In a pair of posts at Email Marketing Reports, Mark Brownlow discusses the subject of spam traps. He says there are two main types:

Honeypots. "Some [anti-spam] organizations put specific email addresses on a website for the sole purpose of attracting harvesting software," he explains. Spammers may then capture these "honeypot" addresses and add them to a mailing list without permission. Advice: don't buy email lists.

Dormant Addresses. When an account falls into disuse, users stop sending email, but spammers keep spamming. To catch them, webmail services might repurpose a dead account as a spam trap. Advice: regularly clean the lists you have. 

Even if you're following best practices for permission-based marketing, spam traps still present a potential challenge. For instance, a malicious entity might submit a subscription request, prompting your double opt-in process to deliver an automatic confirmation to a spam trap's inbox. So how can you manage this risk? Brownlow turned to George Bilbrey of Return Path for some advice, including:

  • Use a different mail server with a different Internet Protocol (IP) for confirmation messages. In a worst-case scenario, only your welcome message gets flagged.
  • Check addresses for obviously malicious entries. They often contain identifiable keywords like trap, honeypot or abuse.

The Po!nt: Beware the trap! As Return Path reports, "We found a 20-point difference in delivery rates for IPs with just one spam trap hit."

→ end article preview
Read the Full Article

Membership is required to access this how-to marketing article ... don't worry though, it's FREE!

Take the first step (it's free).

Already a member? Sign in now.

Sign in with your preferred account, below.