Check if your IP address or domain is listed on 60+ DNS-based blacklists. Identify spam listings, find delist links, and diagnose email deliverability problems.
A blacklist checker (also called a DNSBL checker or RBL lookup tool) queries DNS-based blackhole lists to determine whether an IP address or domain is flagged as a spam source, malware distributor, or otherwise malicious. These lists are used by mail servers worldwide to filter incoming email in real time.
When someone sends you an email, your mail server checks the sender's IP against one or more DNSBLs before accepting the message. If the IP is listed, the email may be rejected outright, tagged as spam, or silently discarded. This tool lets you see exactly what those mail servers see when they check your IP or domain.
This checker queries 60+ blacklists in parallel, including all major lists used by enterprise mail servers: Spamhaus (ZEN, SBL, XBL, PBL, DBL), Barracuda, SpamCop, the entire SORBS family, UCEPROTECT Levels 1-3, SURBL, URIBL, and dozens more. For each listing found, it provides the return code, human-readable reason, and a direct link to request delisting.
DNSBL lookups use the DNS infrastructure itself as the query mechanism — no special protocols or APIs are needed. The process differs slightly for IP-based and domain-based lists:
The IP address is reversed and appended to the blacklist zone:
IP: 192.0.2.1
Query: 1.2.0.192.zen.spamhaus.org
NXDOMAIN → Not listed
127.0.0.2 → SBL (spam source)
The domain is prepended to the blacklist zone:
Domain: example.com
Query: example.com.dbl.spamhaus.org
NXDOMAIN → Not listed
127.0.1.2 → Spam domain
The return codes in the 127.0.0.x range encode the reason for listing. Each blacklist defines its own return code scheme. For example, Spamhaus ZEN uses 127.0.0.2 for SBL (spam sources), 127.0.0.4 for XBL (exploited hosts), and 127.0.0.10-11 for PBL (dynamic/residential IPs). This tool decodes all known return codes automatically.
The most widely used blacklist. Combines SBL (spam sources), XBL (exploited hosts), PBL (dynamic IPs), and CSS. Used by the majority of enterprise mail servers worldwide.
Maintained by Barracuda Networks. Focuses on IPs observed sending spam to their network of honeypots and customer mail systems. Self-service removal available.
Based on user spam reports. Listings are temporary (24-48h) and expire automatically when reports stop. One of the most responsive and fair lists.
A family of specialized lists covering spam, open relays, proxies, dynamic IPs, and web exploits. Comprehensive but can be aggressive with listings.
Three escalation levels. Level 1 lists individual IPs. Level 2 lists /24 networks. Level 3 lists entire ASNs. Levels 2-3 are controversial as they affect innocent IPs.
Domain-based list checking domains in email content, not sending IPs. Catches spam campaigns even when the sending IP is clean or rotating.
If your IP or domain is listed on a blacklist, follow these steps to resolve the issue and prevent re-listing:
Use the DNS Inspector to verify SPF, DKIM, and DMARC records, and the IP Location tool to check the reputation and geolocation of your mail server IP.
Lists the IP address of the sending mail server. Checks are performed during the SMTP transaction before the email body is received.
Examples: Spamhaus ZEN, Barracuda, SpamCop, SORBS, UCEPROTECT
Lists domain names found in email content (URLs, headers, sender addresses). Checked after the email is received and parsed.
Examples: Spamhaus DBL, SURBL, URIBL, Invaluement
Both types are important. An attacker can use a clean IP with a blacklisted domain, or a clean domain from a blacklisted IP. Comprehensive checking requires both. When you enter a domain into this tool, it checks domain-based lists directly and also resolves the domain to its IP address to check IP-based lists.