Someone Is Sending Emails from my Domain name/Website

Spoofing is the most popular method of spreading spam in the web development industry at present and it is a painful one because as an organisation, you can end up inundated with calls because someone somewhere has spoofed an email address on your domain and is sending out messages which worry consumers.

Don’t get frightened.  Its not you or a ghost and its not your web developer either.  A typical example is when someone rings your company and insists that they got an email from a sender at your organisation with an email address at your domain eg. and sometimes that email and person exists and other times it does not.

A lot of web developers don’t know much about some other technical aspects of managing domains, so if this happens to you, make sure you call your domain manager and ask them about SPF.  SPF is the first choice solution to prevent the problem. To resolve the problem, you may want to suspend email sending from your domain for a number of hours.  usually about 6 hours is enough and at best 24 hours of banned sending from your mailservers flushes out queued emails from a spoofer and they can then move on to another victim.
A carefully tailored SPF record will reduce the likelihood of your domain name getting fraudulently spoofed and keep your messages from getting flagged as spam before they reach your recipients. Email spoofing is the creation of email messages with a forged sender address; something that is simple to do because many mail servers do not perform authentication. Spam and phishing emails typically use such spoofing to mislead the recipient about the origin of the message.

A number of measures to address spoofing, however, have developed over the years: SPF , Sender ID , DKIM , and DMARC .

Sender Policy Framework (SPF) is an email validation system designed to prevent spam by detecting email spoofing. Today, nearly all abusive e-mail messages carry fake sender addresses. The victims whose addresses are being abused often suffer from the consequences, because their reputation gets diminished, they have to waste their time sorting out misdirected bounce messages, or (worse) their IP addresses get blacklisted.

The SPF is an open standard specifying a technical method to prevent sender-address forgery. SPF allows administrators to specify which hosts are allowed to send mail on behalf of a given domain by creating a specific SPF record (or TXT record) in the Domain Name System (DNS). Mail exchangers use DNS records to check that mail from a given domain is being sent by a host sanctioned by that domain’s administrators.


Adding an SPF record to your DNS zone file is the best way to stop spammers from spoofing your domain. In addition, an SPF Record will reduce the number of legitimate e-mail messages that are flagged as spam or bounced back by your recipients’ mail servers. The SPF record is not 100% effective, unfortunately, because not all mail providers check for it. Many do, however, so you should notice a significant decrease in the amount of bounce-backs you receive.

Example SPF Record

An SPF record is added to your domain’s DNS zone file as a TXT record and it identifies authorized SMTP servers for your domain.

TXT @ "v=spf1 a ~all"

Depending on what provider you use to manage your domain and emails it may be necessary to make sure you wrap the SPF record with quotes. The following table provides an explanation of the various components of the Example SPF Record:

Components Description
TXT The DNS zone record type; SPF records are written as TXT records
@ In a DNS file, the “@” symbol is a placeholder used to represent “the current domain”
v=spf1 Identifies the TXT record as an SPF record, utilizing SPF Version 1
a Authorizes the host(s) identified in the domain’s A record(s) to send e-mail
include: Authorizes mail to be sent on behalf of the domain from
~all Denotes that this list is all inclusive, and no other servers are allowed to send e-mail

Components of an SPF Record

An SPF record consists of the SPF version number followed by strings comprised of (i) mechanisms, (ii) qualifiers, and (sometimes) (iii) modifiers. SPF clients ignore TXT records that do not start with the version string "v=spf1 ...".

SPF records may define zero or more mechanisms. Mechanisms can be used to describe the set of hosts which are designated as authorized, outbound mailers for the domain. The following list are common mechanisms included in an SPF record:

all | ip4 | ip6 | a | mx | ptr | exists | include

Mechanisms can be prefixed with one of four qualifiers:

Qualifier Description
+ Pass = The address passed the test; accept the message. Example: “v=spf1 +all”
(Hard) Fail = The address failed the test; bounce any e-mail that does not comply. Example: “v=spf1 -all”
~ Soft Fail = The address failed the test, but the result is not definitive; accept & tag any non-compliant mail. Example: “v=spf1 ~all”
? Neutral = The address did not pass or fail the test; do whatever (probably accept the mail). Example: “v=spf1 ?all”

If a qualifier is not included, the + qualifier is implied.

SPF records may also define 1 of 2 modifiers; or, no modifier at all. Each modifier, however, can appear only once.

redirect | exp

SPF records are evaluated in a two-pass process: First, all mechanisms and qualifiers are evaluated. Then, all modifiers are evaluated:

  1. Mechanisms are evaluated from left to right;
  2. Modifiers are evaluated on the second pass and can occur anywhere in the record.


Mechanism Description
all Matches all local and remote IPs and goes at the end of the SPF record. Example: “v=spf1 +all”
ip4 Specifies a single IPv4 address or an acceptable IPv4 address range. A mask of /32 is assumed if no prefix-length is included. Example: “v=spf1 ip4: -all”
ip6 Same concept found in ip4, but, obviously, with IPv6 addresses, instead. If no prefix-length is given, /128 is assumed (singling out an individual host address). Example: “v=spf1 ip6:1080::8:800:200C:417A/96 -all”
a Specifies all IPs in the DNS A record. Example: “v=spf1 -all”
mx Specifies all A records for each host’s MX record. Example: “v=spf1 mx -all”
ptr Specifies all A records for each host’s PTR record. Example: “v=spf1 -all”
exists Specifies one or more domains normally singled out as exceptions to the SPF definitions. An A query is performed on the provided domain; if a result is found a match occurs. Example: “v=spf1 -all”
include Specifies other domains that are authorized domains. Example: “v=spf1 -all”

The “all” Mechanism

The all mechanism usually goes at the end of the SPF record; and it is prefixed with a qualifier, e.g.

Examples Description
“v=spf1 mx -all” Allows the domain’s MX hosts to send mail for the domain, and prohibits all other hosts.
“v=spf1 -all” The domain sends no mail at all.
“v=spf1 +all” This SPF is useless, as it does not limit the hosts that are authorized to send e-mail.


Modifiers are optional and a modifier may appear only once per record. Unknown modifiers are ignored.

The “redirect ” modifier sends the inquiry to another domain.

That is, the SPF record for replaces the SPF record for the current domain. The redirect modifier is useful to those that wish to apply the same record to multiple domains. For example:

Sample entry in’s zone file: TXT @ “v=spf1”
Sample entry in’s zone file: TXT @ “v=spf1”
Sample entry in’s zone file: TXT @ “v=spf1”
Sample entry in’s zone file: TXT @ “v=spf1 -all”

For clarity, it is RECOMMENDED that any “redirect” modifier appear as the very last term in a record.

The “exp ” modifier sets up an explanation in the SPF record.


If an SPF query produces a FAIL result, the explanation is queried and the explanation string provides more information to the nonconforming user. The explanation is typically placed in an SPF log. Example: exp=spf-error. An SPF publisher can specify the explanation string that senders see. This way, an ISP can direct nonconforming users to a web page that provides further instructions.

Putting it all together

Although you do not need an SPF record on your DNS server to evaluate incoming email against SPF policies published on other DNS servers, the best practice is to set up an SPF record on your DNS server. Setting up an SPF record lets other email servers use SPF filtering (if the feature is available on the mail server) to protect against incoming email from spoofed, or forged, email addresses that may be associated with your domain. As SPF records are implemented more widely, SPF filtering will become more effective at identifying spoofed email messages.