All data displayed is public and provided by the DNS system.
Last checked about 2 hours ago
Your email authentication is perfectly configured. All SPF, DMARC, BIMI, and TLS settings are optimized for maximum protection and deliverability.
42 / 50 points
DMARC record is valid and configured correctly.
v=DMARC1; p=quarantine; pct=100; rua=mailto:[email protected]; ruf=mailto:[email protected],mailto:[email protected];
Policy (p)
quarantine
DKIM Alignment (adkim)
Relaxed (default)
SPF Alignment (aspf)
Relaxed (default)
Verification successful
You can add our monitoring system alongside your existing setup. DMARC supports multiple mailto: addresses, giving you additional visibility and backup reporting.
20 / 20 points
BIMI Record Found and Looks Good
v=BIMI1;l=https://www.craigslist.org/craigslist_bimi.svg;a=https://www.craigslist.org/craigslist_inc.pem
https://www.craigslist.org/craigslist_bimi.svg
image/svg+xml
Note: We do not parse SVG content for safety.
30 / 30 points
SPF record is valid.
v=spf1 ip4:208.82.237.96/29 ip4:208.82.237.104/31 ip4:208.82.238.96/29 ip4:208.82.238.104/31 -all
Syntax Check
OK
DNS Lookup Count
0 / 10 max
Void Lookups
0 / 2 max
Fail: Reject emails from unauthorized servers (recommended for production)
Grouped by DNS record source (includes and sub-includes)
10 / 10 points
TLS-RPT Reporting Configured
v=TLSRPTv1;rua=mailto:[email protected]
mailto:[email protected]
MTA-STS Policy Configured
v=STSv1; id=20241030080000Z
20241030080000Z
The check you just ran shows your current configuration. But DNS records change, sometimes without you knowing. A well-meaning IT change, a third-party provider update, or an unauthorized modification can break your email delivery overnight.
Configuration Drift
IT changes that accidentally break authentication
Provider Updates
Third-party services changing their SPF includes
Unauthorized Changes
Attackers modifying records to send as you
DMARCTrust monitors your DNS records continuously. When something changes, you get an email alert with exactly what changed and why it matters. No more surprises when customers complain their emails bounced.
How craigslist.org configures email authentication
v=DMARC1; p=quarantine; pct=100; rua=mailto:[email protected]; ruf=mailto:[email protected],mailto:[email protected];
v=spf1 ip4:208.82.237.96/29 ip4:208.82.237.104/31 ip4:208.82.238.96/29 ip4:208.82.238.104/31 -all
v=BIMI1;l=https://www.craigslist.org/craigslist_bimi.svg;a=https://www.craigslist.org/craigslist_inc.pem
Configuration changes will appear here when detected
Run a free email authentication check (DMARC, SPF, BIMI).
We will generate a shareable URL for your domain.
Try popular examples: google.com, amazon.com, booking.com
Discover how other organizations configure their email authentication
Frequently checked
Reject policy + valid SPF
Also using quarantine
Showing domains checked by our users. All data is from public DNS records.
We analyze your domain's email authentication: DMARC policy and alignment, SPF record and includes, and BIMI logo/CV when present.
Healthy authentication improves delivery and blocks spoofing. Major inbox providers increasingly require DMARC and robust SPF/DKIM practices for senders.
This check shows a snapshot. With DMARCTrust, you get continuous monitoring of your DMARC reports and DNS records, with instant alerts when something changes.
We use cookies to enhance your experience, analyze site traffic, and for marketing purposes. You can choose which cookies to allow. Learn more in our Cookie Policy.
Manage your cookie preferences below. Essential cookies are always active as they are required for the website to function.
Required for the website to function. Cannot be disabled.
Help us understand how visitors interact with our website.
Used to measure advertising effectiveness and show relevant ads.
Learn more about how we use cookies in our Cookie Policy.