
Email delivery is almost entirely driven by DNS records. Get them right and email flows without issue. Get them wrong — or let them change unexpectedly — and emails bounce, go to spam, or stop sending entirely.
The problem is that DNS records can change without warning: a misconfigured deployment, an accidental edit in a DNS dashboard, a nameserver migration that missed copying a record, or in worse cases, a DNS hijacking attack. Monitoring catches these changes before they silently destroy your email deliverability.
MX (Mail Exchange) records tell the internet where to deliver inbound email for your domain. Without correct MX records, nobody can send you email.
yourdomain.com MX 10 aspmx.l.google.com (Google Workspace)
yourdomain.com MX 20 alt1.aspmx.l.google.com
What breaks when MX records are wrong:
MX record failures are silent on the receiving end. You won't know inbound email is failing unless you're monitoring the records or someone contacts you through another channel to say their emails are bouncing.
SPF (Sender Policy Framework) is a TXT record that lists which mail servers are authorised to send email on behalf of your domain:
yourdomain.com TXT "v=spf1 include:_spf.google.com include:mailgun.org ~all"
The ~all suffix means "soft fail" — emails from unlisted servers are marked as suspicious but not rejected. -all (hard fail) rejects them outright.
What breaks when SPF is wrong:
SPF failures typically don't generate bounce notifications — emails just go to spam, and you find out when someone tells you, or when you check email analytics.
DKIM (DomainKeys Identified Mail) uses a public/private key pair to cryptographically sign outbound emails. The private key is held by your mail provider; the public key is published in a DNS TXT record:
google._domainkey.yourdomain.com TXT "v=DKIM1; k=rsa; p=MIGfMA0G..."
Recipient mail servers verify the signature against the public key in DNS. If the signature is valid, the email passes DKIM.
What breaks when DKIM is wrong:
DKIM records have a long, complex value that's easy to corrupt — truncate the record value, miss a character, or accidentally create a duplicate record that conflicts with the real one.
DMARC (Domain-based Message Authentication, Reporting and Conformance) builds on SPF and DKIM. It specifies what to do with emails that fail both checks and provides a reporting mechanism:
_dmarc.yourdomain.com TXT "v=DMARC1; p=quarantine; rua=mailto:[email protected]; pct=100"
DMARC policies:
p=none — Monitor only, no enforcement (good for initial setup)p=quarantine — Send failing emails to spamp=reject — Reject failing emails entirelyWhat breaks when DMARC is misconfigured:
p=reject policy combined with broken SPF or DKIM causes your own legitimate emails to be rejectedDNS record changes that break email happen in several ways:
Nameserver migrations — Moving DNS to a new provider (e.g., to Cloudflare) requires manually recreating all records. It's easy to miss TXT records, especially the long DKIM keys, or to get the DKIM selector name wrong.
Accidental deletion — Most DNS dashboards don't require confirmation before deleting records. A misclick in a DNS editor can delete an MX or DKIM record instantly.
Domain transfers — Transferring a domain to a new registrar sometimes involves transferring DNS hosting too. Records can be lost in the process.
Third-party service changes — If you switch email providers (e.g., from Mailgun to SendGrid), you need to update SPF to include the new provider and add new DKIM records for the new provider's selector. If you forget, email from the new provider fails authentication.
DNS hijacking — An attacker who gains access to your DNS management can change MX records to intercept your inbound email. This is less common but highly damaging.
# Command line
dig MX yourdomain.com
# Or
nslookup -type=MX yourdomain.com
Compare the output to what your email provider specifies. The MX records should match exactly.
dig TXT yourdomain.com | grep spf
Verify the SPF record includes all services that send email on your behalf: your main email provider, any marketing email tool, transactional email service, etc.
Common SPF mistake: Having two SPF records. You can only have one v=spf1 record. Multiple SPF records cause authentication failures. If you need multiple services, combine them into one record:
"v=spf1 include:_spf.google.com include:sendgrid.net include:mailgun.org ~all"
# Replace 'google' with your DKIM selector
dig TXT google._domainkey.yourdomain.com
Your email provider's documentation specifies the selector name and the expected public key value. Verify both match.
dig TXT _dmarc.yourdomain.com
Online tools like MXToolbox and DMARC Analyzer provide a more user-friendly check of all four record types simultaneously.
Manual checks are useful for diagnosing known problems, but they don't catch unexpected changes. DNS record monitoring continuously watches your records and alerts you the moment something changes or is missing.
Specifically, you want to know:
Domain Monitor monitors DNS records alongside domain expiry, uptime, and SSL certificates. Configure DNS monitoring for your domain and you'll be alerted to unexpected record changes before they cause noticeable email problems. Create a free account.
For a deeper background on DNS records, see DNS record types explained and ultimate guide to DNS. For Domain Monitor's specific DNS monitoring features, see DNS monitoring is here.
When your site goes down, your status page becomes the most important page you have. Here's why it matters, what happens when you don't have one, and what a good status page does during a real outage.
Read moreYour domain is resolving, but pointing to the wrong server — showing old content, a previous host's page, or someone else's site entirely. Here's what causes this and how to diagnose it.
Read moreUptime monitoring isn't foolproof. Single-location monitors, wrong health check endpoints, long check intervals, and false positives can all cause real downtime to go undetected. Here's what to watch out for.
Read moreLooking to monitor your website and domains? Join our platform and start today.