SPF Lookup
Find and parse the SPF (Sender Policy Framework) record for a domain. Explains each mechanism and flags common misconfigurations like +all or over-10 DNS lookups.
Look up and parse SPF
Fetches the domain's TXT records, finds the v=spf1 record, and explains each mechanism.
About SPF
Sender Policy Framework is a DNS TXT record that lists the hosts allowed to send mail on behalf of a domain. It’s one of three interlocking standards — SPF, DKIM, and DMARC — that together determine whether a receiving mail server trusts a message.
An SPF record looks like:
v=spf1 ip4:192.0.2.0/24 include:_spf.google.com ~all
v=spf1— required marker.- Mechanisms (
ip4,ip6,a,mx,include,exists,ptr) — describe who is authorized. - Qualifiers (
+,-,~,?) — what to do on match: pass, fail, softfail, or neutral. all— the catch-all at the end.-allrejects;~allsoftfails;?alldefers;+allauthorizes everyone (dangerous and usually a mistake).
Things this tool flags
- No SPF record. Receivers have no way to verify your sending hosts — spoofed mail is likely to be delivered.
- Multiple SPF records. RFC 7208 requires exactly one. Multiple records cause
permerrorat receiving servers and mail will fail authentication. - More than 10 DNS-affecting mechanisms. SPF has a strict 10-lookup limit.
Going over it causes
permerror— everyinclude:counts, including nested ones. +all. Authorizes everyone on the internet to send mail as your domain. Almost always a misconfiguration.- No
alltoken. Undefined fallback — most receivers treat it as neutral.
Privacy
The lookup runs in your browser against Google Public DNS over HTTPS. We don’t proxy, log, or store the query.