What Happens When You Hit Send: The Email Delivery Pipeline
You click "Send" on a campaign. Your ESP says "Sent - 25,000 emails delivered." And you move on to the next task, trusting that "delivered" means "in the inbox."
It doesn't. "Delivered" means the receiving server accepted the message. What it did with it after that - inbox, promotions tab, spam folder, or quietly dropped - is a whole different story. And the journey between your Send button and that final placement decision involves at least six stages where things can go right or very wrong.
Understanding this pipeline isn't just academic. It explains why your emails sometimes hit spam, why verification matters, and where the deliverability problems you're seeing actually originate.
Stage 1: Your ESP Prepares the Message
When you hit Send, your ESP doesn't fire 25,000 emails simultaneously. It queues them. Each email gets personalized (merge tags, dynamic content), wrapped in the proper SMTP headers (From, To, Subject, Message-ID, MIME type), and assigned to a sending IP from your ESP's pool.
This is where your sending infrastructure matters. If you're on a shared IP, your email joins a queue alongside messages from other senders. If you're on a dedicated IP, you control the entire pipeline. Either way, your ESP's Mail Transfer Agent (MTA) manages the actual transmission.
Stage 2: Authentication - Proving You're Legit
Before your email even leaves the building, your ESP stamps it with authentication credentials. Three protocols work together:
SPF (Sender Policy Framework) tells the receiving server which IP addresses are authorized to send email for your domain. It's a DNS record that says "these servers can send on behalf of @yourdomain.com."
DKIM (DomainKeys Identified Mail) adds a cryptographic signature to the email headers. The receiving server can verify this signature against a public key in your DNS records, confirming the message wasn't tampered with in transit.
DMARC (Domain-based Message Authentication, Reporting and Conformance) ties SPF and DKIM together and tells the receiving server what to do if authentication fails - reject the message, quarantine it, or let it through.
Stage 3: DNS Lookup and Mail Routing
Your ESP's MTA needs to find the recipient's mail server. It does this through a DNS lookup, specifically querying the MX (Mail Exchange) records for the recipient's domain.
If you're sending to john@company.com, the MTA queries DNS for company.com's MX records. The response might be something like "mail is handled by mx1.company.com at priority 10 and mx2.company.com at priority 20." The MTA connects to the highest-priority server first.
This is where invalid domains get caught. If company.com has no MX records or no DNS records at all, the email bounces immediately with a 550 5.1.2 error (domain does not exist). This is one of the checks that email verification catches before you ever hit Send - preventing these bounces from happening in the first place.
Stage 4: The SMTP Handshake
Now comes the actual conversation between servers. Your ESP's MTA connects to the recipient's mail server on port 25 (or 587 with TLS) and they exchange a series of SMTP commands:
HELO/EHLO: Your server identifies itself. The receiving server checks if your IP is blacklisted. If it is, connection refused - your email never gets in the door.
MAIL FROM: Your server states the sender address. The receiving server checks SPF against this address.
RCPT TO: Your server states the recipient address. The receiving server checks if this mailbox exists. If it doesn't: bounce (550 5.1.1). If the domain is catch-all, it accepts everything and sorts later.
DATA: Your server transmits the email content - headers, body, and attachments. The receiving server processes it and responds with either acceptance (250), temporary deferral (4xx), or permanent rejection (5xx).
This entire handshake takes 1-3 seconds per email. It's also the stage where Bulk Email Checker's real-time verification API operates - performing the same SMTP handshake to check if a mailbox exists, but without actually sending a message. Verification simulates this conversation to predict what would happen if you sent a real email.
Stage 5: Content and Reputation Filtering
The receiving server accepted your email. But "accepted" doesn't mean "inbox." Now the message goes through filtering - and this is where most deliverability battles are won or lost.
Reputation scoring: The receiving server checks your sending IP and domain against internal reputation databases, third-party blacklists (Spamhaus, Barracuda), and historical engagement data. A good reputation means favorable treatment. A bad one means spam folder or rejection.
Content analysis: Spam filters scan the email body for trigger patterns - excessive capitalization, known spam phrases, suspicious URLs, poor text-to-image ratios, and missing unsubscribe links. Modern filters like Gmail's use machine learning, so there's no simple list of "spam words" to avoid.
Engagement history: Gmail, in particular, weighs how previous recipients have interacted with your emails. If most people open and click, your new message gets favorable treatment. If most people ignore or delete, it leans toward spam. This is why list quality and engagement matter so much - they directly influence how every future email gets filtered.
Stage 6: Inbox Placement Decision
After filtering, the receiving server makes the final call. Your email lands in one of several places:
Primary inbox: The ideal outcome. Your message is treated as wanted, personal communication.
Promotions/Updates tab: Common for marketing emails in Gmail. Not spam, but lower visibility. Engagement signals and content type drive this distinction.
Spam folder: The server determined your message is likely unwanted. Low sender reputation, poor engagement history, or content triggers caused this.
Silently dropped: Some servers accept the email (giving a 250 response at Stage 4) but then quietly discard it during filtering. You'll never see a bounce, but the recipient never sees the email either. This is the hardest delivery failure to detect.
This is why "100% delivered" in your ESP dashboard doesn't mean "100% in the inbox." Delivered means the server accepted the SMTP handshake. What happened next depends on everything from Stage 5 onward.
Frequently Asked Questions
What does "delivered" actually mean in my ESP?
"Delivered" means the receiving mail server accepted the message during the SMTP handshake (Stage 4). It does NOT mean the email reached the inbox. The message could still be filtered to spam, placed in a promotions tab, or silently dropped during Stage 5-6 filtering. Think of "delivered" as "the post office accepted the package" - not "it's on the recipient's desk."
Where does email verification fit in this pipeline?
Verification simulates Stages 3 and 4 (DNS lookup and SMTP handshake) without sending an actual message. It checks if the domain exists, if MX records are configured, and if the mailbox accepts mail. This predicts whether a real send would bounce, letting you remove bad addresses before they generate actual failures. Bulk Email Checker's verification covers 17+ factors across these stages.
Why do my emails go to spam even with perfect authentication?
Authentication (Stage 2) proves your identity. It doesn't prove your emails are wanted. Spam placement happens at Stage 5-6 based on engagement history, sender reputation, and content quality. You can have perfect SPF, DKIM, and DMARC and still land in spam if your list is unengaged, your content triggers filters, or your domain reputation is poor.
Can I see which stage caused a delivery failure?
Partially. Your ESP's bounce codes tell you about Stage 3-4 failures (invalid domain, non-existent mailbox, blacklisted IP). But Stage 5-6 filtering is mostly invisible - you won't get a bounce code when Gmail sends you to spam. Use Google Postmaster Tools, inbox placement testing, and engagement metrics to monitor Stages 5-6 indirectly.
Stop Bouncing. Start Converting.
Millions of emails verified daily. Industry-leading SMTP validation engine.