Tag | Value |
---|---|
{{ key }} | {{ val }} |
DMARC Checks | |
---|---|
{{ c.label }} |
Domain-based Message Authentication, Reporting and Conformance (DMARC) augments SPF and DKIM by defining how a receiving server should treat mail that fails authentication while giving domain owners aggregate feedback. It links the visible From address with the authenticated envelope and header paths, protecting brands from look-alike phishing attempts.
This tool lets you enter any public-facing domain and immediately retrieves its _dmarc
TXT record through a privacy-preserving DNS-over-HTTPS request. A lightweight reactive engine parses each tag, evaluates policy strength, and presents pass / fail checks so you can strengthen enforcement in seconds.
Security teams use the report when onboarding new sending services, rotating infrastructure, or auditing clients’ email posture. *Incomplete policies may cause legitimate mail to land in spam or expose recipients to spoofing attacks.*
DMARC policies reside in DNS and declare the required alignment between SPF, DKIM and the visible sender. Core tags include v
(version), p
(policy), pct
(sample rate), and rua
(aggregate report URI). Recipients combine these directives with local authentication results to decide whether to deliver, quarantine, or reject a message.
_dmarc.<domain>
.DMARC1
none | quarantine | reject
100
or absentp Tag | Action | Receiver Behaviour |
---|---|---|
none | Monitor | No impact on delivery |
quarantine | Restrict | Deliver to spam or junk |
reject | Block | Refuse message during SMTP |
Moving from none
to quarantine
or reject
gradually eliminates spoofed mail but demands complete alignment across every authorised sender.
Example lookup for example.com
:
The tool marks every checklist item as pass and advises keeping enforcement at reject
to maximise protection.
ruf
forensic reports for privacy reasons.=
separators._dmarc
label.rua
URI.Based on RFC 7489 (DMARC) and RFC 8461 (MTA-STS) interoperability notes, plus industry reports by M3AAWG and the Global Cyber Alliance.
No email content or personal data is processed; only public DNS records are queried, aligning with GDPR recital 26 on publicly available information.
Follow these steps to analyse any domain’s DMARC posture.
No. The tool fetches only public DNS records and keeps nothing after you close the page.
The domain lacks a DMARC policy. Publish one at _dmarc.<domain>
to start receiving reports and enforcing authentication.
No changes are made. You must edit your zone file or hosting dashboard to update the record.
DoH avoids local resolver caching quirks, ensures integrity, and works even on networks that block traditional port 53 queries.
p=none
safe?It is a monitoring mode only. Move to quarantine
or reject
after reviewing aggregate reports to protect recipients.
p
directive defining receiver action.