IsThisAScam
Strona GłównaBlogCennikO NasHistoryAPIExtension
Upgrade
PL
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
Produkt
  • Home
  • Blog
  • Pricing
  • O Nas
  • History
  • Chrome Extension
Resources
  • Developers
  • Dokumentacja API
  • Phishing brief
  • Romance scams
  • Tech support
  • Crypto scams
  • Apple scams
  • PayPal scams
Informacje Prawne
  • Polityka Prywatności
  • Regulamin
  • product@zeplik.com

© 2026 Zeplik, Inc. Wszelkie prawa zastrzeżone.

Built for the calm, the cautious, and the careful.

Home/Glossary/SPF
Glossary · Defense & Authentication

What Is SPF (Sender Policy Framework)?

Sender Policy Framework — an email authentication protocol that allows domain owners to specify which mail servers are authorized to send email on behalf of their domain, helping receiving servers detect forged sender addresses.

Quick Definition

Sender Policy Framework — an email authentication protocol that allows domain owners to specify which mail servers are authorized to send email on behalf of their domain, helping receiving servers detect forged sender addresses.

Think you've been targeted?

Paste the suspicious content here for an instant analysis.

No signup · 6 detection layers · Results in seconds · Cmd+Enter

01SPF explained.

SPF is one of the foundational email authentication protocols. It works by allowing domain owners to publish a list of authorized mail servers in their DNS records. When a receiving mail server gets an email, it checks whether the sending server's IP address is on the authorized list.

Without SPF, anyone can send an email that appears to come from any domain. SPF closes this gap by providing a way to verify that the server sending the email is actually authorized by the domain owner. It's the first line of defense against email spoofing.

SPF has limitations — it only checks the envelope "from" address (Return-Path), not the header "From" address that users see. This is why SPF alone is insufficient and should be combined with DKIM and DMARC for complete protection.

02How it works.

01The domain owner publishes an SPF record in their DNS, listing authorized mail server IP addresses
02When an email is received, the server extracts the domain from the envelope sender address
03The receiving server queries DNS for that domain's SPF record
04The sending server's IP address is checked against the authorized list
05The result is pass (authorized), fail (not authorized), softfail, or neutral

03Real-world example.

When IsThisAScam analyzes an email, SPF verification is one of the first checks performed. If an email claims to be from "bankofamerica.com" but was sent from a server not listed in Bank of America's SPF record, this is flagged as a strong indicator of spoofing.

04How to protect yourself.

01Organizations should publish SPF records for their domains
02Individual users can check SPF results in email headers (look for "spf=pass")
03Combine SPF with DKIM and DMARC for comprehensive authentication
04Use IsThisAScam to check the SPF status of any suspicious email
05Be aware that SPF alone cannot prevent all spoofing — it must be combined with DMARC
Related Terms
DKIMDMARCPhishingSpoofing
Explore Scam Types
phishingromancecryptoinvestmenttech supportdelivery
Suspect Something?

Run a scan on the message you received.

Run a scan →