SPF Check:
tulpehocken.org

1. Specify domain name

Enter a domain to be checked for the SPF record
2. Specify IP address (optional)
Enter any IP address to check if it is authorized to send e-mails by the SPF record

What is the SPF lookup for?

With the SPF lookup you analyze the SPF record of a domain for errors, security risks and authorized IP addresses. Optionally, you can specify an IP address to check if it is authorized to send e-mail on behalf of the domain. The SPF lookup analyzes registered TXT records in real time. If you want to specify an SPF record manually, use the SPF Analyzer.

Loading...

SPF check failed

Your SPF record check result
  •   SPF record found
  •   Syntax check: 2 Error
  •   Email Spoofing Protection: Poor
Warning: Compliance breach for email deliverability & security

The domain tulpehocken.org does not fulfil the requirements for optimal deliverability to Google, Yahoo and other email service providers.

Mandatory IT baseline protection measures for email security are not fulfilled. There are risks of email misuse.

Summary of the SPF check

Does a valid SPF record exist?
An SPF record was found for the domain tulpehocken.org.
The SPF record for tulpehocken.org is not valid.
The syntax check resulted in a total of 2 errors.
of the email -Spoofing protection for this domain is not or not sufficiently provided.

Which IP-s are legitimate to send emails?
The SPF record contains a reference to external rules, which means that the validity of the SPF record depends on at least one other domain. A detailed list of the rules used externally can be found in the analysis result. In total, 57 IP address(es) were authorized by the SPF record to send emails. 4 of these are not taken into account by the Mail Transfer Agent evaluation and are not authorized to send emails on behalf of the domain.

The SPF record analysis was performed on 16.04.2024 at 18:33:49 clock.

Lookup for the domain:
tulpehocken.org
IP address to be checked:
no IP address specified

Have secure SPF record created by expert
from 749€

Order SPF record
  • 1. You send an email to our analysis system
  • 2. We will send you the finished SPF record
  • 3. You implement the SPF record
  • 4. We check the setup final
Have secure SPF record created by expert
from 749€

Evaluation for the domain tulpehocken.org 

Nameserverset:
ns1.worldnic.com
ns2.worldnic.com
Determined SPF record:
Legitimated IP addresses:
IP Provider / ASN DNSBL-Check
40.92.0.0/15
MICROSOFT-CORP-MSN-AS-BLOCK blacklist 
40.107.0.0/16
MICROSOFT-CORP-MSN-AS-BLOCK blacklist 
52.100.0.0/14
MICROSOFT-CORP-MSN-AS-BLOCK blacklist 
104.47.0.0/17
MICROSOFT-CORP-MSN-AS-BLOCK blacklist 
2a01:111:f400::/48
MICROSOFT-CORP-MSN-AS-BLOCK blacklist 
2a01:111:f403::/49
MICROSOFT-CORP-MSN-AS-BLOCK blacklist 
2a01:111:f403:8000::/51
MICROSOFT-CORP-MSN-AS-BLOCK blacklist 
2a01:111:f403:c000::/51
MICROSOFT-CORP-MSN-AS-BLOCK blacklist 
2a01:111:f403:f000::/52
MICROSOFT-CORP-MSN-AS-BLOCK blacklist 
2602:fc7a::/36
SAPPHIREK12-ASN01 blacklist 
68.68.221.0/24
SAPPHIREK12-ASN01 blacklist 
2604:7e00:30:1::/64
AS17378 blacklist 
199.96.252.64/26
AS17378 blacklist 
144.202.174.0/26
AS17378 blacklist 
204.232.250.0/24
RACKSPACE blacklist 
5.152.185.0/24
Zix International AG blacklist 
8.19.118.0/24
ASN-CUST blacklist 
8.31.233.0/24
AS-APPRIVER blacklist 
72.3.212.195 RMH-14 blacklist 
5.152.188.0/24
Zix International AG blacklist 
174.37.170.192/27
SOFTLAYER blacklist 
75.126.84.128/26
SOFTLAYER blacklist 
67.228.8.0/25
SOFTLAYER blacklist 
67.227.149.19 LIQUIDWEB blacklist 
64.56.208.32/27
GREENVIEWDATA blacklist 
67.228.91.90 SOFTLAYER blacklist 
67.228.158.174 SOFTLAYER blacklist 
174.36.44.116/30
SOFTLAYER blacklist 
50.201.66.168 GREENVIEWDATA blacklist 
63.71.8.0/21
ASN-CUST blacklist 
199.30.232.0/21
ASN-CUST blacklist 
74.203.184.0/23
AS-APPRIVER blacklist 
207.195.176.0/20
ASN-CUST blacklist 
40.92.0.0/15
MICROSOFT-CORP-MSN-AS-BLOCK blacklist 
40.107.0.0/16
MICROSOFT-CORP-MSN-AS-BLOCK blacklist 
52.100.0.0/14
MICROSOFT-CORP-MSN-AS-BLOCK blacklist 
104.47.0.0/17
MICROSOFT-CORP-MSN-AS-BLOCK blacklist 
2a01:111:f400::/48
MICROSOFT-CORP-MSN-AS-BLOCK blacklist 
2a01:111:f403::/49
MICROSOFT-CORP-MSN-AS-BLOCK blacklist 
2a01:111:f403:8000::/51
MICROSOFT-CORP-MSN-AS-BLOCK blacklist 
2a01:111:f403:c000::/51
MICROSOFT-CORP-MSN-AS-BLOCK blacklist 
2a01:111:f403:f000::/52
MICROSOFT-CORP-MSN-AS-BLOCK blacklist 
129.152.0.0/17
ORACLE-BMC-31898 blacklist 
2606:b400:8810::/44
- blacklist 
167.89.0.0/17
SENDGRID blacklist 
208.117.48.0/20
SENDGRID blacklist 
50.31.32.0/19
SENDGRID blacklist 
198.37.144.0/20
SENDGRID blacklist 
198.21.0.0/21
SENDGRID blacklist 
192.254.112.0/20
SENDGRID blacklist 
168.245.0.0/17
SENDGRID blacklist 
149.72.0.0/16
AMAZON-AES blacklist 
159.183.0.0/16
SENDGRID blacklist 
223.165.113.0/24
SENDGRID blacklist 
223.165.115.0/24
SENDGRID blacklist 
223.165.118.0/23
SENDGRID blacklist 
223.165.120.0/23
SENDGRID blacklist 
SPF-Syntax Check:
Analysis result of the SPF record for the domain: tulpehocken.org

SPF record available?

We found an SPF record for the domain.

v=spf1

Additional external SPF records

We could find other records authorized in the SPF record

include:spf.protection.outlook.com
v=spf1 ip4:40.92.0.0/15 ip4:40.107.0.0/16 ip4:52.100.0.0/14 ip4:104.47.0.0/17 ip6:2a01:111:f400::/48 ip6:2a01:111:f403::/49 ip6:2a01:111:f403:8000::/51 ip6:2a01:111:f403:c000::/51 ip6:2a01:111:f403:f000::/52 -all
ipv4:
40.92.0.0/15
ipv4:
40.107.0.0/16
ipv4:
52.100.0.0/14
ipv4:
104.47.0.0/17
ipv6:
2a01:111:f400::/48
ipv6:
2a01:111:f403::/49
ipv6:
2a01:111:f403:8000::/51
ipv6:
2a01:111:f403:c000::/51
ipv6:
2a01:111:f403:f000::/52
include:spf.sapphirek12.app
v=spf1 ip6:2602:fc7a::/36 ip4:68.68.221.0/24 ip6:2604:7e00:30:1::/64 ip4:199.96.252.64/26 ip4:144.202.174.0/26 ~all
ipv4:
68.68.221.0/24
ipv4:
199.96.252.64/26
ipv4:
144.202.174.0/26
ipv6:
2602:fc7a::/36
ipv6:
2604:7e00:30:1::/64
include:appriver.com
v=spf1 include:spf1.appriver.com include:spf2.appriver.com include:spf.protection.outlook.com include:rnmk.com ~all
include:spf1.appriver.com
v=spf1 ip4:204.232.250.0/24 ip4:5.152.185.0/24 ip4:8.19.118.0/24 ip4:8.31.233.0/24 ip4:72.3.212.195 ip4:5.152.188.0/24 ip4:174.37.170.192/27 ~all
ipv4:
204.232.250.0/24
ipv4:
5.152.185.0/24
ipv4:
8.19.118.0/24
ipv4:
8.31.233.0/24
ipv4:
72.3.212.195
ipv4:
5.152.188.0/24
ipv4:
174.37.170.192/27
include:spf2.appriver.com
v=spf1 ip4:75.126.84.128/26 ip4:67.228.8.0/25 ip4:67.227.149.19 ip4:64.56.208.32/27 ip4:67.228.91.90 ip4:67.228.158.174 ip4:174.36.44.116/30 ip4:50.201.66.168 ip4:63.71.8.0/21 ip4:199.30.232.0/21 ip4:74.203.184.0/23 ip4:207.195.176.0/20 ~all
ipv4:
75.126.84.128/26
ipv4:
67.228.8.0/25
ipv4:
67.227.149.19
ipv4:
64.56.208.32/27
ipv4:
67.228.91.90
ipv4:
67.228.158.174
ipv4:
174.36.44.116/30
ipv4:
50.201.66.168
ipv4:
63.71.8.0/21
ipv4:
199.30.232.0/21
ipv4:
74.203.184.0/23
ipv4:
207.195.176.0/20
include:spf.protection.outlook.com (Domain has already been resolved once)
include:rnmk.com
v=spf1 include:spf-a.rnmk.com exists:%{i}.spf.rnmk.com -all
include:spf-a.rnmk.com
v=spf1 ip4:129.152.0.0/17 ip6:2606:b400:8810::/44 -all
ipv4:
129.152.0.0/17
ipv6:
2606:b400:8810::/44
include:sendgrid.net
v=spf1 ip4:167.89.0.0/17 ip4:208.117.48.0/20 ip4:50.31.32.0/19 ip4:198.37.144.0/20 ip4:198.21.0.0/21 ip4:192.254.112.0/20 ip4:168.245.0.0/17 ip4:149.72.0.0/16 ip4:159.183.0.0/16 include:ab.sendgrid.net ~all
ipv4:
167.89.0.0/17
ipv4:
208.117.48.0/20
ipv4:
50.31.32.0/19
ipv4:
198.37.144.0/20
ipv4:
198.21.0.0/21
ipv4:
192.254.112.0/20
ipv4:
168.245.0.0/17
ipv4:
149.72.0.0/16
ipv4:
159.183.0.0/16
include:ab.sendgrid.net
v=spf1 ip4:223.165.113.0/24 ip4:223.165.115.0/24 ip4:223.165.118.0/23 ip4:223.165.120.0/23 ~all
ipv4:
223.165.113.0/24
ipv4:
223.165.115.0/24
ipv4:
223.165.118.0/23
ipv4:
223.165.120.0/23

E-Mail handling

How should the checkHost() function of the e-mail server handle the e-mail? (syntax )

~all
SoftFail (non-compliant e-mails are accepted but marked)

Will be forwarded to another SPF record?

There is no reference to any other SPF record

Are the server addresses allowed to send e-mails?

In the SPF entry the mechanism 'a' has not been set.

Additionally authorized A-records?

In addition to the A-Records stored in the DNS, we could not find any other records authorized in the SPF-Record.

Are the registered mail servers allowed to send e-mails?

In the SPF entry the mechanism 'mx' has not been set

Additionally authorized MX records

We could not find any other records authorized in the SPF record besides the MX records stored in the DNS

Additionally authorized IPv4 addresses

No explicit IPv4 addresses in the SPF record have been authorised to send

Additionally authorized IPv6 addresses

No explicit IPv6 addresses in the SPF record have been authorised to send

How is the sender informed?

The exp mechanism acts as a return to the sender if the IP address was not authorized to send and notify them. None was found.

PTR (obsolete mechanism)

The ptr mechanism is deprecated, slow and insecure and should not be used

PTR:

The ptr mechanism is deprecated, slow and insecure and should not be used

Authorize IP addresses with markers

When SPF is evaluated, macros can specifically authorize Ip addresses based on the request or connection of the user or client (RFC7208 )

Receiver address

analysis.ra-missing

Amount of reports

analysis.rp-missing

Report selection

analysis.rr-missing

Unknown mechanisms

No unknown mechanisms were found in the SPF record.

Recently performed SPF lookups

Server IP Address

We have determined the following IP address for the domain:

No domain specified

Reverse address

We have determined the following name for the server IP address:

ec2-34-238-178-141.compute-1.amazonaws.com

Free whitepaper

How secure is your domain?

  • Practical with many examples
  • the basics of domain risk management summarized in 20 pages
  • Checklist with 53 questions on 14 risk areas

Get a first impression of the risk potential in your company

⮩ Download "Domain Risk Management" for free
All offers are aimed at traders, not end consumers and do not include VAT.
© 2024 nicmanager.com.   All rights reserved.
nicmanager   Connected by Team Internet