1. Library
  2. Email Protocols
  3. Deliverability

Updated 10 hours ago

Spam filters aren't trying to catch spam. They're trying to predict whether you'll be annoyed.

Every signal they analyze—authentication records, IP reputation, word choice, sending patterns, user behavior—is a proxy for one question: Did this person actually want this email?

Understanding this reframes the entire deliverability problem. You're not trying to "beat" spam filters. You're trying to send email that people want to receive.

The Authentication Question

Before filters even read your message, they ask: Is this really from who it claims to be from?

Email was designed in an era of trust. Anyone can send a message claiming to be from any address. Authentication protocols—SPF, DKIM, and DMARC—retrofit verification onto this trusting system.

SPF answers: "Is this IP address allowed to send mail for this domain?" If your message comes from an IP not listed in the domain's SPF record, you've failed the first test.

DKIM answers: "Was this message tampered with in transit?" A cryptographic signature proves the message arrived as it was sent.

DMARC ties them together: "Do SPF and DKIM results align with the From address?" And crucially, it tells receivers what to do when authentication fails—nothing, quarantine, or reject.

When authentication fails, the filter's suspicion is reasonable. Legitimate senders authenticate their mail. Spammers and phishers often can't.

The Reputation Question

Next question: Has this sender behaved well in the past?

Reputation attaches to both IP addresses and domains. It's built through consistent good behavior and destroyed by complaints, bounces, and spam trap hits.

Blacklists are the most severe reputation signal. If your IP appears on Spamhaus, SpamCop, or similar lists, major providers won't even attempt delivery. You're guilty until proven innocent.

Complaint rates measure how often recipients hit the "Report Spam" button. Even 0.1% complaint rates can damage reputation. This is direct feedback from users saying "I didn't want this."

Bounce rates reveal list quality. Sending to addresses that don't exist suggests you're guessing, scraping, or using stale data—none of which indicate wanted mail.

Spam traps are the honeypots of email. Some are recycled addresses abandoned so long that any mail to them couldn't possibly be opted-in. Others are pristine addresses published only in hidden corners of websites, waiting to catch scrapers. Mail to spam traps is proof of list sins.

New IP addresses and domains face a cold-start problem. No history means no trust. Filters treat unknown senders suspiciously until they prove themselves through consistent, authenticated, low-complaint sending.

The Content Question

Filters ask: Does this message look like something people want to read?

Content filtering has evolved beyond simple keyword matching, but certain patterns still raise suspicion because spammers still use them:

Spam trigger language isn't about individual words but about density and context. "Free" in an email from your bank is fine. "FREE!!! ACT NOW!!! GUARANTEED WINNER!!!" is not. The all-caps, excessive punctuation, and urgency markers are the real signals.

Poor text-to-image ratios suggest you're hiding your message from text analysis. An email that's entirely one big image with a tiny text footer looks like it has something to hide.

Shortened URLs obscure destinations. Spammers use them to hide malicious links. Legitimate senders can use their own domains.

Invisible text—white text on white backgrounds, tiny fonts, hidden divs—is a classic spam technique. Filters look for it.

The content question is really asking: Is this the kind of message a real person would send to someone they know?

The Technical Question

Filters ask: Is this mail server configured like a legitimate operation?

Misconfiguration signals carelessness or intentional evasion:

Reverse DNS should exist and match. If your IP address doesn't resolve to a hostname that resolves back to that IP, you look like a compromised home computer or throwaway server.

HELO/EHLO identity should be a valid hostname, not an IP address or "localhost." Legitimate mail servers identify themselves properly.

Headers should be complete and well-formed. Missing Message-ID, malformed Date, or broken HTML suggest hastily assembled spam infrastructure.

Reply addresses should work. A From address that bounces replies or a Reply-To pointing to oblivion signals that you don't actually want to hear back—which correlates with not caring whether recipients wanted to hear from you.

The Engagement Question

Modern filters ask: Does this recipient actually engage with mail from this sender?

This is the most sophisticated and hardest-to-game signal. Gmail pioneered it, and others followed.

Open rates matter. If you send 1,000 emails and 5 people open them, filters learn that your mail isn't wanted.

Reply rates matter. Mail that generates replies is mail between people who know each other.

Delete-without-reading matters. Messages immediately deleted teach filters to skip your future mail.

Complaint rates matter most. When recipients click "Report Spam," they're directly telling the filter to block you.

This creates a feedback loop. Poor engagement leads to worse placement leads to poorer engagement. Breaking the cycle requires sending mail people actually want—not tricks.

The Behavior Question

Filters ask: Does this sending pattern look like legitimate communication?

Volume spikes trigger suspicion. An account that sends 100 emails per day suddenly sending 10,000 looks compromised. Legitimate volume increases happen gradually.

Burst sending looks automated. Real correspondence is spread over time. Dumping 50,000 messages in five minutes looks like a spam cannon.

Inconsistent patterns—long silence followed by sudden campaigns—look like a dormant account activated for spam.

High invalid-address rates reveal that you're sending to addresses without verification. Legitimate senders confirm addresses before sending.

The Consent Question

Underlying everything: Did this person actually ask for this email?

Single opt-in means someone typed an email address into a form. It doesn't prove the address owner did it. Confirmed opt-in (double opt-in) sends a verification email—only addresses that click the confirmation link get added.

Purchased lists are radioactive. They contain spam traps, invalid addresses, and people who never consented. Buying a list is buying deliverability problems.

Scraped addresses are worse. Harvesting emails from websites guarantees you're mailing people who never asked to hear from you.

Vague consent creates friction. If someone signed up for product updates and you send them marketing emails, you've violated their expectations even if technically permissible.

Working unsubscribe is legally required and practically essential. Broken unsubscribe links force users to report spam instead—the worst outcome for your reputation.

What This Means for You

Stop thinking about "getting past" spam filters. Start thinking about sending email people want.

Authenticate everything. SPF, DKIM, and DMARC should be implemented correctly for every domain you send from. Monitor DMARC reports. Fix failures.

Protect reputation obsessively. Monitor blacklists. Handle bounces immediately. Remove complainers. Warm up new IPs gradually.

Write like a human. Natural language, normal punctuation, balanced text and images, real URLs.

Configure correctly. Reverse DNS, valid HELO, complete headers, working reply addresses.

Earn engagement. Send relevant content to people who want it. Remove subscribers who don't engage. Make it easy to adjust preferences or leave.

Send predictably. Consistent volumes, gradual increases, spread over time.

Get real consent. Double opt-in. Never buy lists. Clear expectations at signup.

Spam filters are remarkably good at their job. When your legitimate email lands in spam, it's usually because something about your sending—authentication, reputation, content, engagement, or consent—resembles the patterns of mail people don't want.

Fix the resemblance by actually being what you claim to be: a sender of wanted email.

Frequently Asked Questions About Email Spam Filtering

Was this page helpful?

😔
🤨
😃