All data displayed is public and provided by the DNS system.
Last checked about 4 hours ago
Your email authentication needs attention. Important security measures are missing or misconfigured.
Upgrade DMARC policy to quarantine or reject for stronger protection
DMARC improvement
22 / 50 points
DMARC record is valid and configured correctly.
v=DMARC1; p=none; ruf=mailto:[email protected]; fo=1; adkim=r; aspf=r; rf=afrf; ri=86400
Policy (p)
none
DKIM Alignment (adkim)
Relaxed (r)
SPF Alignment (aspf)
Relaxed (r)
Relaxed mode: The DKIM signature's domain can be a subdomain of the "From" header domain.
Relaxed mode: The SPF "Return-Path" domain can be a subdomain of the "From" header domain.
Note: When alignment parameters are not specified, DMARC defaults to relaxed mode for both DKIM and SPF alignment.
You can add our monitoring system alongside your existing setup. DMARC supports multiple mailto: addresses, giving you additional visibility and backup reporting.
External Domain Verification Issues
External domains must publish verification records to receive reports. Delivery may fail without proper verification.
0 / 20 points
No BIMI Record Found
Publish a TXT record at default._bimi.postgressummit.us with v=BIMI1, logo URL (l=) and optional verified mark certificate (a=).
26 / 30 points
SPF record is valid.
v=spf1 include:_spf.postgresql.org include:_spf.google.com ~all
Syntax Check
OK
DNS Lookup Count
6 / 10 max
Root-level mechanisms requiring DNS queries: 2.
Void Lookups
0 / 2 max
Soft fail: Mark emails from unauthorized servers as suspicious but don't reject
Grouped by DNS record source (includes and sub-includes)
This record also contains:
SPF record found
postgressummit.us
TXT Record
v=spf1 include:_v4_spf.postgresql.org include:_v6_spf.postgresql.org include:_v4_1_spf.postgresql.org include:_v6_1_spf.postgresql.org ip4:195.192.211.73 ip6:2a02:16a8:dc:b0c::73 ?all
Processed recursively per RFC 7208
SPF record found
_spf.postgresql.org
TXT Record
v=spf1 ip4:217.196.149.56 ip4:35.162.239.149 ip4:72.32.157.211 ip4:72.32.157.212 ip4:72.32.157.227 ip4:72.32.157.229 ip4:72.32.157.248 ip4:87.238.57.229 ?all
Processed recursively per RFC 7208
SPF record found
_spf.postgresql.org
TXT Record
v=spf1 ip6:2001:4800:3e1:1::211 ip6:2001:4800:3e1:1::212 ip6:2001:4800:3e1:1::227 ip6:2001:4800:3e1:1::229 ip6:2001:4800:3e1:1::248 ip6:2600:1f14:aa3:2401:72a5:4c9:e73d:b2f6 ip6:2a02:16a8:dc51::56 ip6:2a02:c0:301:0:ffff::29 ?all
Processed recursively per RFC 7208
SPF record found
_spf.postgresql.org
TXT Record
v=spf1 ip4:217.196.149.52 ip4:72.32.157.243 ip4:87.238.57.231 ?all
Processed recursively per RFC 7208
SPF record found
_spf.postgresql.org
TXT Record
v=spf1 ip6:2001:4800:3e1:1::243 ip6:2a02:16a8:dc51::52 ip6:2a02:c0:301:0:ffff::31 ?all
Processed recursively per RFC 7208
SPF record found
postgressummit.us
TXT Record
v=spf1 ip4:74.125.0.0/16 ip4:209.85.128.0/17 ip6:2001:4860:4000::/36 ip6:2404:6800:4000::/36 ip6:2607:f8b0:4000::/36 ip6:2800:3f0:4000::/36 ip6:2a00:1450:4000::/36 ip6:2c0f:fb50:4000::/36 ~all
Processed recursively per RFC 7208
0 / 10 points
TLS-RPT Not Configured
Publish a TXT record at _smtp._tls.postgressummit.us with v=TLSRPTv1 and reporting URI (rua=).
MTA-STS Not Configured
Publish a TXT record at _mta-sts.postgressummit.us with v=STSv1 and policy ID (id=).
The check you just ran shows your current configuration. But DNS records change, sometimes without you knowing. A well-meaning IT change, a third-party provider update, or an unauthorized modification can break your email delivery overnight.
Configuration Drift
IT changes that accidentally break authentication
Provider Updates
Third-party services changing their SPF includes
Unauthorized Changes
Attackers modifying records to send as you
DMARCTrust monitors your DNS records continuously. When something changes, you get an email alert with exactly what changed and why it matters. No more surprises when customers complain their emails bounced.
Run a free email authentication check (DMARC, SPF, BIMI).
We will generate a shareable URL for your domain.
Try popular examples: google.com, amazon.com, booking.com
Discover how other organizations configure their email authentication
Frequently checked
Reject policy + valid SPF
Also using none
Showing domains checked by our users. All data is from public DNS records.
We analyze your domain's email authentication: DMARC policy and alignment, SPF record and includes, and BIMI logo/CV when present.
Healthy authentication improves delivery and blocks spoofing. Major inbox providers increasingly require DMARC and robust SPF/DKIM practices for senders.
This check shows a snapshot. With DMARCTrust, you get continuous monitoring of your DMARC reports and DNS records, with instant alerts when something changes.
We use cookies to enhance your experience, analyze site traffic, and for marketing purposes. You can choose which cookies to allow. Learn more in our Cookie Policy.
Manage your cookie preferences below. Essential cookies are always active as they are required for the website to function.
Required for the website to function. Cannot be disabled.
Help us understand how visitors interact with our website.
Used to measure advertising effectiveness and show relevant ads.
Learn more about how we use cookies in our Cookie Policy.