Suped

Which domains use Invaluement lists for email filtering and what is their impact?

Matthew Whittaker profile picture
Matthew Whittaker
Co-founder & CTO, Suped
Published 24 Jul 2025
Updated 21 May 2026
8 min read
Editorial thumbnail about domains using Invaluement email filtering lists.
The direct answer is that there is no reliable public directory of domains that use Invaluement lists. Historical recipient evidence has pointed to Cox and bigpond.com as large consumer mailbox domains that have used Invaluement filtering. I would treat both as reported or historical examples, not as a permanent current-provider list.
The impact is real when the receiving system checks Invaluement lists during SMTP filtering or spam scoring. A listed sending IP, nearby /24 range, or linked domain can cause a hard block, a higher spam score, or inbox placement loss. For broader blocklist monitoring, I treat Invaluement as a meaningful signal that still needs log evidence before I call it the root cause.

Short answer

  1. Known examples: Cox and bigpond.com have been reported in sender evidence as Invaluement users.
  2. Hidden users: Many recipients use outsourced filters, so the end domain often does not show the DNSBL name.
  3. Impact level: A confirmed hit matters, but it is rarely the only factor behind a delivery problem.
  4. Best proof: Use SMTP replies, spam headers, seed results, and real recipient logs before escalating.

Which domains use Invaluement

When someone asks which domains use Invaluement, I separate the answer into confirmed public policy, historical delivery evidence, and inferred filtering behavior. The first bucket is thin because mailbox providers rarely publish the blocklist and blacklist rules inside their inbound filters. The second bucket is more useful: sender logs, bounce messages, and spam headers sometimes expose the list name.

Domain

Evidence type

Likely impact

Cox
Historical
Reject or score
bigpond.com
Historical
Reject or score
Regional ISPs
Log-based
Spam scoring
Business domains
Gateway-based
Quarantine
Use this as a practical evidence map, not a current provider directory.
The important caveat is that a recipient domain does not need to expose Invaluement in a bounce. A filtering gateway can check the list, add internal points, and then return a generic 550 rejection or place the message in junk. That is why I do not recommend building a sender policy around a static list of recipient domains. I recommend proving whether a specific campaign, source IP, or linked domain was affected.
This matters more for B2C senders with old ISP audiences, mixed shared-IP traffic, or URLs that change often. If you send mostly to business recipients, the effect is more likely to appear through a security gateway or hosted filter rather than a consumer mailbox domain that publicly names the list.
Screenshot-style view of the Invaluement website listing ivmURI, ivmSIP, and ivmSIP/24.
Screenshot-style view of the Invaluement website listing ivmURI, ivmSIP, and ivmSIP/24.

What Invaluement checks

Invaluement is not one list. It has three DNSBL-style lists: ivmSIP for sender IPs, ivmSIP/24 for nearby IP ranges, and ivmURI for domains or IPs found inside message links. That split is important because each list points to a different fix. An IP listing is not remediated the same way as a URL listing.
A sender who only checks the outbound IP misses a large part of the risk. The URI list can affect a message even when the SMTP source passes SPF, DKIM, and DMARC. For a primer on the category, see email blocklists and Invaluement's own explanation of DNSBL mechanics.

IP-based hit

  1. What it checks: The connecting mail server IP or a nearby sending range.
  2. What it means: The sender source has poor recent mail behavior or shares a risky range.
  3. What to fix: Stop bad traffic, isolate clean streams, and work with the IP owner.

URI-based hit

  1. What it checks: Domains, hosts, or IPs found in visible or redirected message links.
  2. What it means: A linked asset, redirector, or compromised site is tied to abusive mail.
  3. What to fix: Clean the destination, remove risky redirects, and test every template.
Headers and bounce cluestext
550 5.7.1 Message rejected by local spam policy 554 5.7.1 Sender listed by ivmSIP X-Spam-Status: score=8.4 tests=IVM_URI,DKIM_VALID,SPF_PASS X-Filter-Reason: URI reputation rule matched
Those strings are examples of the kind of evidence I look for. Many receiving systems use different wording, and some expose no list name at all. The absence of the word Invaluement in a bounce does not clear the listing. It only means the bounce is not enough by itself.

How to confirm the impact

I start with the recipient-level evidence instead of a general blacklist check. The same listing can produce very different outcomes across mailbox providers, and some providers use it only as one signal among many. A campaign that has a clean Gmail result can still fail at an ISP that uses stricter DNSBL scoring.
  1. Collect bounces: Group SMTP rejections by recipient domain, enhanced status code, and raw diagnostic text.
  2. Check headers: Use delivered junk-folder samples to inspect spam tests and internal filter labels.
  3. Separate assets: Test the sending IP, the visible link domains, and each redirect destination separately.
  4. Compare recipients: Look for failures concentrated at Cox, bigpond.com, or similar ISP audiences.
  5. Retest after cleanup: Do not call a fix complete until new mail shows a different result.
Blocklist checker
Check your domain or IP against 144 blocklists.
www.spamhaus.org logoSpamhaus0spam.org logo0Spam
Blocklist icon
Abusix
Blocklist icon
Barracuda Networks
www.spamcop.net logoCisco
Blocklist icon
Mailspike
www.nosolicitado.org logoNoSolicitado
Blocklist icon
SURBL
Blocklist icon
UCEPROTECT
uribl.com logoURIBL
Blocklist icon
8086 Consultancy
abuse.ro logoabuse.rowiki.alphanet.ch logoALPHANETanonmails.de logoAnonmailsascams.com logoAscamswww.blockedservers.com logoBLOCKEDSERVERS
Blocklist icon
Brukalai.lt
dnsbl.calivent.com.pe logoCalivent Networks
Blocklist icon
dan.me.uk
Blocklist icon
DrMx
Blocklist icon
DroneBL
rbl.efnetrbl.org logoEFnet
Blocklist icon
Fabel
Blocklist icon
GBUdb
Blocklist icon
ImproWare
Blocklist icon
JIPPG Technologies
Blocklist icon
Junk Email Filter
www.justspam.org logoJustSpamwww.kempt.net logoKempt.net
Blocklist icon
Mail Baby
www.nordspam.com logoNordSpam
Blocklist icon
nsZones
Blocklist icon
Polspam
Blocklist icon
RedHawk
rv-soft.info logoRV-SOFT Technology
Blocklist icon
Schulte
www.scientificspam.net logoScientific Spam
Blocklist icon
Spam Eating Monkey
psbl.org logoSpamikazewww.spamrats.com logoSpamRATSspfbl.net logoSPFBLsuomispam.net logoSuomispamwww.usenix.org.uk logoSystem 5 Hosting
Blocklist icon
Taughannock Networks
www.team-cymru.com logoTeam Cymru
Blocklist icon
Tornevall Networks
senderscore.org logoValiditywww.blocklist.de logowww.blocklist.de Fail2Ban-Reporting Servicezapbl.net logoZapBL2stepback.dk logo2stepback.dkfaynticrbl.org logoFayntic Servicesorbz.gst-group.co.uk logoORB UKdnsbl.technoirc.org logotechnoirc.orgwww.techtheft.info logoTechTheftwww.spamhaus.org logoSpamhaus0spam.org logo0Spam
Blocklist icon
Abusix
Blocklist icon
Barracuda Networks
www.spamcop.net logoCisco
Blocklist icon
Mailspike
www.nosolicitado.org logoNoSolicitado
Blocklist icon
SURBL
Blocklist icon
UCEPROTECT
uribl.com logoURIBL
Blocklist icon
8086 Consultancy
abuse.ro logoabuse.rowiki.alphanet.ch logoALPHANETanonmails.de logoAnonmailsascams.com logoAscamswww.blockedservers.com logoBLOCKEDSERVERS
Blocklist icon
Brukalai.lt
dnsbl.calivent.com.pe logoCalivent Networks
Blocklist icon
dan.me.uk
Blocklist icon
DrMx
Blocklist icon
DroneBL
rbl.efnetrbl.org logoEFnet
Blocklist icon
Fabel
Blocklist icon
GBUdb
Blocklist icon
ImproWare
Blocklist icon
JIPPG Technologies
Blocklist icon
Junk Email Filter
www.justspam.org logoJustSpamwww.kempt.net logoKempt.net
Blocklist icon
Mail Baby
www.nordspam.com logoNordSpam
Blocklist icon
nsZones
Blocklist icon
Polspam
Blocklist icon
RedHawk
rv-soft.info logoRV-SOFT Technology
Blocklist icon
Schulte
www.scientificspam.net logoScientific Spam
Blocklist icon
Spam Eating Monkey
psbl.org logoSpamikazewww.spamrats.com logoSpamRATSspfbl.net logoSPFBLsuomispam.net logoSuomispamwww.usenix.org.uk logoSystem 5 Hosting
Blocklist icon
Taughannock Networks
www.team-cymru.com logoTeam Cymru
Blocklist icon
Tornevall Networks
senderscore.org logoValiditywww.blocklist.de logowww.blocklist.de Fail2Ban-Reporting Servicezapbl.net logoZapBL2stepback.dk logo2stepback.dkfaynticrbl.org logoFayntic Servicesorbz.gst-group.co.uk logoORB UKdnsbl.technoirc.org logotechnoirc.orgwww.techtheft.info logoTechTheftwww.spamhaus.org logoSpamhaus0spam.org logo0Spam
Blocklist icon
Abusix
Blocklist icon
Barracuda Networks
www.spamcop.net logoCisco
Blocklist icon
Mailspike
www.nosolicitado.org logoNoSolicitado
Blocklist icon
SURBL
Blocklist icon
UCEPROTECT
uribl.com logoURIBL
Blocklist icon
8086 Consultancy
abuse.ro logoabuse.rowiki.alphanet.ch logoALPHANETanonmails.de logoAnonmailsascams.com logoAscamswww.blockedservers.com logoBLOCKEDSERVERS
Blocklist icon
Brukalai.lt
dnsbl.calivent.com.pe logoCalivent Networks
Blocklist icon
dan.me.uk
Blocklist icon
DrMx
Blocklist icon
DroneBL
rbl.efnetrbl.org logoEFnet
Blocklist icon
Fabel
Blocklist icon
GBUdb
Blocklist icon
ImproWare
Blocklist icon
JIPPG Technologies
Blocklist icon
Junk Email Filter
www.justspam.org logoJustSpamwww.kempt.net logoKempt.net
Blocklist icon
Mail Baby
www.nordspam.com logoNordSpam
Blocklist icon
nsZones
Blocklist icon
Polspam
Blocklist icon
RedHawk
rv-soft.info logoRV-SOFT Technology
Blocklist icon
Schulte
www.scientificspam.net logoScientific Spam
Blocklist icon
Spam Eating Monkey
psbl.org logoSpamikazewww.spamrats.com logoSpamRATSspfbl.net logoSPFBLsuomispam.net logoSuomispamwww.usenix.org.uk logoSystem 5 Hosting
Blocklist icon
Taughannock Networks
www.team-cymru.com logoTeam Cymru
Blocklist icon
Tornevall Networks
senderscore.org logoValiditywww.blocklist.de logowww.blocklist.de Fail2Ban-Reporting Servicezapbl.net logoZapBL2stepback.dk logo2stepback.dkfaynticrbl.org logoFayntic Servicesorbz.gst-group.co.uk logoORB UKdnsbl.technoirc.org logotechnoirc.orgwww.techtheft.info logoTechTheftwww.spamhaus.org logoSpamhaus0spam.org logo0Spam
Blocklist icon
Abusix
Blocklist icon
Barracuda Networks
www.spamcop.net logoCisco
Blocklist icon
Mailspike
www.nosolicitado.org logoNoSolicitado
Blocklist icon
SURBL
Blocklist icon
UCEPROTECT
uribl.com logoURIBL
Blocklist icon
8086 Consultancy
abuse.ro logoabuse.rowiki.alphanet.ch logoALPHANETanonmails.de logoAnonmailsascams.com logoAscamswww.blockedservers.com logoBLOCKEDSERVERS
Blocklist icon
Brukalai.lt
dnsbl.calivent.com.pe logoCalivent Networks
Blocklist icon
dan.me.uk
Blocklist icon
DrMx
Blocklist icon
DroneBL
rbl.efnetrbl.org logoEFnet
Blocklist icon
Fabel
Blocklist icon
GBUdb
Blocklist icon
ImproWare
Blocklist icon
JIPPG Technologies
Blocklist icon
Junk Email Filter
www.justspam.org logoJustSpamwww.kempt.net logoKempt.net
Blocklist icon
Mail Baby
www.nordspam.com logoNordSpam
Blocklist icon
nsZones
Blocklist icon
Polspam
Blocklist icon
RedHawk
rv-soft.info logoRV-SOFT Technology
Blocklist icon
Schulte
www.scientificspam.net logoScientific Spam
Blocklist icon
Spam Eating Monkey
psbl.org logoSpamikazewww.spamrats.com logoSpamRATSspfbl.net logoSPFBLsuomispam.net logoSuomispamwww.usenix.org.uk logoSystem 5 Hosting
Blocklist icon
Taughannock Networks
www.team-cymru.com logoTeam Cymru
Blocklist icon
Tornevall Networks
senderscore.org logoValiditywww.blocklist.de logowww.blocklist.de Fail2Ban-Reporting Servicezapbl.net logoZapBL2stepback.dk logo2stepback.dkfaynticrbl.org logoFayntic Servicesorbz.gst-group.co.uk logoORB UKdnsbl.technoirc.org logotechnoirc.orgwww.techtheft.info logoTechTheftwww.spamhaus.org logoSpamhaus0spam.org logo0Spam
Blocklist icon
Abusix
Blocklist icon
Barracuda Networks
www.spamcop.net logoCisco
Blocklist icon
Mailspike
www.nosolicitado.org logoNoSolicitado
Blocklist icon
SURBL
Blocklist icon
UCEPROTECT
uribl.com logoURIBL
Blocklist icon
8086 Consultancy
abuse.ro logoabuse.rowiki.alphanet.ch logoALPHANETanonmails.de logoAnonmailsascams.com logoAscamswww.blockedservers.com logoBLOCKEDSERVERS
Blocklist icon
Brukalai.lt
dnsbl.calivent.com.pe logoCalivent Networks
Blocklist icon
dan.me.uk
Blocklist icon
DrMx
Blocklist icon
DroneBL
rbl.efnetrbl.org logoEFnet
Blocklist icon
Fabel
Blocklist icon
GBUdb
Blocklist icon
ImproWare
Blocklist icon
JIPPG Technologies
Blocklist icon
Junk Email Filter
www.justspam.org logoJustSpamwww.kempt.net logoKempt.net
Blocklist icon
Mail Baby
www.nordspam.com logoNordSpam
Blocklist icon
nsZones
Blocklist icon
Polspam
Blocklist icon
RedHawk
rv-soft.info logoRV-SOFT Technology
Blocklist icon
Schulte
www.scientificspam.net logoScientific Spam
Blocklist icon
Spam Eating Monkey
psbl.org logoSpamikazewww.spamrats.com logoSpamRATSspfbl.net logoSPFBLsuomispam.net logoSuomispamwww.usenix.org.uk logoSystem 5 Hosting
Blocklist icon
Taughannock Networks
www.team-cymru.com logoTeam Cymru
Blocklist icon
Tornevall Networks
senderscore.org logoValiditywww.blocklist.de logowww.blocklist.de Fail2Ban-Reporting Servicezapbl.net logoZapBL2stepback.dk logo2stepback.dkfaynticrbl.org logoFayntic Servicesorbz.gst-group.co.uk logoORB UKdnsbl.technoirc.org logotechnoirc.orgwww.techtheft.info logoTechTheft
After checking the listing itself, I also run a broader domain health check. That catches the common situation where a blocklist hit is only one piece of the failure. Missing DMARC reporting, a broken DKIM selector, a weak SPF setup, or a suspicious redirect domain can make the same recipient filter much less forgiving.
Flowchart showing how to confirm an Invaluement filtering impact.
Flowchart showing how to confirm an Invaluement filtering impact.
A real sent-message test helps when the problem is not visible in DNS alone. Use an email tester to inspect authentication, headers, content signals, and link behavior in one sample message. Then compare that with live recipient logs, because seed tests do not cover every private rule used by each mailbox domain.

How severe a listing is

Invaluement is not as universally visible as the largest DNSBLs, but I do not ignore it. Its practical severity depends on which list is hit, which recipients are affected, whether the recipient blocks at SMTP time, and whether the same campaign has other weak signals.

Invaluement impact severity

Use recipient evidence, not the existence of a listing alone, to size the operational response.
Low
Monitor
No affected recipient pattern and no matching bounces.
Medium
Investigate
Spam-folder movement at a small set of recipients.
High
Fix now
Named list hit in bounces or headers at real recipients.
Critical
Pause source
High-volume SMTP rejects at a key ISP audience.
The hardest cases are URI listings. A sender can have a clean IP and valid authentication, then still fail because a link domain, redirector, image host, or tracking host has poor reputation. This is why blacklist and blocklist troubleshooting has to include message content, not only the SMTP source.
For priority setting, compare the affected recipient share with the evidence quality. A single generic bounce at a tiny domain is not the same as repeated rejects at a consumer ISP. For a broader priority model, see how I prioritize blocklists across real sending programs.

What to do if Invaluement is involved

The wrong response is to request delisting first and investigate later. A delist request without proof of cleanup invites recurrence. I start by identifying whether the listing points to the sending IP, a sending range, or a linked domain. Then I remove the cause before I ask for review.

Cleanup order

  1. Pause risky traffic: Stop the campaign, source, or customer stream tied to the listing evidence.
  2. Inspect links: Remove abused redirectors, compromised pages, and stale tracking domains.
  3. Fix authentication: Make sure SPF, DKIM, and DMARC pass for the sending identity.
  4. Document evidence: Keep timestamps, headers, sample messages, and cleanup proof ready for review.
  5. Retest recipients: Confirm the affected domains accept new mail before returning to normal volume.
If the hit is IP-based and you use shared infrastructure, the fastest route is usually through the provider that controls the IP. If the hit is URI-based, the fix is inside your template, redirect chain, or web hosting account. A domain that appears only in a footer link can still affect the message.
The same workflow applies to any blacklist workflow: confirm the listing, find the actual asset, remove the cause, ask for review, and watch the next send. Skipping the cause analysis is how a blocklist problem becomes a repeating blacklist problem.
Investigation checklisttext
Recipient domains affected: First failure time: Sending IPs involved: Link domains involved: Redirect destinations checked: Authentication result: Cleanup completed: Retest result:

Where Suped fits

Suped is useful here because a blocklist event on its own is easy to overread. In Suped's product, I can look at blocklist monitoring next to DMARC reporting, SPF health, DKIM results, verified sources, and real issue history. That combination is what turns a vague delivery complaint into a concrete fix path.
Blocklist monitoring page showing domain and IP checks across blocklists with importance and status
Blocklist monitoring page showing domain and IP checks across blocklists with importance and status
For most teams asking this question, Suped is the most practical overall choice because it brings the related workflows together: automated issue detection, real-time alerts, DMARC monitoring, hosted DMARC, hosted SPF, SPF flattening, hosted MTA-STS, and blocklist monitoring. MSPs also get multi-tenant reporting, which matters when the same reputation issue affects several client domains.
The goal is not to panic every time a blacklist or blocklist name appears. The goal is to know whether the listing is affecting mail, which asset caused it, and which change fixed it. That is where a unified view saves time.

Views from the trenches

Best practices
Confirm the exact list name in SMTP logs before treating Invaluement as the cause.
Separate IP, /24, and URL evidence because each needs its own cleanup path and proof.
Keep strong authentication in place so blocklist signals are not paired with doubt.
Common pitfalls
Assuming every spam-folder placement is an Invaluement block wastes investigation time.
Only checking the sending IP misses ivmURI listings caused by domains in message links.
Leaving old redirectors in templates keeps reputation damage alive after cleanup work.
Expert tips
Use seed tests plus real recipient logs because providers rarely expose every rule.
Keep delist requests, cleanup proof, and the first clean sending date in one record.
Monitor blocklist and blacklist status with DMARC, SPF, and DKIM results together.
Marketer from Email Geeks says Cox has historically appeared in evidence as an Invaluement user, but sender logs are still the proof point.
2020-04-10 - Email Geeks
Marketer from Email Geeks says bigpond.com has been seen using Invaluement, so large ISP audiences deserve recipient-level checks.
2020-04-10 - Email Geeks

Practical takeaway

Cox and bigpond.com are the concrete large-domain examples I would treat as historically associated with Invaluement filtering. Beyond that, the exact user base is opaque because DNSBL checks are usually part of private inbound filtering. The right answer is not a memorized provider list. The right answer is a repeatable investigation process.
If Invaluement appears in a bounce, header, or seed result, take it seriously. Check whether the hit is ivmSIP, ivmSIP/24, or ivmURI. Fix the source, link, or range issue, then retest the recipient domains that failed. If it does not appear anywhere, keep it on the checklist, but do not let it distract from authentication, content, complaints, and engagement evidence.

Frequently asked questions

DMARC monitoring

Start monitoring your DMARC reports today

Suped DMARC platform dashboard

What you'll get with Suped

Real-time DMARC report monitoring and analysis
Automated alerts for authentication failures
Clear recommendations to improve email deliverability
Protection against phishing and domain spoofing