# SOA and NS record
$SOA 1800 rbl.example.com abuse.example.com 0 600 600 86400 600

# note: NS record should have reasonably longer TTL
$NS  86400 rbl.example.com

# default value if LHS of key is omitted:
:127.0.0.2:spam received, see http://rbl.example.com/lookup?$

# a key without value: returns the default value above
127.0.0.1

# CIDR notation:
10.200/16

# without netmask, it works as well: same as 10.201/16
10.201

# whitelisting:
!10.202.0.1

# domain-based DNSBL:
evil.example.com
