DEV Community

Cover image for IP Blacklists & DNSBL: How to Check and Get Delisted
toolbox-poster
toolbox-poster

Posted on • Originally published at toolbox.starnomina.tn

IP Blacklists & DNSBL: How to Check and Get Delisted

TL;DR
IP blacklists (DNSBLs) are real-time databases that mail servers query to block spam at the connection level. If your IP lands on one, your email deliverability can drop to near zero. This guide explains how DNSBLs work under the hood, covers the major blacklist operators and their delisting policies, and walks you through a proven process to get delisted and stay clean.

📑 Table of Contents

  • What Is a DNSBL?
  • How DNSBL Lookups Work
  • Understanding Return Codes
  • Major Blacklists & Delisting Policies
  • Checking Your IP
  • Delisting Step-by-Step
  • Root Cause Analysis
  • Preventing Re-Listing
  • Best Practices
  • Common Mistakes
  • Tools
  • References

What Is a DNSBL?

📖 Definition — A DNS-based Blackhole List (DNSBL) is a service that publishes a list of IP addresses known to send spam or exhibit abusive behavior, queryable via the DNS protocol in real time.

When an email server receives an inbound connection, it can query one or more DNSBLs before accepting any message. If the connecting IP is listed, the server may reject the connection outright or assign a higher spam score. DNSBLs are one of the oldest and most effective anti-spam mechanisms, first introduced by the Mail Abuse Prevention System (MAPS) in 1998.

How DNSBL Lookups Work

The lookup mechanism is elegant in its simplicity. The receiving mail server reverses the octets of the sender's IP address and appends the DNSBL's domain as a suffix, then performs a standard DNS A-record query.

The Reversed-IP DNS Query

For example, to check IP 192.168.1.42 against zen.spamhaus.org:

Step 1 — Reverse the IP octets: 42.1.168.192

Step 2 — Append the DNSBL zone: 42.1.168.192.zen.spamhaus.org

Step 3 — Perform a DNS A query on the constructed hostname

Step 4 — If the response is NXDOMAIN, the IP is not listed. If an A record is returned (typically 127.0.0.x), the IP is listed.

# Check if 192.168.1.42 is on Spamhaus ZEN
dig +short 42.1.168.192.zen.spamhaus.org

# Check against Barracuda
dig +short 42.1.168.192.b.barracudacentral.org

# Check against SpamCop
dig +short 42.1.168.192.bl.spamcop.net
Enter fullscreen mode Exit fullscreen mode

Understanding Return Codes

DNSBLs return addresses in the 127.0.0.0/8 loopback range. The last octet encodes the reason for listing. Each DNSBL defines its own code meanings.

Return Code Spamhaus SBL Meaning Description
127.0.0.2 SBL — Spamhaus Block List Direct spam sources, verified spam operations
127.0.0.3 SBL CSS Spam from compromised/hacked machines
127.0.0.4 XBL — CBL detected Exploits, trojans, and botnet sources
127.0.0.9 SBL DROP Hijacked IP space, do-not-route
127.0.0.10 PBL — Policy Block List Dynamic/residential IPs not meant for email
127.0.0.11 PBL (ISP maintained) ISP-declared non-mail IP ranges

â„šī¸ Always query the TXT record as well (dig TXT ...) — it returns a human-readable explanation and a link to the specific listing details.

Major Blacklists & Delisting Policies

Blacklist Zone Auto-Expire Self-Service Delisting Notes
Spamhaus SBL sbl.spamhaus.org No Yes — via web form Most impactful; used by 3B+ mailboxes
Spamhaus XBL xbl.spamhaus.org Yes (~48h) Yes Botnet/exploit derived; fix malware first
Spamhaus PBL pbl.spamhaus.org No ISP must request Policy list, not a blacklist per se
Barracuda BRBL b.barracudacentral.org Yes (12–48h) Yes — web form Automated listing/delisting
SpamCop bl.spamcop.net Yes (24–48h) No — automatic only User-reported; expires if reports stop
SORBS dnsbl.sorbs.net Varies Yes — fee may apply Multiple sub-zones for different categories
UCEPROTECT L1 dnsbl-1.uceprotect.net Yes (7 days) Paid express ($$$) Single IP; L2/L3 cover ranges/ASNs

Checking Your IP

Before diving into delisting, confirm exactly which lists your IP appears on. Use our IP Reputation Check tool to scan dozens of DNSBLs simultaneously, or query individual lists with dig:

# Quick multi-DNSBL check for 203.0.113.50
for zone in zen.spamhaus.org b.barracudacentral.org bl.spamcop.net; do
  echo -n "$zone: "
  dig +short 50.113.0.203.$zone || echo "clean"
done
Enter fullscreen mode Exit fullscreen mode

For broader context, the IP Address Lookup tool shows geolocation, ASN, hosting provider, and abuse contact information — all critical when filing delisting requests.

Delisting Step-by-Step

1. Identify the listing — Run a multi-DNSBL check. Note which specific lists and sub-lists you appear on, and record the return codes.

2. Stop the abuse — Before requesting delisting, eliminate the root cause. Continued spam will result in immediate re-listing.

3. Read the listing details — Each DNSBL provides a lookup page showing why you were listed. Spamhaus includes evidence and timestamps.

4. Submit the delisting request — Use the DNSBL's self-service portal. Provide your IP, evidence of remediation, and contact information.

5. Allow DNS propagation — Even after delisting, some resolvers may cache the old answer for up to 24 hours (TTL-dependent).

6. Monitor post-delisting — Set up recurring checks. Re-listing within days indicates the root cause was not fully resolved.

Root Cause Analysis

Listings don't happen randomly. Common root causes include:

  • Compromised accounts — A single hacked email account can send thousands of spam messages in minutes

  • Open relay or misconfigured MTA — Your server accepts and forwards mail from any source

  • Malware/botnet infection — The server or a device on the same network is part of a botnet

  • Purchased or scraped mailing lists — Sending to non-consenting recipients triggers spam reports

  • Shared IP reputation — On shared hosting, another tenant's abuse can blacklist the shared IP

  • Missing authentication — No SPF, DKIM, or DMARC allows spoofing from your domain/IP

âš ī¸ Requesting delisting without fixing the root cause will get you re-listed faster, and some operators will extend the cooldown period or block future delisting requests.

Preventing Re-Listing

Proactive Monitoring

Set up automated DNSBL monitoring that checks your mail server IPs against major blacklists every hour. Many services offer free monitoring for a small number of IPs, including MXToolbox, HetrixTools, and our own IP Reputation Check.

Email Hygiene

  • Implement SPF, DKIM, and DMARC on all sending domains

  • Enforce rate limits on outbound email per user/account

  • Require double opt-in for all mailing lists

  • Process bounces immediately — remove hard bounces after the first occurrence

  • Honor unsubscribe requests within 24 hours

Infrastructure Hardening

  • Disable open relay — test with telnet yourserver.com 25 from an external host

  • Keep all software patched (MTA, CMS, plugins)

  • Use outbound SMTP authentication to prevent unauthorized sending

  • Segment mail traffic: transactional, marketing, and corporate on separate IPs

Best Practices

⚡ Pro Tip: 💡 Use a dedicated IP address for email sending rather than shared hosting. This isolates your reputation from other tenants and gives you full control over your listing status.

  • Monitor your IPs against at least the top 5 DNSBLs (Spamhaus, Barracuda, SpamCop, SORBS, UCEPROTECT) on an hourly schedule

  • Maintain a feedback loop (FBL) with major ISPs (Gmail Postmaster Tools, Microsoft SNDS, Yahoo CFL)

  • Keep outbound email volume consistent — sudden spikes trigger automated listing

  • Warm up new IPs gradually: start with 50–100 emails/day and scale over 2–4 weeks

  • Document your IP ranges, expected sending volumes, and abuse contacts in your WHOIS records

Common Mistakes

Mistake Consequence Fix
Requesting delisting before fixing the issue Immediate re-listing, longer cooldown Resolve root cause first, then delist
Ignoring PBL listings Residential IPs rejected by most MTAs Use your ISP's smart host or a dedicated mail server
Only checking one DNSBL Listed on others you don't know about Use a multi-DNSBL checker regularly
Paying for UCEPROTECT express delisting Wasted money — listing expires in 7 days anyway Wait it out and fix the cause
Sending from dynamic/residential IPs Permanently on PBL-type lists Use a VPS or mail relay with a static IP and PTR record

Tools

🔍 IP Reputation Check — Scan your IP against 80+ DNSBLs instantly and see listing details for each.

🌐 IP Address Lookup — Get geolocation, ASN, hosting provider, and abuse contact info for any IP address.

References

  • 📄 Spamhaus — DNSBL Usage FAQ

  • 📄 Spamhaus — Understanding Return Codes

  • 📄 Barracuda Central — Reputation Lookup & Removal

  • 📄 SpamCop — How SpamCop Blocking List Works

  • 📄 RFC 5782 — DNS Blacklists and Whitelists

  • 📄 M3AAWG — IP Reputation Overview (Best Practices)

đŸŽ¯ Key Takeaway: đŸŽ¯ Key Takeaway — Getting listed on a DNSBL is a symptom, not the disease. Always identify and fix the root cause — compromised account, misconfigured server, or bad list hygiene — before requesting delisting. Pair remediation with proactive monitoring and email authentication (SPF/DKIM/DMARC) to protect your sender reputation long-term.


Originally published on StarNomina ToolBox. Try our free online tools — no signup required.

Top comments (0)