Start typing to search tools…
🛠️ All Tools
💻 Developer Tools
📋 JSON Formatter 🌳 JSON Tree 📄 XML Formatter 🌲 XML Tree 🎨 CSS Generator 🗄️ SQL Builder ⚙️ Programming Tools 📊 ER Diagram 📐 UML Diagram 🔀 Flowchart
🌐 Network & DNS
🔍 DNS Lookup 🌍 DNS Propagation 🔎 WHOIS Lookup 🔒 SSL Checker 📡 Ping Test ⚡ Speed Test ✉️ Email Auth 👤 Username Checker
🔐 Encoding & Security
🔑 Base64 Encode 🖼️ Base64 Image 🔐 MD5 Hash 🔑 Password Gen 🎭 Fake Name Gen
🖼️ Image Tools
📦 Compressor 🔄 Converter ✂️ Cropper 📐 Resizer 🎨 Filters ✨ Effects 💧 Watermark 📸 Social Image ⭐ Favicon Maker 🖼️ Image to Text 📷 EXIF Viewer
🔍 SEO & Web
✅ SEO Checklist 🔍 SERP Preview 🗺️ Sitemap Gen 📱 Social Debugger 🏷️ Hashtag Gen
✍️ Text & Writing
📝 Word Counter ✨ Fancy Text 🎲 Random Generator 🎨 Color Palette 💡 Brainstorm Tool 🚀 SaaS Ideas 🧠 Mind Map
ℹ️ About ✉️ Contact
Home Network SPF, DKIM & DMARC Checker
📧 Email Auth ✅ 100% Free ⚡ Live Query

SPF, DKIM & DMARC Checker

Validate all three email authentication records for any domain in one click. Detect misconfigurations, check DMARC policies, verify DKIM selectors, and fix issues before they affect your email deliverability.

Checking email authentication records…
⚠️
Check Failed
An error occurred.
📊 Auth Summary
SPF Not checked
DKIM Not checked
DMARC Not checked
💡 What each does
📋
SPF lists which mail servers are allowed to send email for your domain.
✍️
DKIM adds a cryptographic signature to every email so receivers can verify it wasn't tampered with.
🛡️
DMARC tells receivers what to do when SPF or DKIM fail — and sends you reports about failures.
🔗
All three work together. DMARC without SPF/DKIM, or SPF without DMARC, leaves gaps.

SPF, DKIM and DMARC — Complete Guide

Email authentication is a trio of DNS-based protocols that work together to protect your domain from being used to send spam or phishing emails. Without all three properly configured, email providers like Gmail and Outlook may reject or junk your legitimate emails — and spammers can impersonate your domain with ease.

SPF (Sender Policy Framework)

SPF is a TXT record that lists all the mail servers authorised to send email on your domain's behalf. When a receiving mail server gets an email from your domain, it checks the SPF record against the sending server's IP. If the IP isn't listed, the email fails SPF. A typical SPF record looks like: v=spf1 include:_spf.google.com ~all

DKIM (DomainKeys Identified Mail)

DKIM adds a cryptographic signature to every outgoing email. The private key signs the message on your mail server; the public key is published in a DNS TXT record at selector._domainkey.yourdomain.com. Receivers verify the signature — if it matches, the email genuinely came from your server and was not modified in transit.

DMARC (Domain-based Message Authentication, Reporting and Conformance)

DMARC is the policy layer. It tells receiving servers what to do when SPF and/or DKIM checks fail: none (monitor only), quarantine (send to spam), or reject (block completely). DMARC also lets you receive aggregate reports (rua=) showing which servers are sending email claiming to be from your domain.

Frequently Asked Questions

A DKIM selector is a label that identifies which public key to use. It's the prefix before ._domainkey.yourdomain.com. Your email provider sets this — common selectors include google (Google Workspace), s1 and s2 (many ESPs), mail, and default. You can find yours in your email provider's DKIM setup page, or by looking at the headers of a sent email for DKIM-Signature: s=selector.
The most common causes are: (1) exceeding the 10 DNS lookup limit — each include:, a, mx, and ptr mechanism counts as a lookup; (2) having more than one SPF TXT record on your domain — only one is permitted; (3) sending from a server or service not listed in your SPF record. Use this tool's mechanism list to count your lookups and identify missing senders.
-all (fail) — strictly rejects any email not matching the SPF record. Maximum protection but may cause issues if you miss a sender. ~all (softfail) — marks non-matching emails as suspicious but doesn't reject them. Recommended while setting up. ?all (neutral) — no enforcement, equivalent to not having SPF. +all — allows any server to send, effectively disabling SPF protection entirely.
Start with p=none and set up rua= aggregate reporting. After reviewing reports for 2–4 weeks and confirming all legitimate senders pass SPF and DKIM, move to p=quarantine. Once you're confident in full coverage, move to p=reject for maximum protection. Jumping straight to reject risks blocking legitimate email.
Yes — significantly. Gmail, Outlook, Yahoo and most major providers use these records as key deliverability signals. Missing or misconfigured records cause emails to land in spam or get rejected outright. From February 2024, Google and Yahoo require DMARC records for bulk senders. A fully configured SPF + DKIM + DMARC setup is now considered baseline for professional email delivery.
Copied!