Four major lists in
Four major lists in one query — Spamhaus ZEN, SpamCop, Barracuda, SORBS.
500+ fast, free tools. Most run in your browser only; Image & PDF tools upload files to the backend when you run them.
Check an IPv4 address against four major DNS-based blocklists in parallel — Spamhaus ZEN, SpamCop, Barracuda, and SORBS — and surface delisting hints.
The RBL Blacklist Check queries an IPv4 against four widely respected DNS-based blocklists in parallel: Spamhaus ZEN (the umbrella of SBL, XBL, and PBL), SpamCop's bl.spamcop.net, Barracuda's b.barracudacentral.org, and SORBS's dnsbl.sorbs.net. Each lookup reverses the IP octets and queries it as a hostname under the RBL zone — the standard DNSBL protocol. A 127.0.0.x A record means listed; NXDOMAIN means clean. The tool also pulls the TXT record from each list, usually containing a listing reason and a delisting URL. Use it when your sending IP starts producing 5.7.1 rejections, when an inbound mail server you operate is being refused at recipient gateways, or when you take over an IP from a previous tenant and want to confirm it isn't already poisoned. Queries run in parallel from our backend; the IP and listing results stay private to your session.
Four major lists in one query — Spamhaus ZEN, SpamCop, Barracuda, SORBS.
Parallel execution keeps the wall-clock under a couple of seconds.
Pulls the listing-reason TXT record so you know what triggered the listing.
Distinguishes ERROR (DNS failure) from CLEAN (NXDOMAIN) so you don't get false-clean results.
Pairs with SMTP Server Test and Email Header Analyzer for full deliverability triage.
No signup, no rate-limit beyond abuse protection — usable in an active incident.
Input: 8.8.8.8
Output: Listed on 0 of 4 RBLs — clean across Spamhaus ZEN, SpamCop, Barracuda, SORBS
Input: 203.0.113.42
Output: Listed on 1 of 4 RBLs · Spamhaus ZEN: LISTED · TXT: 'See https://www.spamhaus.org/sbl/query/SBL12345'
Input: 198.51.100.7
Output: Listed on 3 of 4 RBLs · Spamhaus ZEN, SpamCop, Barracuda all flagged this IP