Home/Blog/DNS Lookup & Email Security Check
Security ToolsEmail Security

DNS Lookup & Email Security Check

Check DNS records, SPF, DKIM, DMARC, and email security configuration for your domain

DNS Lookup & Email Security Check

SPF (Sender Policy Framework)

SPF records specify which mail servers are authorized to send email on behalf of your domain. When properly configured, SPF prevents spammers from forging emails that appear to come from your domain.

Example SPF Record:

v=spf1 include:_spf.google.com include:spf.protection.outlook.com ~all

This record authorizes Google and Microsoft mail servers to send email for your domain. The ~all mechanism indicates a soft fail for unauthorized servers.

DKIM (DomainKeys Identified Mail)

DKIM adds a digital signature to email headers, allowing receiving mail servers to verify that the email wasn’t altered in transit and actually came from your domain. DKIM uses public-key cryptography with the public key published in DNS.

DKIM Record Components:

  • v= Version (DKIM1)
  • k= Key type (usually RSA)
  • p= Public key data (Base64 encoded)
  • t= Flags (s= for testing mode)

DMARC (Domain-based Message Authentication)

DMARC builds on SPF and DKIM, telling receiving mail servers what to do when authentication fails. It also provides reporting so you can monitor authentication results and identify abuse attempts.

Example DMARC Record:

v=DMARC1; p=quarantine; rua=mailto:[email protected]; pct=100; adkim=s; aspf=s

Policy Options:

  • p=none – Monitor only, no action taken
  • p=quarantine – Move suspicious email to spam folder
  • p=reject – Block unauthenticated email entirely

Advanced DNS Features

DNSSEC Chain of Trust

DNSSEC (DNS Security Extensions) provides cryptographic authentication for DNS responses, preventing DNS spoofing and cache poisoning attacks. Our tool validates the complete DNSSEC chain by checking DS (Delegation Signer), DNSKEY (public keys), and RRSIG (signature) records. If any records are missing, clickable warnings provide detailed explanations of what each record does, why it matters, and how to fix configuration issues.

SSL/TLS Certificate Discovery

Beyond basic DNS lookups, the tool automatically scans 20+ common subdomains (www, mail, smtp, webmail, api, etc.) for SSL/TLS certificates. It discovers additional hosts via reverse DNS on A record IPs and tracks certificate expiration with color-coded warnings. Recently expired certificates (within 90 days) are flagged if not replaced, helping you maintain secure connections across your entire domain infrastructure.

Multi-Server Propagation Analysis

DNS changes can take time to propagate globally. Our tool queries 8 major DNS servers simultaneously—Cloudflare (1.1.1.1, 1.0.0.1), Google (8.8.8.8, 8.8.4.4), Quad9 (9.9.9.9, 149.112.112.112), and OpenDNS (208.67.222.222, 208.67.220.220)—to verify propagation status. Inconsistencies are flagged with detailed diffs showing exactly which servers have updated records and which still cache old values.

Common Use Cases

Email Deliverability Troubleshooting

When legitimate emails are being marked as spam or rejected, checking DNS records is the first step. Misconfigured SPF, DKIM, or DMARC records are the most common cause of deliverability issues. This tool helps identify syntax errors, missing records, or conflicting configurations that prevent emails from reaching recipients.

Domain Security Audit

Security teams use DNS lookup tools to verify email authentication is properly configured across all company domains. Regular audits ensure that domains are protected from spoofing and phishing attacks. Organizations with multiple domains or subdomains need to verify each has appropriate email security records.

Migration & Configuration Verification

When migrating email services (e.g., from on-premises Exchange to Microsoft 365 or Google Workspace), IT administrators need to verify DNS record updates have propagated correctly. This tool checks that MX records point to new mail servers and that SPF/DKIM records include new service providers.

Reputation Monitoring

Email marketers and IT professionals regularly check domain and IP reputation to ensure they’re not blacklisted. Being added to a blacklist dramatically reduces email deliverability. Early detection allows teams to identify and resolve issues before email campaigns are affected.

Frequently Asked Questions

Why are my emails going to spam?

Common causes include missing or misconfigured SPF/DKIM/DMARC records, sending from a blacklisted IP address, lack of proper reverse DNS (PTR record), or sending patterns that trigger spam filters. Use this tool to verify all authentication records are properly configured and check blacklist status.

How long does DNS propagation take?

DNS changes typically propagate within 1-24 hours, though most updates are visible within 1-2 hours. The Time To Live (TTL) setting on your DNS records determines how long nameservers cache the old values. Lower TTL values (e.g., 300 seconds) speed up propagation but increase DNS query load.

What’s the difference between hard fail (~all) and soft fail (-all) in SPF?

In SPF records, ~all (soft fail) suggests that mail from unauthorized servers should be marked as suspicious but still accepted. -all (hard fail) instructs receiving servers to reject unauthorized email outright. Start with soft fail during testing, then move to hard fail once you’ve verified all legitimate mail servers are included.

Explore More Developer Tools

View our complete suite of free developer and security tools.

View All Tools →

{ "@context": "https://schema.org", "@type": "WebApplication", "name": "DNS Lookup & Email Security Check", "description": "Check DNS records, SPF, DKIM, DMARC, and email security configuration for your domain", "url": "https://inventivehq.com/dns-lookup-and-email-security-check/", "applicationCategory": "DeveloperApplication", "operatingSystem": "Any", "offers": { "@type": "Offer", "price": "0", "priceCurrency": "USD" } }

Frequently Asked Questions

Find answers to common questions

Three essential DNS records: SPF (lists who can send as you), DKIM (cryptographic signature), DMARC (tells receivers what to do with failures). Setup time: 30-60 minutes for basic configuration. Costs: $0 if you do it yourself, $500-1,500 if consultant configures it. Minimum viable setup: SPF record listing your email provider (Google Workspace, Microsoft 365), DKIM enabled in your email admin, DMARC set to 'none' policy initially. This prevents 60-70% of spoofing attempts. Takes 24-48 hours for DNS propagation. Test with mail-tester.com (should score 8/10 or higher).

SPF + forwarding = common problem. When email forwards, SPF checks fail (forwarding server isn't in your SPF record). Solution: SRS (Sender Rewriting Scheme) or exclude forwarded addresses from DMARC strict policies. DKIM usually survives forwarding. DMARC 'quarantine' or 'reject' policies can break things. Safe rollout:

  1. Deploy DMARC with 'none' policy for 30 days
  2. Monitor DMARC reports for failures
  3. Fix legitimate issues (forgotten servers, forwarding rules)
  4. Upgrade to 'quarantine' after 90 days
  5. Upgrade to 'reject' after 180 days.

Rushing to 'reject' policy breaks 5-15% of legitimate emails.

DMARC reports are XML files sent daily from receivers (Google, Microsoft, Yahoo) showing who's sending email as your domain. Reading raw XML: painful. Solution: free DMARC report parsers (DMARCian, Postmark DMARC) or paid tools ($10-50/month for small businesses). Reports show:

  1. Which IPs sent mail as you
  2. SPF/DKIM pass rates
  3. Volume of mail.

Look for: unknown IPs with SPF failures (spoofing attempts), legitimate servers with failures (fix your SPF record), or volume spikes (possible breach). Check reports weekly for first 2 months, then monthly.

SPF has 10 DNS lookup limit (prevents slowdowns). Each 'include:' statement counts as lookup. Problem: Google Workspace (3 lookups) + Microsoft 365 (2) + SendGrid (1) + marketing tool (1) + CRM (1) = 8 lookups. Add 2 more services, you're over limit. Solutions: (1) Flatten SPF record (manually list IPs instead of includes)—free but breaks when vendors change IPs, (2) Use SPF macro language (advanced, error-prone), (3) Adopt DKIM-only authentication (stop relying on SPF), (4) Pay for SPF management service ($20-50/month, auto-flattens). Best approach: prioritize critical senders in SPF, rely on DKIM for others.

Domain registrar DNS (GoDaddy, Namecheap): usually fine for small businesses, uptime 99.5-99.9%. Free but basic. Third-party DNS (Cloudflare, Route 53, Dyn): 99.99%+ uptime, DDoS protection, faster propagation. Costs: Cloudflare free tier is excellent (beats most paid registrar DNS), AWS Route 53 costs $1-5/month for small zones. When to upgrade:

  1. Frequent DNS attacks or downtime
  2. International business needing fast global resolution
  3. Complex setups with 50+ DNS records.

For most SMBs under 100 employees: Cloudflare free tier is perfect—better than registrar DNS, costs nothing, takes 10 minutes to configure.

Put These Security Tools to Work

Our security team uses industry-leading tools to protect businesses like yours. Get a free assessment to see how we can strengthen your defenses.