How to Check Your Email Authentication Records
Checking SPF, DKIM, and DMARC records is the single most important step you can take to diagnose email deliverability problems. Whether your marketing campaigns are landing in spam, your transactional emails are being rejected, or you suspect someone is spoofing your domain, an email authentication check reveals exactly what is configured and what is missing. Our SPF DKIM DMARC checker automates the entire process so you do not need to run manual DNS queries.
Step 1: Enter Your Domain Name
Scroll to the checker tool at the top of this page and type your root domain (for example, yourbusiness.com) without any protocol prefix. If you send email from a subdomain such as mail.yourbusiness.com, enter the subdomain instead. The tool performs real-time DNS lookups against authoritative nameservers, so results reflect the current state of your records.
Step 2: Review SPF Results
The checker retrieves your SPF TXT record and validates its syntax. It verifies that the record begins with v=spf1, counts the number of DNS lookup mechanisms (must be 10 or fewer), and checks whether the record ends with a proper qualifier (-all, ~all, or ?all). If no SPF record is found, the tool flags this as a critical issue because emails from your domain have no sender authorization.
Step 3: Review DKIM Results
Our tool probes common DKIM selectors such as google, selector1, selector2, default, k1, and provider-specific selectors for services like SendGrid, Mailchimp, and Amazon SES. For each discovered selector, the tool validates the public key length and format. A missing or misconfigured DKIM record means your outgoing emails lack a cryptographic signature, which reduces trust with receiving mail servers.
Step 4: Review DMARC Results
The checker queries _dmarc.yourdomain.com and parses the DMARC policy tag (p=), subdomain policy (sp=), alignment settings (aspf= and adkim=), and reporting addresses (rua= and ruf=). If your DMARC policy is set to none, the tool recommends a path toward enforcement. If no DMARC record exists, this is flagged because it means receiving servers have no instruction on how to handle authentication failures.
Step 5: Review MX Records and Overall Score
Beyond authentication records, the tool checks your MX records to confirm that your domain has valid mail exchange servers configured. The overall authentication score combines SPF, DKIM, DMARC, and MX results into a single pass or fail assessment. Use this score alongside our email deliverability checker to get a complete picture of your sending infrastructure health.
Step 6: Fix Issues and Re-Check
After making DNS changes, allow 5 to 60 minutes for propagation (depending on your TTL settings) and run the check again. DNS changes are not instant, so re-checking too soon may show stale results. Once all records pass validation, send a test email to a Gmail or Yahoo account and inspect the message headers to confirm spf=pass, dkim=pass, and dmarc=pass appear in the Authentication-Results header.