Finding your sending IP on a blacklist is one of the most disruptive deliverability events a sender can encounter. At major ISPs that query Spamhaus or Barracuda, a single listing causes hard rejection of every outbound message — not spam folder placement, but outright 5xx rejection. The critical error most senders make: requesting delisting before fixing the root cause. Blacklist operators, especially Spamhaus, will deny removal requests if the underlying problem is still present, and re-listing after removal is treated more harshly than the initial listing. This guide covers the major blacklists, their different listing criteria, the fix-first removal sequence, and how to monitor to prevent future listings.

200+
active public blacklists tracked by MXToolbox
Spamhaus
highest ISP weighting — blocks at 90%+ of providers
24-48h
typical Spamhaus SBL delisting review time
15%
of blacklistings re-occur within 30 days without root-cause fix

The Blacklist Landscape: Which Lists Actually Matter

Not all blacklists have equal impact. Hundreds of DNSBL (DNS Blackhole List) databases exist, but only a handful are widely queried by major receiving mail servers. Appearing on an obscure list causes minimal deliverability impact; appearing on Spamhaus SBL causes hard rejection at virtually every major ISP simultaneously.

Tier 1: Critical impact (fix immediately)

Spamhaus ZEN (combined blocklist queried at zen.spamhaus.org) — a composite list that includes the SBL, XBL, and PBL. Spamhaus ZEN is queried by Gmail, Microsoft, Yahoo, and most major ISPs as a primary reputation input. A ZEN listing causes hard rejection at a significant percentage of the global email infrastructure.

The individual Spamhaus lists within ZEN:

  • SBL (Spamhaus Block List): IPs directly operated by or for known spam operations. Listed because of deliberate spam sending. Manual investigation and removal process. Most severe.
  • CSS (Spamhaus Snowshoe Spam Block List): IP ranges used for snowshoe spam — spreading spam across many IPs to dilute per-IP complaint signals. Listed because of sending pattern across multiple IPs, not necessarily a single high-volume IP.
  • XBL (Exploits Block List): IPs associated with hijacked systems, botnets, or proxies used for spam. Often means your server has been compromised.
  • PBL (Policy Block List): IPs that should not be sending email directly (residential ISP ranges, dynamic IPs). Not a spam accusation — it's a policy designation. If your mail server has a legitimate static IP, you can self-serve request PBL removal.

Barracuda BRBL (Barracuda Reputation Block List) — queried by organizations running Barracuda email security appliances (common in corporate environments). Impact depends on what percentage of your recipient list is at organisations using Barracuda filtering. Less universal impact than Spamhaus but significant for B2B senders.

Tier 2: Moderate impact

SpamCop (SCBL): Based on complaint data from SpamCop users. Listings are time-limited — an IP de-lists automatically if no new complaints arrive within a certain period. Generally self-resolving if you stop the offending sending. Submit a formal request to accelerate delisting.

SURBL: Domain-based list focused on URLs in spam. If your sending domain or any domain in your email links appears in SURBL, it indicates the domain has appeared in spam messages. Relevant for content-based filtering.

Microsoft SNDS (Smart Network Data Services): Not technically a blacklist, but Microsoft's internal reputation system. "Red" status in SNDS causes aggressive filtering at Outlook, Hotmail, and Live. Requires postmaster.live.com to monitor and the Smart Network Data Services removal form to request restoration.

Identifying Blacklist Listings

# Check an IP against major blacklists
# MXToolbox (most comprehensive public checker)
# https://mxtoolbox.com/blacklists.aspx

# Spamhaus specific check (command line)
# Reverse the octets of your IP and query zen.spamhaus.org
# For IP 203.0.113.10:
dig 10.113.0.203.zen.spamhaus.org TXT

# If listed, response will contain a reason code (127.0.0.x)
# 127.0.0.2 = SBL
# 127.0.0.3 = CSS  
# 127.0.0.4-7 = XBL
# 127.0.0.10-11 = PBL

# Barracuda check
dig 10.113.0.203.b.barracudacentral.org A
# Listed if returns 127.0.0.2

# Automated monitoring (recommended)
# Subscribe to MXToolbox blacklist monitoring alerts for your IPs
# Set up daily automated checks via their monitoring service

Identifying listings from bounce messages: ISPs that reject based on blacklist listings usually include the specific list in the rejection message:

BlacklistCoverageListing causeDelisting processTime
Spamhaus SBLCriticalSpam source confirmedManual request + evidence of fix24-72h
Spamhaus XBLCriticalExploits / proxies / compromisedAuto-delist if cause removed1-24h
Spamhaus PBLHighDynamic / consumer IP policySelf-service removal (legitimate static IPs)< 1h
Barracuda BRBLHighHigh complaint rate or spam contentWeb form + 7-day wait minimum7-14 days
SORBS SPAMMediumDirect spam reportFee-based or dispute process3-7 days
SpamCopMediumUser reports + spam trapsAuto-expires 24h after last report24-48h auto
UCEPROTECT L1Low-MediumIP spam reportsAuto-expires or paid express removal7 days auto
Microsoft SNDSCritical for MSTrap hits / complaint rateDelist via SNDS portal after cleanup24-48h
Bounce showing Spamhaus SBL block (550 from receiving MTA)
Final-Recipient: rfc822; target@recipient-domain.com
Action: failed
Status: 5.7.1
Diagnostic-Code: smtp; 550 5.7.1 Service unavailable; client [203.0.113.42] blocked
  using zen.spamhaus.org;
  https://www.spamhaus.org/query/ip/203.0.113.42
  To request removal from this list see
  https://www.spamhaus.org/zen/ (in reply to RCPT TO command)

# zen.spamhaus.org = combined SBL + XBL + PBL query.
# Check each separately: sbl.spamhaus.org, xbl.spamhaus.org, pbl.spamhaus.org
# The URL in the diagnostic code goes directly to the listing evidence page.
# Example Spamhaus rejection in SMTP logs
550 5.7.1 Service unavailable; IP address [203.0.113.10] is blocked.
  See https://www.spamhaus.org/query/ip/203.0.113.10

# Example Barracuda rejection
450 4.7.1 Try later; see http://www.barracudacentral.org/rbl/removal-request

# Example generic blacklist rejection
550 5.7.1 [203.0.113.10] listed in zen.spamhaus.org

Root Cause Identification: Before Requesting Removal

The sequence is critical: diagnose and fix first, then request removal. Spamhaus explicitly denies removal requests for IPs that are still generating the behaviour that caused the listing. Barracuda will relist rapidly if the problem isn't fixed. Requesting removal and getting denied may also add a "this sender tried to remove without fixing" flag that makes subsequent removal harder.

Investigate in this order

1. Check for active compromise: If the XBL is listed, your IP may be sending spam from a compromised system. Check for unusual outbound SMTP traffic:

# Check current SMTP connections from your server
netstat -an | grep ':25 ' | grep ESTABLISHED | wc -l

# Check for unusual processes sending mail
ps aux | grep sendmail
ps aux | grep smtp

# Check mail queue for unexpected message volume
mailq | wc -l   # More than a few hundred in queue is suspicious

# Check for open relay (your server forwarding mail for unauthorized senders)
# Test: attempt to send through your server from an external IP to an external address
# If it accepts, you have an open relay — critical to fix immediately

2. Check for spam trap hits: Spam traps are email addresses maintained specifically to catch senders with poor list hygiene. You won't know exactly which addresses are traps, but indicators of trap hits include: sudden unexpected Spamhaus CSS listing, high complaint rates that don't correlate with specific campaigns, or Microsoft SNDS showing trap hits in the data.

3. Check your list hygiene: Hard bounces above 2%, high complaint rates, and very old list segments are the most common cause of non-compromise listings. The sent list that correlated with the listing date is the primary suspect.

Removal Process Per Blacklist

Spamhaus removal

  1. Check current listing status and reason code: check.spamhaus.org
  2. Identify the specific Spamhaus list (SBL, CSS, XBL, PBL) from the query response
  3. Fix the root cause completely. For SBL/CSS: stop all sending from the listed IP, identify and stop the spam operation. For XBL: eliminate the malware/compromise, secure the server, and scan clean. For PBL: confirm your IP is a legitimate static mail server IP (not residential/dynamic)
  4. Wait 24 hours after completing the fix before submitting removal
  5. Submit removal at: spamhaus.org/removal (SBL/CSS) or check.spamhaus.org (XBL/PBL self-service)
  6. Provide detailed explanation of what happened and what was fixed
  7. Spamhaus processes manual requests typically within 24–48 hours. PBL requests are often automated and faster.

Barracuda removal

  1. Check status: barracudacentral.org/rbl (lookup your IP)
  2. Fix root cause (mandatory before requesting — Barracuda will re-list quickly if the cause persists)
  3. Submit removal at: barracudacentral.org/rbl/removal-request
  4. Provide: IP address, email address, phone number, brief reason for removal and what was fixed
  5. Barracuda typically processes requests within 12–24 hours
  6. Verify removal by re-checking the listing

SpamCop removal

SpamCop listings auto-expire — if no new complaints arrive for the IP within the evaluation period, the listing drops automatically. For faster removal: submit a formal request at spamcop.net with explanation of what was fixed. SpamCop is generally responsive to requests from legitimate senders who have addressed the underlying issue.

Microsoft SNDS / Outlook blocks

  1. Check status at postmaster.live.com (Smart Network Data Services)
  2. If Red status: sender.office.com (Microsoft delist portal) for IP-level blocks
  3. For persistent blocks: submit a support request at postmaster.live.com with detailed sending information, authentication configuration, and description of the issue and resolution

Post-Removal Monitoring

After delisting, the work isn't finished. A re-listing within 30 days of removal is treated more seriously by most blacklist operators and may result in a longer listing period. Maintain these practices:

  • Weekly blacklist monitoring: MXToolbox blacklist monitor or similar tool. Alert on any new listing immediately — not discovering it days later.
  • Hard bounce processing: Suppress all hard bounced addresses immediately and permanently. Hard bounces that recur because suppression wasn't applied are a leading re-listing cause.
  • Complaint rate monitoring: Keep Gmail Postmaster spam rate below 0.10% and SNDS complaint rate in the green zone.
  • Authentication verification: Verify SPF, DKIM, and DMARC are passing for all outbound streams monthly.
  • IP warming for new IPs: Any new IP added to your sending infrastructure must be warmed gradually. Sending high volume from a new IP with no reputation history is a rapid path to CSS listing.