Menu
Networking and DNS Tools | DMARC Checker
DC

DMARC Checker

What is DMARC?
DMARC (Domain-based Message Authentication, Reporting & Conformance) protects your domain from email spoofing and phishing attacks.

Comments

Login to leave a comment

No comments yet. Be the first to comment!

Similar Networking and DNS Tools

What is online DMARC Checker?

The DMARC Record Checker is a free online tool that instantly verifies if your domain has a valid DMARC (Domain-based Message Authentication, Reporting & Conformance) record configured. It analyzes your domain's DNS settings to check for DMARC protection against email spoofing, phishing attacks, and unauthorized use of your domain name. The tool displays detailed information about your DMARC policy, including enforcement level (none, quarantine, or reject), reporting addresses, subdomain policies, and percentage of messages the policy applies to. If no DMARC record is found, it provides step-by-step setup instructions with recommended configurations for different security levels.

How to use DMARC Checker?

Use Cases for DMARC Checker

Frequently Asked Questions

Have questions about DMARC Checker? Find answers to the most common queries below.

DMARC (Domain-based Message Authentication, Reporting & Conformance) is an email authentication protocol that protects your domain from being used in email spoofing, phishing attacks, and other email-based fraud. It works alongside SPF and DKIM to verify that emails claiming to be from your domain are actually authorized. Implementing DMARC helps protect your brand reputation, improves email deliverability, and prevents cybercriminals from impersonating your domain to target customers or employees.
The DMARC checker queries your domain's DNS records specifically looking for a TXT record at "_dmarc.yourdomain.com". It uses Cloudflare's DNS-over-HTTPS service to retrieve the DMARC record and parses the policy information including enforcement level (p=none/quarantine/reject), reporting addresses (rua/ruf), subdomain policies, and percentage settings. The tool then displays this information in an easy-to-understand format with explanations of what each setting means.
DMARC has three policy levels: p=none (monitor mode) - emails are delivered normally but reports are sent about authentication failures, ideal for initial setup; p=quarantine - failed emails are sent to spam/junk folders, providing moderate protection; p=reject - failed emails are completely blocked and not delivered, offering maximum protection. It's recommended to start with "none" to monitor your email flow, then gradually move to stricter policies once you're confident legitimate emails won't be blocked.
If no DMARC record is found, your domain is vulnerable to email spoofing. You should add a DMARC record to your DNS settings by: logging into your domain registrar or DNS provider, creating a new TXT record with the name "_dmarc", and setting the value to start with "v=DMARC1; p=none; rua=mailto:dmarc@yourdomain.com". Begin with the "none" policy to receive reports without affecting email delivery, then gradually increase protection as you verify legitimate email sources.
After adding or modifying a DMARC record in your DNS settings, changes typically propagate within a few hours but can take up to 48-72 hours to fully propagate worldwide. The TTL (Time To Live) value in your DNS record affects how quickly changes are recognized. You can use this checker tool periodically to verify when your DMARC record becomes visible. Email receivers may also cache DNS records, so full enforcement of policy changes might take additional time.
RUA (Reporting URI for Aggregate reports) and RUF (Reporting URI for Forensic reports) are email addresses where DMARC reports are sent. RUA provides daily aggregate reports showing overall authentication results across all emails from your domain, including pass/fail statistics. RUF sends forensic (failure) reports with detailed information about individual email authentication failures. These reports are crucial for monitoring email security, identifying legitimate senders that need SPF/DKIM configuration, and detecting unauthorized use of your domain.
Yes, DMARC relies on SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) for authentication. You should have at least one of these configured before implementing DMARC. SPF specifies which mail servers are authorized to send email from your domain, while DKIM adds a digital signature to emails. DMARC checks if emails pass SPF or DKIM alignment, meaning the domain in the From header matches the domain authenticated by SPF or DKIM. Without proper SPF/DKIM setup, DMARC may cause legitimate emails to fail authentication.
When properly configured, DMARC improves email deliverability by proving to receiving servers that your emails are legitimate and your domain is protected. However, if misconfigured or set to strict policies (quarantine/reject) without proper testing, DMARC can cause legitimate emails to be blocked or sent to spam. This is why it's critical to start with "p=none" policy, monitor reports for several weeks, ensure all legitimate email sources are properly authenticated with SPF/DKIM, and only then gradually move to stricter policies.