In all cases we strongly recommend you use a Federation Policy to aid you in your decision making.
Download / subscribe
iftas-abandoned-unmanaged-latest.csv (Mastodon import format)
The permanent file location is:
about.iftas.org/wp-content/upl…
(The file date will not change, but the latest version will overwrite any previous version at this URL)
See Denylist Management Tools for third-party tools to import or implement this denylist.
View current denylist
IFTAS Abandoned / Unmanaged Denylist Output – HTML table view of this denylist
Related Resources
IFTAS Abandoned / Unmanaged Denylist Output
This is the output of the IFTAS Abandoned and Unmanaged Domain List See Shared Vocabulary: Labels for label definitions. Domains listed below may have been defederated due to serious violations of …IFTAS
Shared Vocabulary: Labels
The community shared vocabulary is a collaboratively maintained set of terms and definitions used by moderators and administrators to ensure clarity, fairness, and consistency in community governance across diverse platforms.IFTAS and the SW-ISAC use industry-standard labels and definitions to classify actors, behaviour, and content. Click each label to see its definition, guidance, and example community guidance.
Thanks to our community, these labels and their definitions are also available in other languages. Special thanks to DTSP for re-releasing these labels as Creative Commons, allowing us to solicit translation volunteers.
- Français
- Português Brasileiro
- Scots Gaelic (labels only)
- 简体字 (Simplified Chinese)
Labels
- account-takeover
- apt (advanced persistent threat)
- astroturfing
- brigading
- catfishing
- content-and-conduct-related-risk
- cib (coordinated inauthentic behaviour)
- copyright-infringement
- counterfeit
- cross-platform-abuse
- csam (child sexual abuse material)
- csea (child sexual exploitation and abuse)
- defamation
- dehumanisation
- disinformation
- doxxing
- explicit-content
- farming
- glorification-of-violence
- hate-speech
- impersonation
- incitement
- misinformation
- ncii (non-consensual intimate imagery)
- online-harassment
- phishing
- service-abuse
- sock-puppet
- sextortion
- spam
- synthetic-media
- troll
- tvec (terrorist and violent extremist content)
- violent-threat
See also: Information for Software Developers and Designers offers a method for grouping these labels in reporting workflow.
Glossary of Trust & Safety Terms - Digital Trust & Safety Partnership
As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe.DTSP Press (Digital Trust & Safety Partnership)