All resources
Inbox Pulse

SPF Record Not Found: What Agencies Should Check on Client Domains

Learn what “SPF record not found” means, why agencies should review it, and how to check sender sources, DNS records, and client email platforms.

Updated 17 May 2026

See exactly where your client domains stand.

Run a free audit on up to 10 domains — SSL expiry, domain expiry, and DNS health in one report. No signup needed.

"SPF record not found" usually means the domain does not publish a visible v=spf1 TXT record at the domain being checked. That does not explain every email issue, and SPF alone does not guarantee deliverability, but it is an important public email-authentication configuration signal agencies should review when they manage client DNS, migrations, or onboarding.

For agencies, the immediate job is not to paste a generic SPF record into DNS. The job is to identify which systems are allowed to send mail as the client domain, confirm where the SPF record should live, check whether old vendors are still present elsewhere, and build a record that matches the client's real sending sources. Use Inbox Pulse to check visible public email-authentication records, use the free 10-domain agency audit when SPF should be reviewed alongside broader domain health, and review the CertPilot methodology for how CertPilot uses public DNS data and what those checks can and cannot prove.

Quick answer: SPF record not found

An SPF record not found result normally means a DNS lookup did not find a TXT record beginning with v=spf1 at the checked host. For a root-domain check, that means the checker looked at something like example.com. For a subdomain check, it may mean the checker looked at mail.example.com, news.example.com, or another sending host.

The finding matters because receivers use SPF to evaluate whether the sending IP is authorized by the domain in the SMTP envelope. It is one part of email authentication, alongside DKIM and DMARC. A missing SPF record may be acceptable for a domain that never sends mail, but it is worth reviewing for any client domain used for Google Workspace, Microsoft 365, marketing automation, billing, CRM, helpdesk, website forms, or ecommerce notifications.

Do not treat the finding as proof that messages are failing. Treat it as a configuration gap that needs sender inventory and DNS review.

What an SPF record does

SPF stands for Sender Policy Framework. It lets a domain owner publish a list of systems that are allowed to send mail for that domain. A typical SPF record is a DNS TXT record that starts with v=spf1.

Example:

v=spf1 include:_spf.google.com include:send.example.net ~all

That record says, in plain English: Google and the vendor behind send.example.net are expected senders, and other senders should be treated with caution depending on the final mechanism. SPF is checked against the envelope sender domain, not always the visible From address the client sees in an email app. DMARC then looks at whether SPF or DKIM aligns with the visible From domain.

For a deeper comparison, the SPF, DKIM, and DMARC guide for agency operations explains how SPF fits into the broader authentication model.

Where SPF records live in DNS

Most client domains publish SPF as a TXT record at the root domain:

example.com TXT "v=spf1 include:_spf.google.com ~all"

Some sending subdomains also publish their own SPF records:

mail.example.com TXT "v=spf1 include:mailvendor.example ~all"

Agencies often run into confusion when a client sends from several subdomains. A checker may say "SPF record not found" for news.example.com while example.com has a valid SPF record, or the reverse. That is not necessarily a contradiction. SPF is evaluated at the domain involved in the sending path, so the right lookup depends on how the mail platform sends.

The DNS record inventory guide is useful when you need a clean map of which DNS records exist before changing anything.

Why an SPF record may be missing

An SPF record may be missing for several normal reasons:

  • The domain has never been configured to send email.
  • The client only receives email and does not send from that domain.
  • Email was migrated, but the DNS instructions were never completed.
  • A vendor told the client to add SPF to a subdomain, but the root domain was checked.
  • A previous agency removed an old record without documenting current senders.
  • The domain relies on DKIM alignment for DMARC in some flows, but still lacks SPF coverage.
  • The DNS zone is split across providers, and the visible public record is not where the client thinks it is.

The agency workflow should start with discovery. Ask which platforms send as the domain, then compare that list against DNS.

Root domain vs subdomain confusion

Root-domain and subdomain confusion is one of the most common causes of false confidence or false alarm.

If a client sends newsletters from news.example.com, checking only example.com may miss the SPF record that affects that sending stream. If the client sends ordinary employee mail from user@example.com, checking news.example.com may return "SPF record not found" even though the root domain is correctly configured.

Use this decision rule:

  • Check the root domain when employees or general business systems send as name@example.com.
  • Check each sending subdomain when a platform sends as name@subdomain.example.com.
  • Check vendor instructions before assuming the SPF record belongs at the root.
  • Do not copy a root-domain SPF record to every subdomain without confirming the sending model.

This is also why agencies should document sender ownership. A record may be missing because the subdomain is not supposed to send mail.

Client uses multiple senders

Client SPF records often become messy because the client adds senders gradually. A realistic client stack might include:

  • Google Workspace or Microsoft 365 for employee mail.
  • HubSpot, Mailchimp, Klaviyo, or another campaign platform.
  • Shopify, WooCommerce, Stripe, or invoicing systems.
  • A helpdesk or ticketing platform.
  • Website form delivery through SMTP or an email API.
  • Legacy platforms that are no longer used.

Each legitimate sender may require SPF, DKIM, or both. SPF has a practical limit: the evaluation can include no more than 10 DNS lookups. The SPF 10 lookup limit guide explains why agencies should not keep stacking vendor includes indefinitely.

If a checker says SPF is missing, do not build the record from memory. Build it from the current sender inventory.

Old vendor cleanup and missing documentation

Agencies inherit records that were added during campaigns, redesigns, CRM migrations, ecommerce launches, and emergency deliverability fixes. The problem is not just missing SPF. It is missing documentation.

Before adding a new SPF record, look for evidence of old email infrastructure:

  • DKIM selectors for vendors the client no longer uses.
  • TXT verification records from old platforms.
  • MX records that do not match the client's stated mailbox provider.
  • DMARC records with reporting addresses nobody monitors.
  • Marketing-platform records on subdomains.

The TXT record monitoring guide explains why stale TXT records become operational debt. Removing stale records can be useful, but only after ownership is confirmed.

What agencies should check before adding SPF

Before adding SPF, confirm the operational facts:

| Finding | What it may mean | What to verify | Agency action | |---|---|---|---| | No v=spf1 TXT record at root | Root domain has no SPF record | Whether the root domain sends email | Build sender inventory before adding SPF | | No SPF on sending subdomain | Subdomain may not be configured or may not send | Whether a platform sends from that subdomain | Add only if the subdomain is a real sender | | Client uses many vendors | SPF may need several includes | Which vendors are current and legitimate | Remove stale senders before adding new includes | | DKIM exists but SPF missing | Some platforms may rely on DKIM | Whether SPF is still required by the sender | Follow platform-specific instructions | | DMARC exists with missing SPF | DMARC may still pass through DKIM alignment | Whether legitimate flows align | Do not change policy before alignment review | | DNS provider differs from registrar | Updates may be made in the wrong place | Authoritative nameservers | Edit the active DNS zone only |

This table is intentionally conservative. DNS edits affect real mail. The safer path is to inventory first, then edit.

How to build an SPF record safely

A safe SPF workflow for agencies looks like this:

  1. List every current sending platform.
  2. Confirm the visible From domains and subdomains each platform uses.
  3. Collect the official SPF instructions from each active vendor.
  4. Check whether the domain already has a hidden issue, such as multiple SPF records.
  5. Combine legitimate senders into one SPF TXT record for each relevant domain.
  6. Keep the record under the SPF 10 DNS lookup limit.
  7. Use ~all or -all only after understanding the client's sender coverage and risk tolerance.
  8. Record why each include exists.

If the domain already has more than one SPF record, use the multiple SPF records guide before adding anything. Multiple SPF records can cause SPF evaluation problems.

SPF missing-record review checklist

Use this checklist before recommending a DNS change:

  • [ ] Confirm the exact domain or subdomain that was checked.
  • [ ] Confirm whether that domain is supposed to send mail.
  • [ ] Identify the active mailbox provider.
  • [ ] Identify marketing, CRM, billing, helpdesk, ecommerce, and website-form senders.
  • [ ] Check for existing DKIM selectors that reveal active vendors.
  • [ ] Check whether a DMARC record exists at _dmarc.
  • [ ] Check whether the authoritative DNS provider is known.
  • [ ] Check whether old vendors can be removed before adding new includes.
  • [ ] Confirm the SPF record will remain within the 10 DNS lookup limit.
  • [ ] Document each mechanism or include before publishing.

What Inbox Pulse can check

Inbox Pulse can check visible public DNS/email-authentication configuration signals, including whether an SPF TXT record appears to be present for the checked domain and whether related records such as DMARC, MTA-STS, TLS-RPT, BIMI, and MX are visible where supported.

That makes it useful for agency QA, onboarding checks, and recurring client-domain reviews. It helps surface configuration risks faster. It does not log in to DNS providers, change records, read inboxes, send test emails, or guarantee inbox placement. Use it as a configuration auditor, then combine the result with DNS provider access, mail-platform settings, and manual review.

What a missing SPF record does not prove

A missing SPF record does not prove that:

  • All client email is failing.
  • The domain is being spoofed successfully.
  • DMARC is failing for every message.
  • The client has no email authentication at all.
  • A single generic SPF record will fix deliverability.
  • A stricter all mechanism is automatically better.

SPF is one signal. For real deliverability diagnosis, combine DNS checks with mail-platform tools, message headers, bounce data, sender reputation systems, list quality, and platform-specific guidance.

Frequently Asked Questions

What does SPF record not found mean?

SPF record not found usually means the checked domain does not publish a visible DNS TXT record beginning with v=spf1. The checker may have looked at the root domain, such as example.com, or at a sending subdomain. The result means SPF was not found at that exact location. It does not prove that every email from the client fails, but it is a configuration signal agencies should review when a domain sends email.

Should every client domain have an SPF record?

Every client domain that sends email should normally be reviewed for SPF. A domain that only receives mail or is parked may not need the same configuration. Agencies should first confirm whether the domain sends employee mail, marketing campaigns, invoices, helpdesk replies, ecommerce notifications, or website-form messages. If it sends as the domain, SPF is usually part of the expected email-authentication foundation.

Can I copy an SPF record from another client?

No. SPF records should match the client's actual sending platforms. Copying another client's record can authorize the wrong vendors, miss current senders, exceed lookup limits, or create confusing documentation. Start with the client's mailbox provider and active sending tools, then use each vendor's current instructions. The record should be built from sender inventory, not from a template.

Does SPF guarantee deliverability?

No. SPF does not guarantee deliverability or inbox placement. It is one email-authentication signal receivers may use when evaluating mail. Deliverability also depends on DKIM, DMARC alignment, sender reputation, list quality, content, bounce handling, complaint rates, mailbox-provider behavior, and platform-specific settings. Agencies should describe SPF as a configuration control, not as a delivery guarantee.

What if DKIM exists but SPF is missing?

That can happen. Some platforms rely more heavily on DKIM signing, and DMARC can pass if either SPF or DKIM passes and aligns with the visible From domain. Still, a missing SPF record is worth reviewing if the domain sends mail. The right next step is to check the sender inventory and DMARC alignment rather than assuming DKIM alone covers every flow.

Can Inbox Pulse fix a missing SPF record?

No. Inbox Pulse can check public DNS/email-authentication configuration signals, but it does not manage DNS hosting or change records automatically. Agencies still need access to the correct DNS provider, the client's mail-platform instructions, and a safe change process. Use the check to identify the issue, then make DNS changes through the client's authorized DNS management workflow.

Monitor every client domain from one dashboard.

CertPilot checks SSL expiry, DNS records, and domain registration daily — then sends one alert when action is needed. 14-day free trial, no card required.