Imagine hitting "Send" on a critical business proposal, only to wait hours in silence. If your domain's email delivery feels like a black box, it's time for an MX check up. A Mail Exchanger (MX) record is the digital postmaster of your domain, indicating exactly where incoming emails should be routed. Without a healthy configuration, your emails won't just arrive late—they might not arrive at all. In this guide, we'll walk you through how to perform an online mx check, decode the diagnostics, and secure your email reputation against modern deliverability standards.
What is an MX Check Up? (And Why Your Business Needs One)
At its core, a Mail Exchanger (MX) record is a type of Domain Name System (DNS) resource record that specifies the mail server responsible for accepting email messages on behalf of a recipient's domain. When someone sends an email to your domain, the sender's mail transfer agent (MTA) queries your DNS to find its MX records and routes the email to the mail server listed there.
An MX check up is a comprehensive audit of these routing instructions. In today's cybersecurity landscape, a true checkup goes far beyond verifying that a single DNS entry exists; it inspects your entire email infrastructure to ensure inbound routes are active, outbound authentication protocols are sound, and mail servers are not blacklisted.
Why is this diagnostic process so critical for businesses?
- Preventing Bounced Emails and Silent Failures: If your MX records contain a typo or point to an expired server, incoming emails will bounce back. In some cases, emails may simply disappear into a routing loop without notifying either party.
- Meeting Strict Modern Sender Standards: Major inbox providers like Google, Yahoo, and Apple enforce strict authentication requirements. If your MX records, SPF, and DKIM setups are not flawlessly configured, these providers will flatly reject your emails or direct them to spam.
- Protecting Brand Reputation and Security: Cybercriminals frequently exploit unverified domains to send spoofed emails. Conducting an online mx check ensures that your domain is fortified against unauthorized usage, preventing bad actors from ruining your domain reputation.
- Optimizing Migration and DNS Changes: When migrating from one email provider to another (such as moving to Microsoft 365 or Google Workspace), your MX records must be updated. A checkup prevents costly downtime during these technical transitions.
Step-by-Step: How to Perform an Online MX Check
Running an online mx check is straightforward and can be accomplished using several distinct methods, ranging from automated web-based platforms to direct manual commands via your computer's terminal.
Method 1: Using Online Diagnostic Tools
For most business owners and IT admins, using an online mx check tool is the fastest option. Web-based diagnostics query your domain's authoritative name servers and present the results in an easy-to-read, graphical interface. Popular choices include:
- MXToolbox: The industry standard for searching DNS records, running SMTP diagnostics, and checking blacklists.
- Google Admin Toolbox (Check MX): An excellent utility provided by Google that instantly flags errors, warnings, and security gaps.
- PowerDMARC & EasyDMARC: Specialized security tools that run comprehensive checks on your MX setup alongside detailed DKIM, SPF, and DMARC breakdowns.
To perform an online check, you simply navigate to one of these platforms, type your root domain (e.g., yourdomain.com without the https:// or www.), and hit enter. Within seconds, you will receive a diagnostic report highlighting your active mail servers, their priorities, and potential security issues.
Method 2: Manual Terminal Queries
If you prefer not to rely on third-party websites or need to verify a local DNS configuration before it propagates globally, you can query your DNS records directly from your operating system's command-line interface.
On Windows (using Command Prompt):
- Open the Start menu, type
cmd, and press Enter. - Type the following command and press Enter:
nslookup -q=mx yourdomain.com - The system will return your domain's MX records, displaying the mail exchange server hostnames and their corresponding preference values.
On macOS and Linux (using Terminal):
- Open your Terminal application.
- Type the following command and press Enter:
dig mx yourdomain.com - Scroll down to the
ANSWER SECTION. You will see a list of your mail servers, their Time-to-Live (TTL) values, and their priorities.
Whether you use an online tool or the command line, your MX check up will yield specific technical variables. To fix any issues, you must first understand exactly what these results mean.
Understanding the Results: Decoding Your MX Diagnostics
When you view the raw data from an online mx check, you will encounter a table containing several key parameters. Understanding these terms is the secret to diagnostic success.
1. Hostname / Mail Server Target
This is the fully qualified domain name (FQDN) of the mail server that handles your incoming mail. For example, if you use Google Workspace, you will see hostnames like aspmx.l.google.com. If you use Microsoft 365, you might see yourdomain-com.mail.protection.outlook.com. This target must always be a domain name (an A or AAAA record pointing to an IP address), never an IP address itself. Pointing an MX record directly to an IP address is a violation of DNS standards and will cause many modern email systems to reject your mail.
2. Preference / Priority Values
MX records utilize a priority system to determine which mail server should receive traffic first. The priority is indicated by a number, typically ranging from 0 to 50. The rule of priority is simple: the lower the number, the higher the priority. For instance, if you have two MX records: mail1.yourdomain.com with Priority 10 and mail2.yourdomain.com with Priority 20, sending servers will always attempt to deliver mail to mail1.yourdomain.com first. If that server is offline or busy, the sender will then attempt delivery to the backup server, mail2.yourdomain.com. If you use a single unified cloud hosting service like Google Workspace or Microsoft 365, you may have multiple MX records with different priorities. It is vital that these priorities exactly match the provider’s documentation. Misconfigured priorities can result in delayed delivery or lost emails.
3. Time to Live (TTL)
TTL is a value measured in seconds that tells DNS servers around the world how long they should cache your MX record before checking for updates again. For example, a TTL of 3600 means DNS servers will cache your record for one hour.
- High TTL (e.g., 86400 seconds / 24 hours): Good for normal operations because it reduces DNS query traffic and speeds up mail routing lookups.
- Low TTL (e.g., 300 seconds / 5 minutes): Crucial during email migrations. Before changing your mail provider, you should lower your TTL. This ensures that when you swap MX records, the change propagates worldwide almost instantly, minimizing the risk of lost emails during the transition.
4. Reverse DNS (rDNS) and PTR Records
During a thorough online mx check, advanced diagnostic tools will check if your mail server has a valid pointer (PTR) record. While an MX record maps a domain name to a mail server, a PTR record does the exact opposite: it maps the mail server's IP address back to its domain name. If a receiving server receives an email from an IP address that does not have a matching PTR record, it will highly likely flag the email as spam. This is a security feature designed to block botnets and unauthorized home connections from sending spam.
5. Mail Server Blacklists
Even if your MX records are configured correctly, your email deliverability can be completely ruined if your mail server's IP address has been blacklisted. Spammers often hijack servers or exploit shared hosting environments to send millions of junk emails. If you share an IP address with a spammer, your emails will be blocked. A comprehensive MX check up tool will automatically query over 100 DNS-based blacklists (such as Spamhaus, BARRACUDA, and SORBS) to ensure your sending IP is clean. If your server is blacklisted, you must contact your email host or file a delisting request with the blacklist provider.
The Trinity of Email Security: SPF, DKIM, and DMARC
No modern MX check up is complete without evaluating the "Trinity of Email Security." These three TXT records work alongside your MX records to authenticate your outgoing mail and protect your domain name from being spoofed by bad actors.
1. SPF (Sender Policy Framework)
An SPF record is a TXT record in your DNS that specifies exactly which IP addresses and servers are authorized to send emails on behalf of your domain. An SPF record looks like this:
v=spf1 include:_spf.google.com include:sendgrid.net ~all
Let's break down this syntax:
v=spf1: Identifies the record as SPF version 1.include:_spf.google.com: Authorizes Google's servers to send mail for your domain.include:sendgrid.net: Authorizes SendGrid (an email marketing platform) to send mail.~all: The "Soft Fail" mechanism. It tells receiving servers that if an email comes from an unlisted server, they should accept it but flag it as suspicious. Changing this to-all(Hard Fail) tells servers to completely reject unauthorized emails.
The common mistake is that you can only have one SPF record per domain. If you create multiple SPF records, receiving servers will ignore all of them, causing your emails to fail authentication. If you need to authorize multiple tools, you must merge them into a single, unified SPF record.
2. DKIM (DomainKeys Identified Mail)
DKIM adds a cryptographic digital signature to the header of every email you send. This signature matches a public key published in your domain's DNS. When an inbox receives your email, it uses your public DKIM key to verify that the email was actually sent by your domain and has not been altered or tampered with during transit. A DKIM record uses a "selector" to identify the specific key. A typical DKIM DNS entry looks like this:
google._domainkey.yourdomain.com TXT v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
During your online mx check, ensure that your DKIM record is properly published and that your email platform is actively signing outbound messages.
3. DMARC (Domain-based Message Authentication, Reporting, and Conformance)
DMARC is the ultimate policy layer that binds SPF and DKIM together. It tells receiving servers exactly what to do with an email that fails SPF or DKIM checks. A DMARC record looks like this:
v=DMARC1; p=reject; rua=mailto:[email protected]; pct=100
Key components of DMARC include:
p=none: Monitor mode. Emails are delivered normally, but you receive diagnostic reports.p=quarantine: Suspicious emails that fail authentication are sent straight to the spam/junk folder.p=reject: Highly secure. Emails that fail authentication are completely blocked from entering the recipient's system.rua=mailto:...: Specifies where receiving servers should send daily XML reports detailing who is sending email on behalf of your domain.
If you haven't implemented a DMARC policy yet, your domain is highly vulnerable to phishing attacks, and you will struggle to achieve high deliverability rates.
How to Fix Common MX Record Errors (Provider Guides)
If your MX check up reveals errors, don't panic. Resolving these issues involves logging into your domain registrar or DNS hosting provider and editing your DNS zone file. Here is how to fix common errors across the most popular DNS hosting platforms.
Important Technical Caveats
Before making changes, keep these universal rules in mind:
- Disable Proxies on Mail Records: If you use Cloudflare or a similar DNS provider, ensure that any MX records or related A records are set to "DNS Only" (grey cloud). Turning on the proxy (orange cloud) routes email traffic through the web application firewall, which will completely break mail routing because mail protocols (SMTP, IMAP, POP3) do not work through HTTP proxies.
- Never Have Multiple Active Mail Systems: Do not point your MX records to two different email hosting providers simultaneously (e.g., pointing some records to Microsoft 365 and others to Google Workspace). This will result in an erratic "split-delivery" setup where emails are randomly distributed between the two systems, causing massive data loss.
- Check for Trailing Dots: Some older DNS panels require a trailing dot at the end of hostnames (e.g.,
aspmx.l.google.com.). Check your provider’s specific interface requirements, though modern panels usually append this automatically.
How to Update MX Records in Cloudflare
- Log in to your Cloudflare dashboard and select your domain.
- Click on the DNS tab on the left sidebar, then select Records.
- Identify any existing, incorrect MX records and click Edit -> Delete.
- Click Add Record.
- Set the Type to
MX. - Set the Name to
@(this represents your root domain). - In the Mail server field, enter your provider’s hostname (e.g.,
aspmx.l.google.com). - Enter the Priority value specified by your host.
- Leave the TTL set to Auto, or set it to 1 hour (3600 seconds).
- Click Save.
How to Update MX Records in GoDaddy
- Log in to your GoDaddy Portfolio and click on your domain.
- Select the DNS option from the menu.
- In the DNS Records table, look for existing records of type
MX. Delete any outdated or duplicate records. - Click Add New Record.
- Select
MXfrom the Type dropdown. - Set Name to
@. - Enter the Value (the mail server hostname).
- Enter the Priority number.
- Set the TTL to 1 Hour.
- Click Save.
How to Update MX Records in Namecheap
- Log in to your Namecheap dashboard.
- Go to Domain List and click Manage next to your domain.
- Click on the Advanced DNS tab.
- Scroll down to the Mail Settings section.
- Change the dropdown menu from "Email Forwarding" or "No Email" to Custom MX.
- Click Add New Record.
- Enter the hostname (e.g.,
mail.protection.outlook.com) in the Value field. - Set the Priority and TTL.
- Click the green checkmark to save the record.
Frequently Asked Questions (FAQ)
What happens if my domain has no MX records?
If your domain has no MX records, sending mail servers will not know where to deliver messages addressed to your domain. When someone attempts to email you, their mail transfer agent (MTA) will wait a brief period and then bounce the email back to the sender with a delivery failure notice, typically stating "No MX record found" or "Host lookup failed." In some rare legacy systems, the sending server might attempt to deliver the email to your domain's A (IP address) record, but modern spam filters and email security systems will almost always block this.
How long does it take for MX record changes to propagate?
DNS propagation is the process of updating DNS servers worldwide with your new records. The time it takes depends entirely on the Time to Live (TTL) of your previous records. If your old records had a TTL of 24 hours (86400 seconds), it can take up to 24 hours for the changes to fully propagate globally. However, if you lowered your TTL to 5 minutes (300 seconds) prior to making the change, the transition should be completed within a few minutes. On average, most global DNS servers update within 1 to 4 hours.
Can I use multiple email hosting providers on the same domain?
No, you should never configure MX records for multiple different email providers (such as Google Workspace and Microsoft 365) on the same domain at the same time. Doing so splits your incoming mail traffic. Because SMTP mail servers deliver messages by querying DNS and selecting a record based on random choice or matching priorities, some of your emails will go to Google, while others will go to Microsoft. If you need to route some mailboxes differently, you must set up a complex email forwarding rule or a hybrid split-domain routing configuration, rather than publishing conflicting MX records in your DNS.
Why is my email going to spam even though my MX check up is completely clean?
A clean MX check up means your email routing is configured properly, but it does not guarantee high inbox deliverability. If your emails are still ending up in spam folders, the issue is likely due to one of the following factors:
- Missing or Misconfigured SPF, DKIM, or DMARC Records: Even if your MX records are perfect, failing these essential security checks will trigger spam filters.
- Poor Domain or IP Reputation: If your domain has a history of sending high-volume marketing emails without proper opt-out options, or if your shared hosting IP address has been blacklisted, inbox providers will treat your mail with suspicion.
- Spammy Content: Emails containing excessive caps, aggressive sales language, broken HTML, or suspicious attachments are frequently flagged by automated filters.
- Lack of Domain Warm-Up: If your domain is brand new and suddenly starts sending hundreds of emails a day, inbox providers will flag this behavior as typical of a compromised account.
Conclusion
Conducting a thorough MX check up is one of the most vital maintenance tasks for any business running its own domain. Your email delivery pipeline relies on a complex web of DNS settings, routing protocols, and modern security standards. By running a regular online mx check, keeping your MX priorities aligned, and pairing your configuration with robust SPF, DKIM, and DMARC authentication records, you can ensure that your critical messages always arrive safely in your recipients' inboxes. Don't wait for a missed deal or a major communication breakdown to audit your domain—take control of your email deliverability today.









