Attackers can send emails that look like they come from your domain — unless you have SPF, DKIM, and DMARC set up correctly. Find out in 10 seconds.
Email spoofing is when someone sends an email that appears to come from your domain — like [email protected] — without your permission. It's the #1 technique in business email compromise (BEC) attacks.
Email spoofing isn't a theoretical risk — it's the most financially damaging form of cybercrime according to the FBI.
Select your email provider or registrar for specific instructions. Each guide takes 15–30 minutes to complete.
@ (root domain)If you also use other email services (e.g., Mailchimp), add their include too: v=spf1 include:_spf.google.com include:servers.mcsv.net -all
google._domainkey)_dmarc (hostname: _dmarc.yourdomain.com)After 2–4 weeks of monitoring, upgrade to enforcement:
@ (root domain)_dmarcUpgrade to enforcement after 2–4 weeks:
@, Value:If you use Google Workspace or Microsoft 365 with GoDaddy, use their SPF include instead (see guides above).
_dmarc@, Value:Replace the include with your email provider's SPF domain.
google._domainkey)_dmarcWe'll scan your domain across 5 security dimensions — SSL, email, breaches, headers, and DNS — and email you a detailed PDF with prioritized fix steps.
Email spoofing is when an attacker sends an email that appears to come from your domain (e.g., [email protected]) without your authorization. The email looks completely legitimate to the recipient. It's the primary technique used in business email compromise (BEC) attacks — like fake invoices, wire transfer requests, and credential phishing.
SPF (Sender Policy Framework) lists which mail servers are authorized to send email for your domain. DKIM (DomainKeys Identified Mail) adds a cryptographic signature to prove the email wasn't tampered with. DMARC (Domain-based Message Authentication, Reporting and Conformance) ties them together and tells receiving servers what to do when authentication fails — ignore it, quarantine it, or reject it outright.
Yes. This tool only reads your publicly available DNS records — the same information any mail server in the world can see. It doesn't send emails, probe your servers, or access anything private.
You need to add three DNS TXT records: an SPF record listing your authorized email servers, enable DKIM signing in your email provider, and add a DMARC record with a policy of "quarantine" or "reject." See the platform-specific guides above for step-by-step instructions.
This tool checks only email authentication (SPF, DKIM, DMARC). The full SentryScore scan also checks SSL/TLS configuration, data breach history, HTTP security headers, and DNS quality — giving you a comprehensive 0–100 security score across five dimensions.