Tools
Explore our collection of email marketing tools.
DMARC Record Checker
Verify your domain's DMARC record to ensure email authentication and protect against spoofing.
Check DMARC Record
Enter a domain to check its DMARC (Domain-based Message Authentication, Reporting, and Conformance) configuration
How to Use This DMARC Record Checker
Checking your DMARC record is a simple process that takes only a few seconds. Follow these steps to verify your domain's email authentication configuration and ensure your emails reach their intended recipients without being flagged as suspicious.
Whether you are setting up DMARC for the first time or auditing an existing policy, this guide will walk you through interpreting the results and taking corrective action. Proper DMARC configuration is one of the highest-impact improvements you can make to your email security posture.
- 1
Enter Your Domain Name
Type your domain into the input field above. You do not need to include "https://" or "www" — just the root domain (for example, maillead.io) is sufficient for the lookup.
- 2
Run the DMARC Lookup
Click the Check DMARC button to query public DNS servers for your domain's DMARC TXT record. The tool will fetch the raw record and parse it into readable components.
- 3
Review the Parsed Policy
Examine the parsed results to see your DMARC policy (none, quarantine, or reject), the percentage of emails affected, report destinations (RUA and RUF), and alignment settings for SPF and DKIM.
- 4
Fix Any Issues Found
If the checker reports syntax errors, missing tags, or a missing record altogether, use the guidance provided to update your DNS TXT record. Most changes propagate within a few minutes to a few hours.
- 5
Re-Check and Monitor Regularly
After making DNS changes, run the checker again to confirm the updates took effect. Bookmark this page and return periodically to monitor your DMARC configuration as your email infrastructure evolves.
What Is DMARC?
DMARC, which stands for Domain-based Message Authentication, Reporting, and Conformance, is an email authentication protocol designed to give domain owners control over what happens when their domain is used to send email. It was created to combat the widespread problems of email spoofing, phishing, and domain impersonation that have plagued organizations of every size since the early days of email.
At its core, DMARC builds on top of two existing email authentication standards: SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail). SPF verifies that the sending IP address is authorized to send email for a domain, while DKIM uses cryptographic signatures to verify that an email has not been altered in transit. DMARC ties these two mechanisms together by specifying how a receiving mail server should handle emails that fail one or both of these checks.
A DMARC policy is published as a DNS TXT record at the special subdomain _dmarc.yourdomain.com. This record contains several important directives, including the policy mode (p=none, p=quarantine, or p=reject), the percentage of messages to which the policy should be applied (pct), and addresses where aggregate and forensic reports should be sent (rua and ruf). The policy mode determines the action receiving servers take when authentication fails: none means monitor only, quarantine means send suspicious emails to the spam folder, and reject means block them entirely.
One of DMARC's most powerful features is its reporting capability. Domain owners receive XML-based aggregate reports from participating email providers like Google, Microsoft, and Yahoo. These reports detail every email sent using the domain, the results of SPF and DKIM checks, the sending IP addresses, and whether the emails passed or failed DMARC alignment. This visibility allows administrators to identify legitimate but misconfigured sending sources, unauthorized senders, and potential abuse before it escalates.
DMARC alignment is a critical concept that many people overlook. For DMARC to pass, the domain in the From header must align with the domain authenticated by SPF or DKIM. There are two modes of alignment: relaxed and strict. Relaxed alignment allows subdomains to match, while strict alignment requires an exact match. Understanding and configuring alignment correctly is essential for maximizing both security and deliverability.
The evolution of email security standards has made DMARC increasingly central to how the internet handles trust in messaging. Since its introduction in 2012, adoption has grown steadily, driven by high-profile phishing incidents and the recognition that SPF and DKIM alone are insufficient. Today, DMARC is not just a best practice but a baseline expectation for any organization that values its brand integrity and its audience's safety.
Why DMARC Matters
Implementing DMARC is no longer optional for any organization that sends email. Without it, your domain is essentially unprotected against impersonation attacks. Cybercriminals can easily forge emails that appear to come from your domain, tricking recipients into divulging sensitive information, transferring funds, or downloading malware. The reputational and financial damage from a successful phishing campaign using your domain can be devastating and long-lasting.
Beyond security, DMARC is now a deliverability requirement. Major email providers including Gmail and Yahoo have mandated that bulk senders implement DMARC with at least a p=none policy. Domains without DMARC records increasingly find their emails routed to spam folders or rejected outright. A properly configured DMARC record signals to inbox providers that you are a responsible sender who takes authentication seriously, which directly improves your sender reputation and inbox placement rates.
DMARC also provides invaluable operational visibility. The aggregate reports give you a comprehensive view of every service and application sending email on behalf of your domain. This is especially important for larger organizations where marketing platforms, CRMs, helpdesks, and automated systems may all be sending emails independently. Many IT teams discover unauthorized or forgotten sending sources only after implementing DMARC reporting.
Finally, DMARC is a stepping stone to more advanced protections like BIMI (Brand Indicators for Message Identification), which displays your logo next to authenticated emails in supported inboxes. BIMI requires a DMARC policy of at least quarantine with alignment, making DMARC investment even more worthwhile for brands seeking to build trust at first glance.
For cold emailers and marketers, DMARC can be the difference between a campaign that converts and one that never reaches the inbox. When combined with proper list hygiene, engaging content, and warmed-up sending infrastructure, a strong DMARC policy is one of the most reliable ways to maintain consistent deliverability over time.
Organizations in regulated industries such as finance and healthcare face additional incentives to implement DMARC. Regulatory frameworks increasingly reference email authentication as a component of data protection and fraud prevention. Having a reject policy with full alignment not only protects your customers but also demonstrates compliance during audits and assessments.
Even solopreneurs and small agencies benefit from DMARC. When your personal brand is your business, a single spoofed email can destroy trust that took years to build. The minimal effort required to publish a DMARC record pays dividends in credibility and peace of mind.
Common DMARC Mistakes to Avoid
One of the most frequent errors is jumping straight to p=reject without first monitoring with p=none. This aggressive approach can cause legitimate emails from misconfigured internal tools or third-party services to bounce, disrupting business operations. Always start with monitoring, review your reports, and gradually tighten your policy.
Another common mistake is forgetting to configure both SPF and DKIM before enabling DMARC. Since DMARC depends on these underlying protocols, enabling it without them provides no protection and may actually hurt deliverability. Ensure both are properly set up and aligned before moving your DMARC policy beyond none.
Many organizations also neglect to specify a valid RUA address for aggregate reports. Without this, you are flying blind and will not know which emails are failing authentication or where they are coming from. Set up a dedicated mailbox or use a DMARC reporting service to parse the XML data into actionable dashboards.
Using overly complex records with redundant mechanisms is another pitfall. Keep your DMARC record clean and focused on the directives you actually need. Excessive length and unnecessary tags make troubleshooting harder and increase the chance of syntax errors during updates.
Finally, avoid setting an unrealistic pct value when tightening your policy. Starting with pct=100 on a new quarantine or reject policy can have catastrophic consequences if an unexpected sending source is misaligned. Instead, begin with a low percentage, monitor the impact, and gradually increase it as confidence grows.
Related Tools
Explore these complementary tools to build a complete picture of your email infrastructure and deliverability health.
SPF Record Checker
Verify your SPF record syntax and see which mail servers are authorized to send email on behalf of your domain.
MX Record Checker
Test your domain's mail exchange records to ensure emails are routed to the correct servers.
Email Blacklist Checker
Scan major DNSBLs to see if your IP or domain is blacklisted and hurting your deliverability.
Email Deliverability Guide
A comprehensive resource covering authentication, list hygiene, content best practices, and sender reputation.
Cold Email Guide
Learn how to run effective cold outreach campaigns while staying compliant and maintaining strong deliverability.
Email Spam Checker
Analyze your email copy and structure against common spam filters before hitting send.
DMARC Best Practices
Start your DMARC journey with a simple monitoring record and expand from there. Use a dedicated email address for RUA reports so they do not clutter your main inbox. Review aggregate reports at least weekly during the initial rollout and monthly once your policy is stable. Keep a changelog of every DMARC policy adjustment so you can correlate changes with delivery metrics.
Coordinate your DMARC rollout with your IT, marketing, and security teams. Marketing may be using third-party platforms that need DKIM alignment, while IT may manage internal mail relays that require SPF updates. Getting everyone on the same page prevents surprises and ensures comprehensive coverage.
Document your authorized sending sources in a central location. This inventory becomes invaluable when troubleshooting failed authentications and makes it easier to maintain your SPF and DKIM records over time. Update it whenever you add or remove a service.
Consider using a DMARC reporting platform if you manage multiple domains. Parsing raw XML reports manually is tedious and error-prone. A good reporting service visualizes trends, highlights new sending sources, and alerts you to anomalies that could indicate abuse or misconfiguration.
Frequently Asked Questions
Below are answers to the most common questions we receive about DMARC, its configuration, and its impact on email deliverability.
What is DMARC and how does it protect my domain?
DMARC (Domain-based Message Authentication, Reporting, and Conformance) is an email authentication protocol that tells receiving mail servers what to do with emails that fail SPF or DKIM checks. By publishing a DMARC record, you prevent unauthorized parties from spoofing your domain, improve your email deliverability, and gain visibility into all email sending activity using your domain through automated reports.
What are the three DMARC policy levels and which should I choose?
DMARC offers three policy levels: p=none (monitor only, no action taken), p=quarantine (send failed emails to spam), and p=reject (block failed emails entirely). We recommend starting with p=none while you review aggregate reports and identify all legitimate sending sources. Once you are confident that authorized senders are properly authenticated, gradually move to p=quarantine and ultimately p=reject for maximum protection.
How do I add or update a DMARC record for my domain?
You add a DMARC record by creating a TXT record in your domain's DNS settings through your domain registrar or DNS hosting provider. The record name should be _dmarc.yourdomain.com and the value should start with v=DMARC1; followed by your chosen policy and reporting directives. A simple starting record looks like: v=DMARC1; p=none; rua=mailto:dmarc@yourdomain.com. DNS changes typically propagate within a few minutes but can take up to 48 hours in some cases.
What information do DMARC reports contain?
DMARC aggregate reports (RUA) are XML files sent daily or weekly by participating mailbox providers. They contain data about every email that passed or failed DMARC evaluation, including the sending IP address, the volume of messages, the results of SPF and DKIM checks, and whether alignment was achieved. Forensic reports (RUF) provide detailed information about individual failed messages, including headers and snippets of the message body, making them valuable for incident investigation.
What is DMARC alignment and why is it important?
DMARC alignment means the domain in the email's From header must match the domain authenticated by SPF or DKIM. There are two alignment modes: relaxed (subdomains match) and strict (exact match required). Without proper alignment, a malicious sender could pass SPF or DKIM using their own domain while spoofing your domain in the From field, and DMARC would not catch it. Ensuring alignment is essential for DMARC to actually prevent impersonation.