Blacklisted email; blocked by sender or recipient?

Posted on 2010-09-22
Medium Priority
Last Modified: 2012-05-10
If a domain has been put on to a email blacklist, for appearing as a spammer, at what point will that blacklisted domain be blocked, when they send email or when the recipient is about to receive it? and what's the best way to get removed from the blacklist?
Question by:canalicomputers
LVL 20

Accepted Solution

wolfcamel earned 2000 total points
ID: 33740306
it is the receiver's mail server that does the antispam checks.
getting removed depends on which blacklist you are on - some automatically remove you after 24 hours of not sending spam, others will require you to put in a request
LVL 12

Expert Comment

ID: 33740310
Mostly just on the receiving end is where it is blocked.

Check the policies of the blacklists.  Most of them have the steps needed to get removed from their blacklists.  (e.g. configure reverse DNS, make sure you're not an open proxy, SPF records, etc.)  Each blacklist differs slightly.  You need to read through their policies and correct what got you put on the list and then usually request removal to them.
LVL 20

Assisted Solution

wolfcamel earned 2000 total points
ID: 33740312
there are a large number of websites that will query the popular blacklists and tell you which ones you are one - then you can visit the website for each one and look to get removed.
Assuming you have fixed the problem causing your server/machine to send or relay spam.

Google DNS blacklist lookup
Will You Be GDPR Compliant by 5/28/2018?

GDPR? That's a regulation for the European Union. But, if you collect data from customers or employees within the EU, then you need to know about GDPR and make sure your organization is compliant by May 2018. Check out our preparation checklist to make sure you're on track today!


Expert Comment

ID: 33748029
To expand on wolfcamel's response to the first part of your question: it's almost always the receiver's icoming server that blacklists a spammer (as opposed to the outgoing server of the alleged spammer), so the email is blocked at the delivery point.  You should be able to look at the headers to see exactly where the message was stopped.
LVL 32

Expert Comment

ID: 33750773
A domain is not usually the subject of a blacklist for e-mail server purposes.  Otherwise, yahoo.com and aol.com mail would be completely banned due to spoofed messages.

Blacklists are used by receiving SMTP relays to look up the sending SMTP relay.  The results of an RBL (real-time blacklist) lookup do not "block" anything.  The response of the RBL is used by a scoring system on the receiving SMTP relay.  It's up to the server admin what to do.

It has little to do with what your domain name is in the offending messages.  Any IP address could have hundreds of domains using it.  Any domain could be using hundreds of IP addresses to send mail.

But, as others have described, the process for each blacklist is different.  Best to find out which you have offended and follow their procedures.  Nagging the admins or getting on a soapbox doesn't work.

1. Stop sending spam
2. Then use the automated methods for removal.

If you don't those two things first, then sending mail to an admin will usually be returned with more than a bit of sarcasm.

Author Closing Comment

ID: 33752943
Thanks guys

Featured Post

Never miss a deadline with monday.com

The revolutionary project management tool is here!   Plan visually with a single glance and make sure your projects get done.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Cloud computing is a model of provisioning IT services. By combining many servers into one large pool and providing virtual machines from that resource pool, it provides IT services that let customers acquire resources at any time and get rid of the…
Read this tutorial to learn how to fix repeating password error prompts when setting up Gmail IMAP with Microsoft Outlook. The entire process is described with step by step, illustrated instructions. Enjoy...
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

600 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question