Skip to main content
The Blacklists feature in DMARCeye continuously monitors whether any IP addresses used to send emails from your domains have been listed on public email blacklists (also called DNS-based Blocklists, or DNSBLs). Being blacklisted can severely impact email deliverability — messages sent from a blacklisted IP may be rejected or silently dropped by receiving mail servers. DMARCeye automates this monitoring so you never have to manually check dozens of individual blacklist registries.

How It Works

1. IP Address Collection

DMARCeye collects all unique IP addresses that appear in your DMARC reports as sending sources. These are the actual IP addresses that connected to recipient mail servers and delivered (or attempted to deliver) email on behalf of your domain.

2. Blacklist Lookup

Each discovered IP is checked against a comprehensive set of public DNSBL databases. These range from well-known lists such as the Spamhaus Block List (SBL) and DNSBL.dronebl.org to specialised feeds tracking spam networks, botnets, and open proxies — covering everything from the “Bad Guys List” to the “Internet’s Most Wanted.” The lookup is performed via DNS queries — a fast, standardised protocol used by virtually all DNSBL providers. For each IP, a reversed-octet query is sent to the DNSBL zone. A positive response (any DNS answer) indicates the IP is listed on that blacklist.

3. Results Display

After checking all IPs, DMARCeye presents one of two outcomes:

Scenario A — IPs Found on Blacklists

If one or more sending IPs are blacklisted, a results table is shown with the following columns:
SenderIPE-mails seenLast seenBlacklisted at
sparkpostmail.com156.70.4.15324127/11/2025, 08:49:14truncate.gbudb.net
hubspotemail.net158.247.28.65122/03/2026, 15:10:39dnsbl.dronebl.org.
  • Sender — the domain or service used as the email-sending infrastructure (e.g. sparkpostmail.com, hubspotemail.net).
  • IP — the specific IP address that has been blacklisted.
  • E-mails seen — number of email messages observed from this IP in your DMARC data.
  • Last seen — timestamp of the most recent email delivery attempt recorded from this IP.
  • Blacklisted at — the name of the DNSBL registry where the IP is currently listed.

Scenario B — All IPs Clean

If none of your sending IPs appear on any blacklist, DMARCeye displays a confirmation screen with a green checkmark:
✔  All of your IP’s are clean. Good job! — We’ve checked 88 IPs used addresses against all the blacklists out there, from the “Bad Guys List” to the “Internet’s Most Wanted.” And guess what? They’re all clean!
This confirmation gives you confidence that your sending infrastructure is not currently associated with spam or abuse activity. Why Blacklist Monitoring Matters When a mail server receives an incoming message, it typically checks the sending IP against one or more DNSBLs in real time. If the IP is listed, the server may:
  • Reject the message outright with a 5xx SMTP error.
  • Tag the message as spam and route it to the junk folder.
  • Silently discard the message (“silent drop”).
Any of these outcomes means your emails never reach the inbox — even if the content is legitimate and your DMARC/SPF/DKIM authentication is properly configured. Blacklist monitoring closes this gap in your email health visibility.

Supported Blacklist Sources

DMARCeye checks IPs against multiple industry-standard DNSBL providers simultaneously. Examples of sources queried include:
  • Spamhaus (SBL, XBL, PBL)
  • DNSBL.dronebl.org — tracking DDoS drones, botnets, and compromised hosts
  • Truncate / GBUdb — statistical spam IP scoring
  • Barracuda Reputation Block List (BRBL)
  • SpamCop Blocking List (SCBL)
  • And many more specialist feeds
The exact list of DNSBLs checked may be updated over time to reflect changes in the threat landscape and the availability of public feeds.

When Are Checks Performed?

Blacklist checks run automatically as part of DMARCeye’s regular data processing pipeline. Each time new DMARC aggregate reports are ingested and sending IPs are identified, those IPs are queued for blacklist verification. The results shown in the Blacklists section always reflect the most current data available based on your DMARC reporting window.
  1. Identify the sending service — use the Sender column to determine which ESP or infrastructure is responsible.
  2. Check the blacklist entry — visit the DNSBL website listed in the “Blacklisted at” column to understand the reason for listing and the delisting procedure.
  3. Contact your ESP — if the IP belongs to a third-party sending service, report the issue to their abuse/deliverability team.
  4. Request delisting — follow the DNSBL’s official delisting process. Most major blacklists provide a self-service lookup and removal form.
  5. Monitor for recurrence — after delisting, continue to watch the Blacklists section in DMARCeye for any re-listing events.
To access the Blacklists feature, log in to DMARCeye and select Blacklists from the left-hand navigation menu. The page loads automatically and displays the current check results for all domains and IPs associated with your account.