All resources
DNS Monitoring

TXT Record Monitoring for Agencies: SPF, DMARC, Verification, and Client Risk

A practical TXT record monitoring guide for agencies tracking SPF, DMARC, verification records, vendor records, and DNS TXT changes across client domains.

Updated 10 May 2026

See exactly where your client domains stand.

Run a free audit on up to 10 domains — SSL expiry, domain expiry, and DNS health in one report. No signup needed.

TXT record monitoring helps agencies notice changes to SPF, DMARC, verification records, and vendor records that can affect email authentication, platform verification, SSL workflows, or client operations. TXT records are flexible, so they accumulate over time. That flexibility is useful, but it also creates drift.

For agencies managing client websites, TXT records often sit at the boundary between website operations, email, marketing, search, analytics, SSL, and SaaS platforms. A client may not know which TXT records matter. A previous vendor may have added records years ago. A migration may copy some values and miss others.

Use the 10-domain agency audit for broad DNS visibility and the single-domain health check when reviewing one domain. When the TXT records involve SPF, DKIM, DMARC, MTA-STS, TLS-RPT, or BIMI, use Inbox Pulse. CertPilot's public-check boundaries are explained in the methodology.

Quick answer: TXT record monitoring

TXT record monitoring means tracking public DNS TXT records and reviewing changes that affect:

  • SPF sender authorization
  • DMARC policy
  • DKIM selectors
  • email transport reporting
  • platform verification
  • search and analytics verification
  • SaaS vendor ownership
  • SSL and domain workflows

The goal is not to treat every TXT change as bad. The goal is to notice changes, label their purpose, and confirm whether they were expected.

Why TXT records are messy on client domains

TXT records become messy because many platforms use them for verification or policy. A single client domain may have TXT records for Google Workspace, Microsoft 365, SPF, DMARC, Mailchimp, HubSpot, Search Console, Facebook, Stripe, Shopify, SSL validation, and old vendors.

Common problems:

  • multiple SPF records
  • stale vendor verification
  • unknown TXT records nobody owns
  • DMARC missing or stuck at monitoring mode
  • DKIM selector records missing after migration
  • TXT records copied without context
  • DNS provider migration missed nested selector hostnames

TXT records need labels. Without labels, cleanup becomes risky.

SPF records

SPF records are TXT records that begin with v=spf1. They define which services are allowed to send mail for a domain or hostname.

Agencies should monitor SPF because:

  • duplicate SPF records can break evaluation
  • old includes can authorize retired vendors
  • too many DNS-triggering mechanisms can hit the SPF 10 lookup limit
  • SPF may not align with DMARC for real client mail

Use the multiple SPF records guide and SPF 10 lookup limit guide for cleanup workflows.

DMARC records

DMARC is published as a TXT record at _dmarc.example.com. It tells receivers how to evaluate aligned SPF or DKIM results and what policy the domain owner requests.

Monitor DMARC for:

  • missing record
  • policy changes from p=none to quarantine or reject
  • reporting destination changes
  • subdomain policy changes
  • alignment mode changes

DMARC does not guarantee inbox placement. It is an authentication policy signal. See DMARC, SPF, and DKIM for agency operations for the broader model.

DKIM and selector records

DKIM records are usually TXT or CNAME records under selector hostnames such as:

selector1._domainkey.example.com

They can be missed during DNS migrations because they are not always at the root domain. Each email platform may use different selectors. Monitor DKIM-related records by sender:

  • Google Workspace
  • Microsoft 365
  • Mailgun
  • SendGrid
  • Klaviyo
  • HubSpot
  • ecommerce platforms
  • transactional providers

If a platform reports "DKIM record not found," compare the selector hostname with the active DNS zone before changing values.

Google, Microsoft, and platform verification TXT records

Verification TXT records prove domain control to platforms. They may not affect live traffic directly, but removing them can break admin access, integrations, or future re-verification.

Track:

  • Google site verification
  • Microsoft verification
  • search console verification
  • ecommerce platform verification
  • payment platform verification
  • marketing and analytics verification
  • hosting or CDN verification

Label each record with the platform and account owner.

Vendor-specific TXT records

Vendor TXT records can be useful or stale. The agency should know which vendors are still active and which records are leftovers.

Do not remove unknown records blindly. First ask:

  • Which platform requested this?
  • Is the platform still active?
  • Is it used for email, website, payments, search, analytics, or SSL?
  • Is there an account owner?
  • Is there a safer deactivation process?

TXT record drift and old vendor cleanup

TXT drift happens when records change without matching documentation. Cleanup is valuable, but it should be controlled.

A safe cleanup process:

  1. Export current TXT records.
  2. Label known records.
  3. Mark unknown records for client review.
  4. Confirm retired vendors.
  5. Remove one group at a time where possible.
  6. Validate affected services.
  7. Record the change in the client handover notes.

What changes should trigger review

| TXT record type | Example | Why it matters | Review action | |---|---|---|---| | SPF | v=spf1 include:_spf.google.com -all | Sender authorization and DMARC alignment | Confirm active senders and lookup count | | DMARC | v=DMARC1; p=none; rua=... | Domain-level email authentication policy | Confirm policy intent and report owner | | DKIM selector | selector._domainkey TXT | Platform message signing | Match selector to sender platform | | Verification | google-site-verification=... | Platform ownership proof | Confirm platform/account owner | | Vendor TXT | Custom token or policy | SaaS, SSL, marketing, or integration ownership | Label purpose before cleanup |

How TXT monitoring connects to email authentication

SPF, DKIM, and DMARC depend on DNS. A TXT change can alter email authentication without changing mailboxes. That is why email-authentication review belongs next to DNS monitoring.

Important boundaries:

  • SPF, DKIM, and DMARC do not guarantee deliverability.
  • Inbox Pulse does not guarantee inbox placement.
  • Public DNS checks show configuration signals, not private mailbox behavior.

When to use Inbox Pulse

Use Inbox Pulse when TXT records involve:

  • SPF
  • DMARC
  • DKIM-related setup
  • MTA-STS
  • TLS-RPT
  • BIMI
  • MX and email-authentication context

Use it for onboarding, pre-campaign checks, and recurring client reviews. Pair it with direct mail platform checks when a client needs deeper deliverability work.

What CertPilot can check automatically

CertPilot checks public TXT records as part of its DNS monitoring. Drift alerts currently focus on A, AAAA, MX, NS, and TXT records. That makes TXT monitoring useful for detecting unexpected changes in public DNS.

CertPilot does not read inboxes, send test emails, manage DNS hosting, or change TXT records.

TXT record review checklist

  • Export current TXT records.
  • Identify SPF record and confirm there is one per hostname.
  • Identify DMARC record and policy.
  • Identify DKIM selector records by sender.
  • Label Google, Microsoft, and search verification records.
  • Label marketing, ecommerce, payment, and analytics verification records.
  • Mark unknown TXT records for client review.
  • Confirm stale vendors before removal.
  • Recheck public DNS after changes.
  • Document owner, reason, and review date.

Frequently Asked Questions

What is TXT record monitoring?

TXT record monitoring is the practice of watching DNS TXT records for additions, removals, and value changes. For agencies, it is most useful for email authentication, platform verification, and vendor ownership records. It helps teams spot changes that may affect SPF, DMARC, DKIM, search verification, SaaS tools, or client operations.

Why do TXT records change so often?

TXT records change often because many platforms use them to prove domain ownership or publish policy. Email providers, marketing tools, analytics platforms, search tools, ecommerce systems, and SSL workflows may all request TXT records. Over time, clients add and remove platforms, but old records often remain.

Can TXT record changes affect email?

Yes. SPF and DMARC are TXT records, and DKIM often depends on DNS records under selector hostnames. A TXT change can affect whether mail authenticates or aligns with DMARC. That does not mean every email issue is caused by DNS, but TXT records are a key part of the email-authentication picture.

Should agencies delete unknown TXT records?

Not without review. Unknown TXT records may belong to active platforms, verification workflows, payment tools, email platforms, or SSL processes. Mark unknown records, ask the client or vendor owner, and remove only when the record is confirmed stale or unsafe to keep.

How does Inbox Pulse relate to TXT record monitoring?

Inbox Pulse checks public email-authentication configuration signals such as SPF, DMARC, DKIM-related setup, MTA-STS, TLS-RPT, BIMI, and MX context. It is useful when TXT records affect email authentication. It does not guarantee deliverability or replace private mail-platform review.

What should a monthly client report say about TXT records?

Keep it plain: what changed, whether the change was expected, what service it appears to affect, and what action is recommended. Avoid dumping raw TXT values unless the client needs technical detail. For most clients, ownership and next action matter more than the full DNS string.

Monitor every client domain from one dashboard.

CertPilot checks SSL expiry, DNS records, and domain registration daily — then sends one alert when action is needed. 14-day free trial, no card required.