Quick Answer

If your self-hosted IP is blacklisted, first identify which lists at MXToolbox, then fix the root cause (compromised account, bad list, open relay, or inherited reputation), then submit delisting requests to each blacklist. Spamhaus requires fixing the issue first and submitting via their removal form. Barracuda has a self-service removal tool. Most lists delist within 24-48 hours. Prevention requires ongoing monitoring, bounce suppression, and authentication.

Self-Hosted IP Blacklisted: How to Delist and Prevent Relisting

By Braedon·Mailflow Authority·Self-Hosted SMTP

Blacklisted: Don't Panic, Fix Systematically

Getting blacklisted on a self-hosted server is stressful but fixable. The key is fixing the root cause before requesting delisting — blacklists will relist you immediately if the underlying issue remains. For ongoing reputation management, see our infrastructure monitoring guide and deliverability guide.

Step 1: Identify the Listings

Check your IP against all major blacklists:

https://mxtoolbox.com/blacklists.aspx → enter your IP
https://check.spamhaus.org → enter your IP

Note which specific lists you're on. Not all blacklists are equal:

BlacklistImpactDelisting Method
Spamhaus SBLCritical — blocks at most providersManual removal form
Spamhaus XBLCritical — exploited hostAutomatic after fix
Spamhaus PBLHigh — policy block listManual removal form
Barracuda BRBLHigh — Barracuda users affectedSelf-service tool
SpamCopModerateAuto-expires in 24-48h
SORBSModerateManual request
UCEPROTECTLow-ModerateAuto-expires or paid removal
InvaluementModerateEmail request

Step 2: Find the Root Cause

Before requesting delisting, determine why you were listed. Check in this order:

Compromised Account

# Check Postfix logs for unusual sending
grep "sasl_username" /var/log/mail.log | awk '{print $NF}' | sort | uniq -c | sort -rn | head
# Look for accounts sending unexpected volume

If a user account is compromised and sending spam, disable it immediately. Change the password, check for forwarding rules, and investigate how it was compromised (weak password, phished credentials).

Inherited IP Reputation

If you just provisioned this VPS and the IP was blacklisted before you used it:

  • Note the listing date — if it predates your VPS creation, it's inherited
  • Submit delisting requests explaining you're a new IP assignee
  • If the provider's entire range is listed, request a different IP

Open Relay

# Test if your server is an open relay
# From an external server:
telnet YOUR.SERVER.IP 25
EHLO test
MAIL FROM:<[email protected]>
RCPT TO:<[email protected]>
# If you get 250 OK without authenticating, you're an open relay

Fix: Ensure Postfix requires authentication for relaying:

smtpd_relay_restrictions = permit_mynetworks, permit_sasl_authenticated, reject_unauth_destination

Bad Sending List

High bounce rates from invalid addresses trigger blacklisting. Check your bounce rate:

grep "status=bounced" /var/log/mail.log | wc -l
grep "status=sent" /var/log/mail.log | wc -l
# Bounce rate should be under 2%

Spam Trap Hits

If you're sending to purchased or scraped lists, you've likely hit spam traps. There's no way to identify which addresses are traps — you need to clean your entire list or switch to confirmed opt-in addresses only.

Step 3: Request Delisting

Spamhaus

  1. Go to Spamhaus Removal Center
  2. Enter your IP
  3. Click the removal link for your listing
  4. Describe what caused the listing and what you've fixed
  5. Submit — typically processed within 24-48 hours

Spamhaus XBL listings (compromised hosts) auto-remove once the exploit is fixed and the IP stops sending spam.

Barracuda

  1. Go to Barracuda Central
  2. Enter your IP
  3. If listed, click "Request Removal"
  4. Fill in the form
  5. Usually processed within 12-24 hours

SpamCop

SpamCop listings auto-expire 24-48 hours after the last complaint. You can't manually request removal. Fix the cause and wait.

SORBS

Email [email protected] with your IP, explanation of the issue, and what you've fixed. Or use their web form.

Step 4: Prevent Relisting

Automated Monitoring

Set up weekly (or daily) blacklist monitoring:

  • MXToolbox Monitoring — free tier monitors one IP with email alerts
  • Cron-based check:
    # Add to crontab - daily blacklist check
    0 8 * * * curl -s "https://api.mxtoolbox.com/api/v1/Lookup/blacklist/?argument=YOUR.IP" -H "Authorization: YOUR_API_KEY" | grep -q "Listed" && echo "BLACKLISTED" | mail -s "ALERT: IP Blacklisted" [email protected]
    

Bounce Processing

Suppress hard bounces immediately. Configure your MTA or application to:

  1. Remove addresses that hard bounce (5xx)
  2. Remove addresses that soft bounce 3+ times
  3. Never retry delivery to addresses that return "user unknown"

Rate Limiting

Limit outbound sending to prevent accidental bursts:

# Postfix rate limiting
smtp_destination_concurrency_limit = 5
smtp_destination_rate_delay = 1s

Account Security

  • Require strong passwords for all email accounts
  • Enable two-factor authentication if your platform supports it
  • Monitor login attempts (Fail2ban)
  • Review sent mail folders periodically for unexpected outbound email

Practitioner note: The fastest way to get relisted after delisting is to not fix the root cause. I've seen senders delist from Spamhaus three times in a month because they kept requesting removal without investigating the compromised account that was sending spam through their server. Fix first, delist second.

Practitioner note: Spamhaus PBL listings deserve special attention. The PBL isn't a spam blacklist — it's a policy list of IP ranges that shouldn't be sending email directly. If your VPS IP is on the PBL, it might be because your provider's range is classified as dynamic/residential. You can request removal by proving it's a static server IP with a legitimate mail server.

If your self-hosted IP keeps getting blacklisted and you can't identify the root cause, schedule a consultation — I'll do a full server audit to find the source of the problem.

Sources


v1.0 · April 2026

Frequently Asked Questions

How do I check if my IP is blacklisted?

Use MXToolbox Blacklist Check (mxtoolbox.com/blacklists.aspx) — it checks your IP against 80+ blacklists simultaneously. Also check Spamhaus directly at check.spamhaus.org, as it's the most impactful blacklist for email deliverability.

Which blacklists matter most?

Spamhaus (SBL, XBL, PBL) is the most widely used. Barracuda (BRBL) is second. SpamCop and SORBS are relevant but less impactful. Being on Spamhaus alone can block delivery to most major providers. Many smaller blacklists auto-expire and have minimal impact.

How long does delisting take?

Spamhaus: 24-48 hours after request if the issue is fixed. Barracuda: 12-24 hours via self-service removal. SpamCop: automatic after 24-48 hours of no new reports. SORBS: 24-48 hours. Some lists require waiting periods before allowing removal requests.

My IP was blacklisted when I got the VPS. What do I do?

Request delisting for inherited listings — most blacklists accept removal requests for new IP assignments. If Spamhaus PBL lists your IP, it may be because your VPS provider's range is listed for residential/dynamic IPs. Contact your provider or request a different IP.

How do I prevent getting blacklisted again?

Monitor blacklists weekly (automate with MXToolbox monitoring), process bounces immediately, enforce authentication, check for compromised accounts, rate-limit outbound email, and maintain clean sending lists.

Want this handled for you?

Free 30-minute strategy call. Walk away with a plan either way.