Free SPF Record Generator
Build a valid SPF TXT record for any sending domain in under a minute — with live DNS lookup and real-time DNS-lookup-budget counting.
SPF tells receiving mailbox providers which servers are allowed to send mail on behalf of your domain. We pull your current SPF live, detect the senders we recognize, and let you add more from a verified ESP library — counting the recursive DNS lookups as you go, so you never exceed the 10-lookup limit that silently breaks SPF in production.
Your SPF Record
Receivers stop evaluating SPF after 10 lookups (RFC 7208 §4.6.4). Stay under the limit.
Lookup tree (live)
Publish this as a TXT record at host @ on your DNS provider. It replaces whatever SPF record is currently there.
Always verify after publishing. This tool builds a syntactically valid record from your inputs, but real-world deliverability depends on factors the tool can't see — DKIM alignment, your sending IP's reputation, the recipient's filter rules, and DNS-propagation timing. Send a test message and confirm SPF passes with our free Email Spam Checker before relying on this record in production.
DNS provider instructions
Cómo funciona
Enter your domain
Type your sending domain. We pull your current SPF live and pre-check the senders we recognize — so you start from what's actually published, not a blank slate.
Pick your senders
Add Google Workspace, SendGrid, Mailchimp — whatever sends mail for you. We count the DNS lookups in real time so you never blow past the 10-lookup limit that silently breaks SPF.
Publish the TXT record
Copy the generated record and add it at the apex (host @) of your domain in your DNS provider. Most receivers see it within an hour.
What is an SPF record generator?
An SPF record generator produces the exact DNS TXT record needed to declare which servers are allowed to send mail on behalf of a domain.
The record lists authorized IPs, ESPs, and host mechanisms, then ends with an all qualifier telling receivers what to do with mail that doesn't match (soft fail, hard fail, or neutral). Used together with DKIM and DMARC, SPF is one of three DNS records that prove a message wasn't spoofed. InboxAlly's free SPF Record Generator builds a syntactically valid record from your inputs, parses any record you already have, and counts the recursive DNS lookups live so you never cross the 10-lookup limit (the #1 SPF failure mode in production). Implements RFC 7208.
Why Publish an SPF Record?
Stop unauthorized senders
SPF declares the exact list of servers allowed to send for your domain. Anything outside that list fails authentication — the foundation that DMARC builds on to actually block spoofed mail.
Meet Gmail and Yahoo bulk-sender requirements
Gmail and Yahoo require SPF (alongside DKIM and DMARC) for any sender pushing more than 5,000 messages a day. A correctly formed record keeps you compliant — and out of the spam folder.
Stay under the 10-lookup limit
RFC 7208 §4.6.4 caps SPF evaluation at 10 DNS lookups. Cross the line and receivers return a permerror, treating your SPF as if it doesn’t exist. Our live recursive counter shows you exactly how close you are, in real time.
Build the foundation for DMARC
SPF, DKIM, and DMARC are designed to work together — SPF and DKIM authenticate, DMARC enforces. Publishing valid SPF is the prerequisite for turning on DMARC without breaking your real mail streams.
Understanding the all Qualifier
No assertion about non-matching mail. Receivers treat it the same as if you had no SPF record at all. Almost never the right choice.
Non-matching mail is accepted but flagged. The recommended starting position while you confirm every legitimate sender is listed. DMARC treats ~all the same as -all.
Non-matching mail is rejected outright. The strongest defense against domain spoofing — safe to enable once your sender list is complete.
SPF Record Generator FAQ
What is an SPF record and why do I need one?
An SPF (Sender Policy Framework) record is a DNS TXT entry that lists which servers and services are allowed to send email on behalf of your domain. Receiving mailbox providers check it on every inbound message; if the sending server isn't on the list, the message fails SPF — which usually means the spam folder or a hard rejection (depending on your DMARC policy). Without SPF, anyone can spoof your domain in From: addresses, and Gmail/Yahoo will downgrade or refuse mail from your domain at bulk-sender volumes.
Where do I publish the generated record?
As a DNS TXT record at the apex (root) of your sending domain — the host is usually entered as @ or just the domain itself (depends on your DNS provider's UI). For example, on example.com the host is @ and the value is the full v=spf1 … string. Only one SPF record per domain — if one already exists, replace it (do not add a second; receivers will return permerror).
What does the 10-lookup limit actually mean?
RFC 7208 §4.6.4 limits the number of DNS lookups receivers must perform when evaluating your SPF record to 10. Every include:, a, mx, exists, and redirect= counts as one — and nested includes count too. include:_spf.google.com alone costs 4 lookups (Google's record nests three more). Cross 10 and receivers return permerror, which DMARC treats as "no SPF" — silently breaking authentication for all your mail. The lookup-budget gauge in this tool visualizes exactly how close you are.
What is the difference between ~all, -all, and ?all?
The all mechanism at the end tells receivers what to do with mail from servers NOT on your authorized list. ~all (soft fail) accepts the mail but marks it suspicious — the recommended starting point. -all (hard fail) rejects it outright — the strongest defense once you're confident your sender list is complete. ?all (neutral) is equivalent to having no SPF policy and almost never useful. +all means "everyone can send as me" — never use it. For DMARC compliance, ~all and -all are treated identically; pick the one you're comfortable with operationally.
Can I have multiple SPF records on the same domain?
No. RFC 7208 §3.2 explicitly forbids multiple v=spf1 records on the same DNS name. If a receiver finds two, it returns permerror and treats your domain as having no SPF at all — same outcome as if you exceeded the 10-lookup limit. Consolidate all your sender includes into a single TXT record. The tool flags this as a hard error if it sees more than one record during the lookup.
Why is HubSpot (or ActiveCampaign, ConvertKit) not in the preset list?
Some ESPs — HubSpot, ActiveCampaign, ConvertKit, Beehiiv, Substack — use per-customer SPF include subdomains like 1234567.spf04.hubspotemail.net. Because the exact host string is different for every customer account, there's no single preset we can ship for them. Grab the include from your provider's dashboard (HubSpot: Settings → Domains & URLs; ActiveCampaign: Settings → Deliverability), then paste it into the "Custom includes" field. The tool will still count its DNS lookups recursively and detect it on parse if it matches a known pattern.
My record is over 255 characters — what do I do?
A single TXT string is limited to 255 characters, but a TXT record can contain multiple quoted strings that receivers concatenate. Most DNS providers (Cloudflare, Route 53, Google Workspace, GoDaddy) handle the split automatically when you paste a long string; some require you to enter each chunk in quotes separated by spaces. If you're crossing 255 characters, you're probably also approaching the 10-lookup limit — consolidating senders or removing unused ESPs is a better fix than splitting the record.
How long does it take for SPF changes to take effect?
DNS propagation typically completes within an hour for most receivers; some cache for up to 24 hours depending on the TTL you set on the record. The tool re-fetches the domain via DNS-over-HTTPS every time you submit, so the "Matches DNS" / "Differs from DNS" badge always reflects current truth. If you've just published a record and the tool still shows the old one, wait a few minutes and re-submit.
Is SPF enough, or do I also need DKIM and DMARC?
SPF alone is not enough. SPF authenticates the sending server; DKIM authenticates the message content with a cryptographic signature; DMARC tells receivers what to do when either fails — and is what mailbox providers actually use to enforce policy on spoofed mail. SPF + DKIM + DMARC is the canonical setup. Once your SPF is solid, head to the DMARC Record Generator to publish DMARC, and the DKIM setup guide for the third leg.
Does the tool send my domain anywhere?
No — every DNS lookup is made directly from your browser to Google's public DNS-over-HTTPS endpoint (dns.google/resolve). The tool has no backend; nothing about your domain or sender configuration is sent to InboxAlly's servers. The record stays in your browser until you copy it.
Why does publishing SPF help deliverability?
A passing SPF check is one of three signals (alongside DKIM and DMARC alignment) that mailbox providers use to decide whether your mail is legitimate. Domains with no SPF — or with broken SPF (over 10 lookups, multiple records, +all) — are treated as unauthenticated, and Gmail, Yahoo, and Microsoft progressively downgrade unauthenticated mail toward the spam folder. Publishing valid SPF is the lowest-effort, highest-impact deliverability fix most senders can make.
SPF Authorizes Senders.
InboxAlly Earns the Inbox.
Publishing SPF tells receivers which servers are allowed to send for your domain. Earning consistent inbox placement is a different problem — InboxAlly teaches mailbox providers to put your real mail where it belongs.
SPF authorizes senders; DMARC tells receivers what to do when authorization fails. They're designed to work together — and Gmail / Yahoo require DMARC for high-volume senders.
A correct SPF won't save you if your IP or domain is on a blocklist. Check 50+ major blocklists in one scan.