SharpSpring strives to maintain a secure email system for all senders. By limiting potential abuse, we can provide high email deliverability for all good senders. This article will provide information on the results of abuse.
The following users can create and send emails:
- Marketing Managers
One way SharpSpring maintains security is by proactively checking the sending domain an email is about to use. Consider the sending address From:email@example.com. SharpSpring would check the example.com domain.
While extremely uncommon, you may receive in-application messaging if the sending domain can not be used. These domains are considered as blocked.
Some examples of addresses that may be flagged and blocked include:
- Domains that may be used for phishing or fraud
- SharpSpring.com domains (or other domains that SharpSpring uses as a company)
- Disposable email addresses
- Domains with DMARC rejection policies
However, any domains that have been verified and authenticated may be used without concern.
Blacklists are third-party data sources that inform receiving email servers whether the sender or the email content should be considered as spam. As a third-party, these data sources do not actually block email, but email servers may choose to accept or reject the recommendations from blacklists.
There are hundreds of blacklists in every range of sophistication. They can range from cutting-edge, enterprise-grade systems using artificial intelligence to hobbyist blacklists run as personal projects. Some blacklists provide data on suspicious Internet protocol (IP) ranges, whereas others list sending domains found in email headers. Others list domain names found in email content, such as clickable links.
Spam filters often implement several blacklists simultaneously to provide comprehensive data on all parts of an email. Filters often ignore other blacklists that are inaccurate, out-of-date, or idiosyncratic.
If you suspect that your mail is being rejected due to a blacklist, contact SharpSpring’s Deliverability Support team. The team can investigate the evidence, provide best email practices to avoid blacklistings, and work with Internet service providers (ISPs) and blacklists for a resolution.