Skip to main content
Tranco Top Sites 5.5M domains

SPF Supply Chain 2026: Email Sender Market Share Across 5.5 Million Domains

Microsoft 365 powers 19.6% of SPF-enabled domains. First-ever email sender market share by SPF include, analyzing 3 million domains from Tranco Top Sites.

Executive Summary

Microsoft 365 and Google Workspace together appear in 33% of all SPF records on the internet. Every domain that includes spf.protection.outlook.com or _spf.google.com delegates email trust to infrastructure it does not control. This is the SPF supply chain.

An SPF record does not just list authorized senders. Each include: directive is a trust decision — a dependency on a third party to maintain accurate IP ranges, respond to DNS queries reliably, and not introduce addresses that enable spoofing. When a domain adds include:sendgrid.net to its SPF (RFC 7208) record, it grants SendGrid the authority to send email on its behalf. That authority propagates to every IP address SendGrid publishes, now and in the future.

DMARCguard scanned 5,499,028 domains from the Tranco Top Sites list on March 15, 2026. Of these, 3,077,219 domains (56.0%) publish valid SPF records. This study maps the SPF supply chain across that dataset: which providers domains depend on, how concentrated that dependency is, where complexity creates risk, and what policy choices domain operators are making.

Key Findings

19.6% Microsoft 365 Share
13.6% Google Workspace Share
148,655 PermError Risk
53.6% Softfail Rate
41,728 Deprecated ptr
56.0% SPF Adoption

No one publishes this data. Competitors explain how to configure SPF, and industry reports cover DMARC adoption percentages. But no public dataset maps which providers domains actually depend on, how deep the include chains go, or where the system's concentration risks lie. This study fills that gap.

This study extends our flagship email authentication study, which covers DMARC, DKIM, MTA-STS, BIMI, and DANE adoption across the same dataset. Where that study measures adoption breadth, this one measures supply chain depth — the specific providers behind SPF records and the trust relationships they represent.

Who Powers the World's Email? Provider Market Share by SPF Include

The concentration extends beyond the top two. The top five providers — Microsoft 365, Google Workspace, GoDaddy, websitewelcome.com, and Amazon SES — account for 44.8% of all SPF includes. Five organizations control nearly half the email authentication chain. The remaining 55.2% is distributed across hundreds of providers, from regional hosting companies to specialized transactional services.

Top 20 email providers by SPF include

#ProviderCategoryCount% of SPF
1Microsoft 365email-hosting603,85419.6%
2Google Workspaceemail-hosting419,73313.6%
3GoDaddyother204,6216.6%
4websitewelcome.comother76,4052.5%
5Amazon SEStransactional75,8172.5%
6SendGridtransactional71,1692.3%
7Mailguntransactional68,5622.2%
8relay.mailchannels.netother67,8312.2%
9Mailchimpmarketing58,7361.9%
10Namecheapother51,7041.7%
11Mailchimp Transactionaltransactional49,5681.6%
12Zoho Mailemail-hosting49,3611.6%
13HubSpotcrm49,0151.6%
14IONOSother44,9311.5%
15Hostingerother44,2131.4%
16Zendeskmarketing43,1501.4%
17Cloudflareother36,0561.2%
18Mailjettransactional34,2361.1%
19Yandex Mailemail-hosting33,4281.1%
20Salesforcecrm31,6061.0%

The provider landscape splits into distinct categories. Email-hosting providers (Microsoft 365, Google Workspace, Zoho Mail, Yandex Mail) dominate in raw volume because they handle primary mailbox hosting — every domain with a Google Workspace SPF record likely routes all inbound and outbound email through Google. Transactional providers (Amazon SES, SendGrid, Mailgun, Mailchimp Transactional, Mailjet) appear as additional includes alongside a primary provider, handling automated emails like password resets, invoices, and notifications.

SPF includes by provider category

CategoryCount% of SPF
other2,060,06166.9%
email-hosting1,158,84837.7%
transactional377,41112.3%
marketing121,2983.9%
crm103,6583.4%
security78,9352.6%

Percentages exceed 100% because domains include multiple providers across categories. A domain using both a Google Workspace SPF record for primary email and a SendGrid SPF record for transactional email counts in both “email-hosting” and “transactional.” The “other” category at 66.9% reflects the long tail: self-hosted mail servers, regional ISPs, hosting providers, and niche services not matched by our ~80-entry provider suffix registry.

The supply chain implications are direct. Two companies — Microsoft and Google — control 33% of the email authentication chain. A single SPF misconfiguration at either provider propagates to hundreds of thousands of domains. When Microsoft updates the IP ranges behind spf.protection.outlook.com, 603,854 domains inherit that change automatically. This is not a theoretical risk; it is the operational reality of a trust-delegation protocol.

The transactional tier tells a different story. Amazon SES (2.5%), SendGrid (2.3%), and Mailgun (2.2%) each appear in tens of thousands of SPF records because they serve as secondary senders alongside a primary mailbox provider. A SendGrid SPF record entry adds SendGrid's entire IP pool to the domain's authorized sender list — a trust decision that most operators make once and never revisit.

The pattern for Mailchimp SPF record usage shows an interesting split: Mailchimp appears twice in the top 20 — once as a marketing platform (58,736 domains, 1.9%) and once as Mailchimp Transactional (49,568 domains, 1.6%), reflecting the product's evolution from pure marketing into transactional email. HubSpot (1.6%), Zendesk (1.4%), and Salesforce (1.0%) round out the CRM and marketing layer.

The security category (2.6%) includes email filtering and gateway services like Barracuda, Mimecast, and Proofpoint. These providers appear as SPF includes because they route outbound email through their infrastructure for filtering before delivery.

Check your domain's SPF record to see which providers are in your supply chain.

SPF Adoption by Domain Rank: Google at the Top, Microsoft Everywhere Else

SPF adoption rate correlates with domain rank. The highest-traffic domains adopt SPF at higher rates and authorize more sending services.

Top 1K
77.1%
Top 10K
74.0%
Top 100K
69.1%
Top 1M
62.1%
1M+
54.4%

Rank tier breakdown

TierDomainsSPF EnabledAdoption %Avg IncludesTop Provider
top-1k1,00077177.1%2.3Google Workspace
top-10k9,0006,66074.0%2.1Google Workspace
top-100k90,00062,19669.1%2.0Google Workspace
top-1m900,000558,67462.1%1.6Microsoft 365
1m-plus4,499,0282,448,91854.4%1.2Microsoft 365

The provider split across tiers tells a clear story. Google Workspace dominates the top-100K — the largest, highest-traffic, and typically most sophisticated domains. These are organizations with dedicated IT teams that chose Google's enterprise offering.

Microsoft 365 dominates from the top-1M onward, reflecting its broad penetration into small and medium businesses. The crossover happens between the top-100K and top-1M tiers.

SPF complexity decreases as rank drops. Top-1K domains average 2.3 includes per record, meaning the most popular domains authorize multiple sending services — a primary email provider plus transactional, marketing, and CRM platforms. Beyond 1M, the average drops to 1.2 includes.

This complexity gradient has practical implications. Higher-ranked domains with more includes are more likely to approach the 10-lookup limit defined in RFC 7208. They also maintain a larger supply chain — more providers to track, more trust relationships to audit, more potential points of failure.

The SPF adoption rate itself tells a story about organizational maturity. At 77.1% among the top-1K, nearly a quarter of the most-visited domains on the internet still do not publish an SPF record. Below the top-1M, adoption drops to 54.4%. More than 2 million domains in the long tail send email without any SPF protection.

148,655 Domains Exceed the SPF 10-Lookup Limit

148,655 domains — 4.8% of all SPF-enabled domains — exceed the SPF 10 lookup limit defined in RFC 7208 Section 4.6.4. These domains risk SPF PermError on every email they send.

The 10-lookup limit exists because SPF evaluation happens during the SMTP transaction. The receiving server must resolve the sender's SPF record in real time, and each include:, a:, mx:, and redirect: directive triggers a DNS lookup. RFC 7208 caps this at 10 to prevent SPF evaluation from becoming a denial-of-service vector against DNS infrastructure. ip4: and ip6: mechanisms do not count because they contain literal addresses — no DNS resolution required.

When a domain exceeds 10 lookups, SPF evaluation returns PermError. If the domain relies on SPF alignment for DMARC, the DMARC check fails as well — a silent cascading failure that most domain operators never detect until deliverability drops.

SPF complexity distribution

IncludesCount% of SPF
0641,04120.8%
1-22,077,97367.5%
3-5316,26610.3%
6-941,2801.3%
10+6590.0%

The majority of domains (67.5%) use 1-2 includes — typically a single email-hosting provider and possibly one transactional service. The risk concentrates in the 10.3% with 3-5 includes and especially the 1.3% with 6-9 includes. Domains with SPF include multiple providers approach the limit faster than operators expect, because the lookup count is recursive.

Example: A common multi-service stack exceeding the limit

Google Workspace (2 lookups) + SendGrid (1) + Mailchimp (3) + HubSpot (2) + Salesforce (2) + Zendesk (2) + Freshdesk (1) = 13 lookups. Three services over the limit.

The average includes among over-limit domains is 2.7 — seemingly low, but this reinforces the recursive amplification problem. A domain with just 3 include: directives can exceed 10 lookups if those includes nest deeply. The count in the SPF record is not the count that matters; the total recursive resolution depth is.

SPF flattening resolves this by replacing include: directives with the resolved IP addresses, eliminating recursive lookups. But flattening introduces its own maintenance burden: IP ranges change, and stale records silently break authentication.

If your domain exceeds the SPF 10 lookup limit, you have two options. Flatten your SPF record to stay under the limit, or audit your sending services and remove providers you no longer use. See how to fix DMARC failures when the root cause is an SPF lookup limit violation.

SPF Policy Strictness: 53.6% Softfail, Only 40.2% Hardfail

Over half of SPF-enabled domains — 53.6% — use softfail (~all), a policy that marks unauthorized senders but still accepts their email. Only 40.2% enforce hardfail (-all), which instructs receiving servers to reject unauthorized senders outright.

All-qualifier distribution

QualifierMeaningCount% of SPF
-all (hardfail)Reject unauthorized senders1,238,16540.2%
~all (softfail)Mark but accept unauthorized senders1,648,73153.6%
?all (neutral)No assertion about unauthorized senders112,4063.7%
+all (pass)All senders authorized — no protection3,5750.1%
No qualifierSPF record without an all mechanism79,2452.6%

RFC 7208 Section 8.4 designed softfail as a transitional mechanism. The intent was for domain operators to deploy ~all while identifying all legitimate sending sources, then switch to -all once the inventory was complete. The data shows that 53.6% of domains never completed that transition.

The practical difference matters. With ~all, a spoofed email from your domain reaches the recipient's inbox (possibly flagged, depending on the receiver's local policy). With -all, it gets rejected. In a world where 53.6% of domains use softfail, attackers know the odds are in their favor.

The 3,575 domains with +all deserve special mention. This qualifier tells receiving servers “accept email from anyone claiming to be us.” It is functionally equivalent to having no SPF record.

The SPF softfail vs hardfail gap has practical implications for DMARC enforcement as well. A domain with p=reject in its DMARC policy but ~all in its SPF record creates a contradictory signal: DMARC says reject unauthorized mail, but SPF says merely mark it. DMARC alignment resolves this (DKIM can compensate), but the inconsistency indicates incomplete policy configuration.

If your domain uses ~all, review your sending sources and move to -all once you have confirmed all legitimate senders are included. Generate a properly configured SPF record with hardfail enabled.

SPF Mechanism Usage: include Dominates at 32.3%

The include mechanism accounts for 32.3% of all mechanism occurrences across SPF records — the single most-used mechanism. This confirms that SPF is fundamentally a delegation protocol. Most domains do not send email from their own infrastructure. They delegate to third-party providers via include: directives.

Mechanism usage across 3,077,219 SPF-enabled domains

MechanismCount% of Domains% Share
include3,838,536124.7%32.3%
all3,002,87797.6%25.2%
ip42,460,44380.0%20.7%
a1,274,54741.4%10.7%
mx1,124,71736.5%9.5%
ip684,8922.8%0.7%
redirect61,6752.0%0.5%
ptr41,7281.4%0.4%
exists8,7020.3%0.1%

The “% of Domains” column exceeds 100% for include because domains use multiple include: directives per record. The average SPF record contains 1.25 include: mechanisms (3,838,536 total includes across 3,077,219 SPF-enabled domains).

Deprecated ptr mechanism

41,728 domains (1.4%) still use ptr, which RFC 7208 Section 5.5 explicitly deprecates. The specification states that ptr “SHOULD NOT be used” because it requires the receiving server to perform reverse DNS lookups for every connection. If your SPF record contains a ptr mechanism, replace it with explicit ip4: or ip6: entries.

ip6 adoption remains notably low at 2.8% of domains, despite continued growth in IPv6 deployment globally. Most email infrastructure still operates on IPv4.

The redirect modifier (2.0%) serves a different purpose than include:. Where include: adds a provider's IP ranges to the existing record, redirect replaces the entire SPF evaluation with another domain's record. It is commonly used by organizations that centralize SPF policy across multiple domains.

The 50 Most-Referenced SPF Include Domains on the Internet

The most common SPF include on the internet is spf.protection.outlook.com, appearing in 598,643 SPF records (19.5% of all SPF-enabled domains). _spf.google.com follows at 415,155 records (13.5%). Combined, nearly 1 in 3 SPF records references one of these two domains.

#Include DomainCount% of SPF
1spf.protection.outlook.com598,64319.5%
2_spf.google.com415,15513.5%
3secureserver.net193,3396.3%
4websitewelcome.com76,4052.5%
5amazonses.com75,1802.4%
6relay.mailchannels.net67,8312.2%
7sendgrid.net66,2912.2%
8mailgun.org63,3462.1%
9servers.mcsv.net58,4941.9%
10spf.efwd.registrar-servers.com51,1961.7%
11spf.mandrillapp.com48,4381.6%
12_spf.mail.hostinger.com44,2131.4%
13mail.zendesk.com42,1511.4%
14_spf.mx.cloudflare.net36,0561.2%
15spf.mailjet.com34,1401.1%
16_spf.salesforce.com30,7411.0%
17spf.web-hosting.com29,4831.0%
18spf.socketlabs.com29,2861.0%
19_spf-us.ionos.com29,2681.0%
20_spf.yandex.net29,0210.9%
21zoho.com24,8550.8%
22_spf.mlsend.com21,5430.7%
23mx.ovh.com21,2410.7%
24netblocks.dreamhost.com20,5900.7%
25spf.sendinblue.com17,6020.6%
26emailsrvr.com16,5340.5%
27_spf-eu.ionos.com15,5810.5%
28beget.com14,9310.5%
29spf.mysecurecloudhost.com13,6300.4%
30_spf.elasticemail.com13,0000.4%
31_spf.mail.ru12,7520.4%
32bluehost.com12,5680.4%
33spf.ess.barracudanetworks.com11,8700.4%
34shops.shopify.com11,3520.4%
35spf.antispamcloud.com11,3130.4%
36spf.titan.email10,8570.4%
37us._netblocks.mimecast.com10,8460.4%
38zohomail.com10,6460.3%
39spf.em.secureserver.net10,2170.3%
40relay.mailbaby.net10,1200.3%
41aspmx.pardot.com10,0790.3%
42spf.mail.qq.com10,0470.3%
43spf.stackmail.com10,0190.3%
44%{ir}.%{v}.%{d}.spf.has.pphosted.com9,6150.3%
45spf.privateemail.com9,5730.3%
46_spf-usg2.ppe-hosted.com9,3320.3%
47_spf.timeweb.ru8,9830.3%
48_spf.hostedemail.com8,9150.3%
49spf.unisender.com8,7640.3%
50spf.sender.xserver.jp8,6760.3%

Notable patterns in the long tail: secureserver.net (GoDaddy) ranks third at 6.3%, reflecting GoDaddy's massive hosting customer base. amazonses.com (2.4%) and sendgrid.net (2.2%) represent the transactional email layer. servers.mcsv.net (Mailchimp, 1.9%) and spf.mandrillapp.com (Mailchimp Transactional, 1.6%) again show the Mailchimp product split.

Regional and niche providers reveal the geographic spread of the SPF supply chain. _spf.yandex.net (0.9%) serves primarily Russian-language domains. spf.mail.qq.com (0.3%) reflects Tencent's email presence in the Chinese market. spf.sender.xserver.jp (0.3%) is a Japanese hosting provider. The supply chain extends into regional infrastructure that most Western-focused analyses overlook.

Every one of these include domains represents a trust relationship — a third-party provider that can send email as the including domain. Each one is a node in the global SPF supply chain.

Methodology

Data Source

Tranco Top Sites List (Full list, March 2026). 5,499,028 domains scanned from the complete Tranco ranking. DNS queries via system resolver. SPF records extracted from TXT records beginning with v=spf1.

Scanner Tool
  • DMARCguard's proprietary SPF parser performed the following analysis on each domain:
  • SPF record extraction — TXT lookup, case-insensitive matching per RFC 7208 §4.6.1
  • Include/redirect resolution — Recursive flattening of all include: and redirect= directives
  • DNS lookup counting — Total recursive lookups tracked against the 10-lookup limit (RFC 7208 §4.6.4)
  • Mechanism extraction — All mechanisms (include, ip4, ip6, a, mx, ptr, exists, redirect) and qualifiers (-all, ~all, +all, ?all) parsed
  • Provider classification — ~80-entry suffix registry maps include domains to named providers via progressive suffix stripping (e.g., spf.protection.outlook.comoutlook.com → Microsoft 365)
Scan Date

Limitations
  • "Other" category at 66.9% — the suffix registry maps ~80 known providers; remaining includes are self-hosted mail servers, regional ISPs, hosting providers, and niche services not in the registry
  • Suffix-based mapping — a domain including _spf.google.com is classified as Google Workspace, but could be using Google for relay-only delivery; the mapping reflects DNS configuration, not contractual relationship
  • Point-in-time scan — SPF records change daily; this snapshot reflects March 15, 2026; quarterly rescans are planned
  • Lookup count approximation — recursive resolution uses the same DNS resolver and timeout settings as production email receivers, but results may differ from specific receiver implementations (caching behavior, timeout handling)
  • Zero parse errors encountered — records with non-standard formatting may have been silently skipped during extraction
Cite This Research
DMARCguard. (2026). SPF Supply Chain 2026: Email Sender Market Share Across 5.5 Million Domains. https://dmarcguard.io/research/spf-supply-chain-2026/

Frequently Asked Questions

What is the most popular email provider by SPF include?

Microsoft 365 is the most popular email provider by SPF include, appearing in 19.6% of all SPF-enabled domains (603,854 out of 3,077,219). Google Workspace is second at 13.6% (419,733 domains). Together, these two providers appear in roughly one-third of all SPF records. Source: DMARCguard scanner, March 2026.

How many domains exceed the SPF 10-lookup limit?

148,655 domains (4.8% of SPF-enabled domains) exceed the 10-DNS-lookup limit defined in RFC 7208 Section 4.6.4. These domains risk PermError, which causes SPF evaluation to fail. If the domain relies on SPF alignment for DMARC, the DMARC check fails as well. See our 10-lookup limit analysis.

What percentage of domains use SPF softfail vs hardfail?

53.6% of SPF-enabled domains use softfail (~all), while 40.2% use hardfail (-all). RFC 7208 designed softfail as a transitional state, but most domains never transition to hardfail. See our policy strictness analysis.

Is the SPF ptr mechanism deprecated?

Yes. RFC 7208 Section 5.5 states that ptr “SHOULD NOT be used” because it places an undue load on receiving mail servers. Despite this, 41,728 domains (1.4%) still include ptr in their SPF records. See our mechanism usage analysis.

What is an SPF include directive?

An SPF include: directive tells receiving mail servers to also check the SPF record of another domain when evaluating the sender. For example, include:_spf.google.com authorizes all IP addresses that Google publishes in its SPF record. Each include: counts as one DNS lookup toward the 10-lookup limit defined in RFC 7208 Section 5.2.

How many SPF includes can a domain have?

There is no explicit limit on the number of include: directives, but RFC 7208 Section 4.6.4 limits total DNS lookups (including recursive resolution of nested includes) to 10. In practice, most domains use 1-2 includes (67.5%), while 10.3% use 3-5. Only 659 domains in our dataset use 10 or more includes.

Does Google or Microsoft have more SPF domains?

Microsoft 365 has more SPF domains. spf.protection.outlook.com appears in 598,643 SPF records (19.5%), while _spf.google.com appears in 415,155 records (13.5%). However, Google Workspace dominates among the highest-ranked domains (top-100K), while Microsoft 365 dominates the long tail. See our rank tier analysis.

Key Takeaways and What to Do Next

Five findings define the SPF supply chain in 2026:

  1. Two providers dominate. Microsoft 365 (19.6%) and Google Workspace (13.6%) appear in one-third of all SPF records. SPF is a supply chain, and these are its largest nodes.
  2. 148,655 domains risk PermError. 4.8% of SPF-enabled domains exceed the 10-lookup limit, causing silent SPF failures — and silent DMARC failures downstream.
  3. 53.6% never completed the transition. Softfail (~all) was designed as a temporary state. More than half of domains still use it. Only 40.2% enforce hardfail (-all).
  4. Deprecated mechanisms persist. The ptr mechanism, deprecated by RFC 7208 Section 5.5, still appears in 41,728 domains (1.4%).
  5. Complexity scales with visibility. Top-1K domains average 2.3 includes per record. Beyond 1M, the average drops to 1.2.

Understanding your SPF supply chain — which providers you depend on, how many lookups they cost, and whether your policy enforces protection — is the first step toward reliable email authentication.

What to do next

  • Audit your includes. Run the SPF checker to see every provider in your supply chain and your total lookup count.
  • Stay under 10 lookups. If you exceed the limit, use the SPF flattener to collapse nested includes into flat IP ranges, or remove includes for services you no longer use.
  • Move to hardfail. If your domain uses ~all, identify all legitimate senders and switch to -all. Use the SPF generator to build a properly configured record.
  • Remove deprecated mechanisms. Replace any ptr mechanism with explicit ip4: or ip6: entries.
  • Monitor continuously. SPF records change as providers update IP ranges and as teams add or remove sending services. Start monitoring your DMARC reports — free plan, no credit card.

This study establishes a baseline for longitudinal tracking of the SPF supply chain. Quarterly rescans will track provider market share shifts, lookup-limit violation trends, and the softfail-to-hardfail transition rate over time.

References & Sources

  1. Tranco Top Sites List — Domain ranking methodology. tranco-list.eu
  2. RFC 7208 — Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1. datatracker.ietf.org
  3. DMARCguard Email Authentication Study — Flagship study covering DMARC, SPF, DKIM, MTA-STS, BIMI, and DANE adoption across 5.5 million domains. dmarcguard.io/research

Cite This Research

Plain text citation:

DMARCguard. (2026). SPF Supply Chain 2026: Email Sender Market Share Across 5.5 Million Domains. Retrieved from https://dmarcguard.io/research/spf-supply-chain-2026/

BibTeX format:

@misc{dmarcguard_spf2026,
  title={SPF Supply Chain 2026: Email Sender Market Share Across 5.5 Million Domains},
  author={DMARCguard Research Team},
  year={2026},
  month={March},
  howpublished={\url{https://dmarcguard.io/research/spf-supply-chain-2026/}},
  note={Data collected March 15, 2026. Sample: 5,499,028 domains from Tranco Top Sites List (full list). SPF-enabled: 3,077,219 (56.0\%).}
}

Full methodology details, data sources, and limitations are documented in the Methodology section above. The scanner is DMARCguard's proprietary SPF parser that resolves include chains recursively, counts DNS lookups, and maps include domains to providers via an ~80-entry suffix registry.

Download the Dataset

Freely available for research and citation — no signup required.

Full Dataset

Complete SPF scan results for all 5,499,028 domains — every include chain, mechanism, and provider mapping.

CSV (gzip) · ~120 MB

Top 10K Sample

SPF records from the highest-ranked domains — ideal for quick analysis.

CSV · ~1 MB

Aggregate Stats

Summary metrics — provider market share, mechanism counts, policy distribution.

JSON · 2 KB

Markdown Report

Full analysis report in Markdown format — for embedding in docs or wikis.

Markdown · 6 KB

Monitor your own domains

Continuous monitoring, aggregate report parsing, and actionable insights for all your email authentication protocols.

Start Free