
Check your SPF record instantly. Verify your record syntax, analyse mechanisms, inspect include chains, detect misconfigurations and validate your email authentication setup.
Useful for diagnosing email deliverability issues, preventing spoofing and ensuring your domain's SPF record is correctly configured.
Ensure your SPF record is correctly formatted and parseable by mail servers.
Review all mechanisms such as ip4, ip6, a, mx, include and their qualifiers.
Recursively expand include: directives to see all authorised senders.
Detect whether your record exceeds the RFC 7208 limit of 10 DNS lookups.
This SPF checker lets you inspect every detail of a domain's SPF record. You can verify whether a record exists, whether its syntax is valid, which mail servers are authorised to send on behalf of the domain and how nested include chains resolve.
SPF records are a critical layer of email authentication. A missing, broken or over-complicated SPF record can cause legitimate emails to land in spam or be outright rejected. This tool helps you quickly diagnose and fix your SPF configuration.
Displays the full TXT record exactly as published in DNS, so you can spot typos or unexpected entries at a glance.
Lists every mechanism in the record, such as ip4, ip6, a, mx and include, along with its qualifier (pass, fail, softfail or neutral).
Recursively resolves all include: directives so you can see the full tree of authorised senders, even across third-party providers.
Shows every IP address and CIDR range that is explicitly authorised to send mail for the domain.
Identifies how the record handles mail from unauthorised senders, pass (+all), softfail (~all), fail (-all) or neutral (?all).
Counts the number of DNS lookups required to evaluate the record. RFC 7208 limits this to 10; exceeding it causes evaluation to fail.
Shows the qualifier prefix on each mechanism (+, -, ~, ?) so you know exactly what action a receiving server will take for each sender.
Detects circular include references that would cause infinite loops during SPF evaluation and flags them immediately.
v=spf1 exist, receiving mail servers will return a PermError and
SPF evaluation will fail entirely. If you use multiple email providers, you should
combine all authorised senders into a single SPF record using include: mechanisms.include: mechanism tells the receiving server to look up the SPF
record of another domain and treat it as part of your own. This is commonly used to
authorise third-party email providers such as Google Workspace, Mailchimp or
SendGrid. Each include: counts as one DNS lookup towards the limit of 10.v=spf1 include:_spf.google.com ~all. You start with the version tag
v=spf1, then list your authorised senders using mechanisms like
include:, ip4: or mx, and end with an
all mechanism to define the default policy. Add it as a TXT record
at the root of your domain in your DNS provider's control panel.
