No SPF Record Found: What It Means and How to Fix It
Nov 13, 2025
Key Takeaways
-
If you see “No SPF record found,” providers can’t verify your sending source, which raises spam and rejection risk. Publish a valid SPF TXT at the root of your domain as a priority.
-
Validate early and often using an SPF syntax checker, then watch DMARC reports to spot missing senders and misconfigurations before they hurt deliverability.
-
SPF works best alongside DKIM and DMARC. Using all three reduces spoofing, protects brand trust, and improves alignment with the From domain.
-
Maintain a single, precise TXT record. Avoid multiple SPF records, keep total DNS lookups under 10, and fix common issues like wrong host, wrong record type, or broken includes.
-
DNS updates are usually quick, but caching happens. Give changes a little time, then recheck to confirm the record is live and parsing correctly.
-
Treat SPF as ongoing maintenance. Update it when vendors or IPs change, schedule periodic reviews, and equip your team to use the checker and DMARC reporting tools.
“No SPF record found,” means mailbox providers can’t verify your sending source (who is allowed to send emails using your domain name). That puts your messages at higher risk of landing in spam or being rejected outright. The fix isn't difficult however: publish a valid SPF TXT record at your root domain and make sure it covers every system that sends emails using your domain.
New to SPF? If you want the full SPF-DKIM-DMARC 101, see our primer and come right back for the hands-on steps: What is SPF, DKIM, and DMARC?
How to Fix "No SPF Record Found"

Step 1: Confirm What is Causing the SPF Error
First you need to see what is causing the error. Are you actually missing an SPF record, or is there an issue with your record that's causing it to no be found. An easy way to check is to utilize an SPF syntax checker like Input Output's SPF Checker.
Step 2: Identify all of Your Sending Sources
Be sure to list every system and service that sends emails using your domain name. This typically includes one of the "major" services like Google Workspace or Microsoft 365, but don't forget your web host, CRM, help desk ticketing software, marketing platforms, billing solutions, etc.
To help identify all of your sending sources, you can use a tool like iO™ DMARC which can monitor your SPF, DKIM, and DMARC compliance and identify any gaps.
Step 3: Build Your SPF Record and Select Your Starting Policy
Once you build your SPF record, you'll also want to decide whether you want to start with ~all (SoftFail) or -all (HardFail). Best practice, is to start with ~all (SoftFail) while your validating your record (making sure you haven't forgotten any sending sources), and then (once you're sure everything is setup correctly), tightening it up to -all (HardFail).
If you’re unsure about fail modes, see SPF Hard Fail vs Soft Fail and What does it mean if SPF fails?
The Correct SPF TXT Format

Regardless of where you manage your DNS, your SPF record should have the following components:
-
Name/Host: @ -
Type: TXT -
Value: v=spf1 <mechanisms> ~all -
TTL: 3600 (or your standard)
Common mechanisms you’ll typically use include:
-
include:<provider>-
This allows you to utilize the SPF record of a trusted sending source.
-
-
ip4:<address>orip6:<address>-
This allows you to specifically identify a trusted source by their IP address (and helps avoid the 10 DNS lookup limit)
-
-
aormx-
There are only used if you actually send from your web or MX hosts
-
These are just a few of the typical SPF mechanisms. If you'd like to dive into the full list (and what they all mean and how to use them, check out How to Setup SPF.
You'll also want to check your record with an SPF checker once you publish it to make sure it's setup correctly and catch any typos, duplicate records, or broken include statements.
Provider Specific SPF Fixes and Setup Instructions

While there are an almost unlimited number of sending sources and platforms available, some of the most common are listed below showing their typical (default) SPF record, and how to manage the record on the platform if you're using it to manage your DNS records.
Each of these provided below are using the ~all (SoftFail) qualifier (which you'll later want to tighten to -all) and are the default settings for that platform. You'll want to be sure to double check the settings for your environment, and to make sure to add all your other sending sources as well (as you'll typically use more than just these listed below).
Microsoft 365
How to Add SPF Record for Microsoft 365
If you're utilizing Microsoft 365 to send emails, you'll want to add their include statement to your SPF record.
v=spf1 include:spf.protection.outlook.com ~all
How to Setup SPF In Microsoft
If you manage your DNS directly within Microsoft, here are the quick steps to update your record within the Microsoft environment.
-
Sign in to the M365 admin center
-
Select 'Settings' then 'Domains'
-
Click 'Manage DNS'
Google Workspace
How to Add SPF Record for Google Workspace
If you're utilizing Google Workspace to send emails (not an @gmail.com account), you'll want to add their include statement to your SPF record.
v=spf1 include:_spf.google.com ~all
How to Setup SPF in Google
If your DNS records are managed within Google Domains, these steps should get you to where you need to be to update your records.
-
Access your Google Admin account
-
Go to 'Menu' then 'Account' and 'Domains'
-
Select 'Manage Domains' (this requires that you have domain settings administrator privileges)
GoDaddy
How to Set Up Record for GoDaddy
If you're sending emails using GoDaddy (not just using them as your registrar), you'll want to be sure to utilize the following record.
v=spf1 include:secureserver.net ~all
How to Add SPF Record in DNS GoDaddy
If GoDaddy manages your DNS records, the following steps will allow you to quickly update your DNS records.
-
Sign in to your GoDaddy account
-
Select 'My Products' from your profile image in the top right
-
Scroll down to the domain you want to manage and click 'DNS'
Common Reasons You See “No SPF Record Found”

-
The record exists but as SPF type, not TXT
-
Be sure to use TXT. Some legacy “SPF” record types are still supported within DNS updates, but are not typically recognized.
-
-
The record is on the wrong host
-
SPF belongs at the root of the from domain, not a subdomain you don’t send from (meaning your name/host should be '@' not 'www' or something else unless you're sending from those subdomains).
-
-
You published multiple SPF TXT records
-
Multiple separate SPF TXT records are treated as broken. Merge them into one.
-
-
Your DNS hasn’t propagated
-
Most providers update quickly, but some resolvers cache for a while. Give it a bit, then recheck.
-
If you'd like to investigate other errors, check out our guide on Common SPF Errors and Fixes
Validate Before You Tighten Policy

-
Start with the
~allqualifier and while you perform test. -
Use the Input Output SPF Checker to identify any immediate issues.
-
Monitor email bounces and headers for 30 - 60 days using a tool like iO™ DMARC
-
Use the iO SPF Syntax Checker for a spf syntax check or spf syntax checker pass.
-
Once you're satisfied that you've identified all your sending sources and correctly configured them within your SPF record, update your qualifier to -all to reject emails from non-configured senders.
Learn more about ~all vs -all in our SPF Hard Fail vs Soft Fail
Conclusion and Next steps
Fixing the “No SPF record found” error is one of the fastest ways to improve your email deliverability and protect your domain’s reputation. By publishing a valid SPF TXT record, testing it with a syntax checker, and including all legitimate sending sources, you give mailbox providers the information they need to trust your messages.
Once your record is in place, keep an eye on your results and gradually move from a soft fail (~all) to a hard fail (-all) for stronger protection. If you run into any edge cases or want to explore more advanced troubleshooting, check out our deeper dives:
Get your record right, verify it often, and your emails will have a much better shot at landing where they belong, in the inbox, not the abyss.
Frequently Asked Questions
Do I Need Separate SPF Records for Subdomains?
Yes and No. Subdomains are typically covered by the root domain record however, if you send a lot of email from a subdomain, or depending on the sending source (some require specific subdomain SPF, DKIM, and DMARC records), you may need to setup specific records for your subdomains.
What if I Use Multiple Services to Send Emails?
Use a single TXT record and combine your mechanisms. For example, if you're sending email from Microsoft, SalesForce and Mailchimp, your SPF record would most likely be configured as follows:
v=spf1 include:spf.protection.outlook.com include:servers.mcsv.net include:_spf.salesforce.com -all
If you're using multiple sending sources, you'll want to be careful you don't exceed the 10 DNS lookup limit. Utilizing an SPF flattener like iO™ DMARC can help you manage multiple senders.
Can I Skip SPF if I Have DKIM and DMARC
You shouldn't. DMARC utilizes both SPF and DKIM. Missing SPF can reduce your alignment options and negatively impact deliverability.
Why is a Missing SPF Record Risky?
As a minimum requirement for most email servers, not having an SPF record can prevent your emails from being delivered (or will at least land them in spam). Additionally, not having a correctly configured SPF record allows attackers to spoof your domain which could further degrade your domain's reputation.
What SPF Mistakes Should I Avoid?
No multiple SPF records DNS lookups should not be greater than 10. Don’t use +all. Use “-all” or “~all”. Enumerate all permitted senders. Delete former sending sources. Check syntax. Check after each modification.
How Often Should I Review my SPF Record?
Check at least every quarter or when you add or delete a sender. Check after platform modifications or deliverability problems. Keep it up to date to guard reputation and inbox placement. Utilizing a service like iO™ DMARC
What Should I Add Beyond SPF?
Turn on DKIM so your emails are signed. Enhance with DMARC policy to align SPF and DKIM and receive reports. Begin with p=none for observance. Quarantine or reject after validation. This enhances authentication and prevents spoofing. You can further enhance your domain's reputation (after DMARC is set to p=reject) with BIMI.
STAY INFORMED
Subscribe now to receive the latest expert insights on cybersecurity, compliance, and business management delivered straight to your inbox.
We hate SPAM. We will never sell your information, for any reason.