All data displayed is public and provided by the DNS system.
Last checked about 1 hour ago
Your domain has strong email authentication. A few improvements can get you to a perfect score.
Upgrade to -all (hard fail) for maximum protection
SPF improvement
45 / 50 points
DMARC record is valid and configured correctly.
v=DMARC1;p=reject;rua=mailto:[email protected];
Policy (p)
reject
DKIM Alignment (adkim)
Relaxed (default)
SPF Alignment (aspf)
Relaxed (default)
You can add our monitoring system alongside your existing setup. DMARC supports multiple mailto: addresses, giving you additional visibility and backup reporting.
5 / 20 points
BIMI record must start with 'v=BIMI1'.
v=spf1 a mx include:_spf.mail.ru -all
Missing logo URL (l=)
No certificate URL provided (a=). Optional when using self-asserted logos.
26 / 30 points
SPF record is valid.
v=spf1 redirect=_spf.mail.ru
Syntax Check
OK
DNS Lookup Count
1 / 10 max
Void Lookups
0 / 2 max
Soft fail: Mark emails from unauthorized servers as suspicious but don't reject
Policy inherited from redirect target: _spf.mail.ru
Grouped by DNS record source (includes and sub-includes)
redirect=_spf.mail.ru
SPF evaluation redirected to this domain. Effective policy: ~all
Valid SPF record found at redirect target
10 / 10 points
TLS-RPT Reporting Configured
v=TLSRPTv1;rua=mailto:[email protected]
mailto:[email protected]
MTA-STS Policy Configured
v=STSv1; id=20200303T120000;
20200303T120000
The check you just ran shows your current configuration. But DNS records change, sometimes without you knowing. A well-meaning IT change, a third-party provider update, or an unauthorized modification can break your email delivery overnight.
Configuration Drift
IT changes that accidentally break authentication
Provider Updates
Third-party services changing their SPF includes
Unauthorized Changes
Attackers modifying records to send as you
DMARCTrust monitors your DNS records continuously. When something changes, you get an email alert with exactly what changed and why it matters. No more surprises when customers complain their emails bounced.
How mail.ru configures email authentication
v=DMARC1;p=reject;rua=mailto:[email protected];
v=spf1 redirect=_spf.mail.ru
v=spf1 a mx include:_spf.mail.ru -all
Configuration changes will appear here when detected
Run a free email authentication check (DMARC, SPF, BIMI).
We will generate a shareable URL for your domain.
Try popular examples: google.com, amazon.com, booking.com
Discover how other organizations configure their email authentication
Frequently checked
Reject policy + valid SPF
Also using reject
Showing domains checked by our users. All data is from public DNS records.
We analyze your domain's email authentication: DMARC policy and alignment, SPF record and includes, and BIMI logo/CV when present.
Healthy authentication improves delivery and blocks spoofing. Major inbox providers increasingly require DMARC and robust SPF/DKIM practices for senders.
This check shows a snapshot. With DMARCTrust, you get continuous monitoring of your DMARC reports and DNS records, with instant alerts when something changes.
We use cookies to enhance your experience, analyze site traffic, and for marketing purposes. You can choose which cookies to allow. Learn more in our Cookie Policy.
Manage your cookie preferences below. Essential cookies are always active as they are required for the website to function.
Required for the website to function. Cannot be disabled.
Help us understand how visitors interact with our website.
Used to measure advertising effectiveness and show relevant ads.
Learn more about how we use cookies in our Cookie Policy.