Tools / DNS Domain / Use Cases / Verify SPF and DKIM Records

Verify SPF and DKIM Records

Check that email authentication records are correctly configured to prevent spoofing and improve deliverability.

Tool
DNS Domain icon
DNS Domain

SPF, DKIM, and DMARC records tell receiving mail servers how to verify that email claiming to be from your domain is legitimate. Misconfigured records mean your legitimate emails land in spam, or worse, anyone can send email pretending to be you.

The lookup_dns skill retrieves your TXT records so you can verify SPF, DKIM, and DMARC are set up correctly. Check that your SPF record includes all your sending services, that DKIM selectors resolve properly, and that DMARC policies are in place.

Agent Guides

Claude

  1. Connect ToolRouter: claude mcp add toolrouter -- npx -y toolrouter-mcp
  2. Ask Claude: "Check the SPF, DKIM, and DMARC records for example.com using dns-domain"
  3. Claude retrieves the TXT records and analyzes your email authentication setup
Read full guide →

ChatGPT

  1. Configure ToolRouter in ChatGPT
  2. Ask: "Check the email authentication records for example.com"
  3. ChatGPT retrieves and analyzes SPF, DKIM, and DMARC records
Read full guide →

Copilot

  1. Add ToolRouter to Copilot MCP config
  2. In Copilot Chat: "Verify SPF and DKIM records for our domain"
  3. Copilot retrieves TXT records and checks email authentication setup
Read full guide →

OpenClaw

  1. Connect ToolRouter: openclaw mcp add toolrouter -- npx -y toolrouter-mcp
  2. Ask OpenClaw: "Verify the SPF and DKIM records for example.com"
  3. OpenClaw retrieves and analyzes email authentication records
Read full guide →

Related Use Cases

Open Look Up DNS Records

Look Up DNS Records

Query DNS records for any domain to inspect A, AAAA, MX, CNAME, TXT, and NS configurations.

DNS Domain icon
DNS Domain
4 agent guides
Open Audit DNS Security

Audit DNS Security

Review DNS configuration for security issues including missing records, open resolvers, and misconfigured entries.

DNS Domain icon
DNS Domain
4 agent guides
Open Monitor DNS Changes

Monitor DNS Changes

Check DNS records and WHOIS data to detect unauthorized or unexpected changes to your domain configuration.

DNS Domain icon
DNS Domain
4 agent guides

Related Workflows

Domain Acquisition ResearchResearch domain acquisition opportunities by searching availability, checking ownership, examining DNS, and reviewing domain history.Website Migration AuditPrepare for website migration by crawling the current site, documenting SEO baselines, benchmarking performance, and recording DNS configuration.SSL and DNS AuditAudit SSL certificates, DNS configuration, HTTP security headers, and domain registration for security gaps.Subdomain Security ScanEnumerate subdomains, probe services, scan for takeover vulnerabilities, and capture visual evidence.Infrastructure Health CheckVerify DNS resolution, service availability, and server locations to ensure infrastructure is healthy and correctly configured.Domain Intelligence ReportBuild a comprehensive intelligence report on any domain using WHOIS, DNS, geolocation, and web archive data.Network ReconnaissanceMap the complete network attack surface through DNS enumeration, geolocation, service probing, and attack vector analysis.Incident Response ToolkitInvestigate security incidents by verifying DNS integrity, scanning for compromise indicators, and researching threat intelligence.Certificate MonitoringMonitor SSL/TLS certificates for expiration, verify TLS configuration, and confirm domain ownership alignment.Phishing Infrastructure AnalysisInvestigate suspected phishing domains through registration analysis, DNS inspection, geolocation, and evidence capture.Cloud Security AuditAudit cloud infrastructure by discovering assets, probing for misconfigurations, testing cloud-specific attacks, and checking CVEs.Pre-Acquisition Domain AuditAudit a domain before purchase by reviewing registration history, DNS state, web archive history, and SEO reputation.Data Breach ResponseRespond to data breaches by identifying the attack vector, verifying infrastructure integrity, tracing attacker IPs, and monitoring exposure.Continuous Security MonitoringMaintain ongoing security visibility through DNS monitoring, service probing, vulnerability scanning, and CVE tracking.