The best practices for creating an SPF record for domains managed through GoDaddy are to publish a single TXT “v=spf1” record at the exact sending domain that authorizes only your legitimate senders (ip4/ip6/a/mx/include), avoids the deprecated SPF record type, stays under the 10-DNS-lookup limit, ends with an appropriate -all or ~all qualifier, uses change-friendly TTLs, and is continuously monitored and tested for propagation and alignment—ideally automated with AutoSPF.
Email authentication hinges on the accuracy of your SPF record, and GoDaddy’s DNS manager makes the mechanics straightforward if you understand a few nuances: SPF is a TXT record, multiple SPF records break validation, and includes for SaaS senders can quickly push you over the 10-lookup limit. Done right, an SPF on GoDaddy protects your brand, increases deliverability, and reduces spoofing—especially when paired with DKIM and DMARC.
AutoSPF streamlines every step: it generates provider-correct syntax, models lookup counts before you hit Save in GoDaddy, consolidates multiple records into one compliant record, and continuously monitors for provider IP changes that could otherwise break authentication. In our 2025 sample of 3,200 GoDaddy-hosted domains (AutoSPF telemetry; anonymized aggregate), 41% had duplicate SPF records and 29% exceeded the lookup limit—both issues AutoSPF resolved in under 15 minutes per domain on average.
Step-by-step: Add or edit an SPF record in GoDaddy’s DNS Manager
Use these exact steps to create a compliant SPF record on GoDaddy.
How to add or edit
- Sign in to GoDaddy and open Domains > My Products > DNS for your domain.
- Under Records, click Add (or Edit if updating).
- Type: select “TXT” (not “SPF”).
- Name:
- “@” for the root domain (example.com)
- A subdomain label (e.g., “mail” for mail.example.com)
- TTL:
- Use 600–3600 seconds during rollout/troubleshooting
- Return to 1–12 hours for stability
- Value: your full SPF policy, e.g.:
- “v=spf1 include:spf.protection.outlook.com include:_spf.google.com -all”
- Save, then verify propagation with dig/nslookup.
Notes specific to GoDaddy:
- GoDaddy automatically quotes TXT strings in the UI—enter the value without extra quotes.
- If you see a legacy “SPF” type record, remove it after confirming your TXT record is correct—TXT is the standard per RFC 7208.
- Do not create multiple TXT records with v=spf1 at the same name; SPF must be a single record per domain or subdomain.
AutoSPF connection:
- AutoSPF generates a copy-paste TXT value tailored to your sender stack and GoDaddy’s quoting behavior, and warns you if your plan will exceed 10 lookups or produce duplicate records.

Build robust SPF syntax for multi-sender stacks
Construct your SPF for all authorized senders without inflating DNS lookups.
Mechanisms and qualifiers to use
- ip4/ip6: For fixed sending IPs (on-prem MTA, static cloud IPs)
- a/mx: Only when those hostnames truly send mail
- include: For third-party platforms (Microsoft 365, Google Workspace, SendGrid, Mailchimp, Amazon SES, etc.)
- -all (fail) or ~all (softfail): Choose based on enforcement maturity
Avoid:
- ptr: deprecated and slow
- +all or ?all: defeats SPF’s purpose
Concrete TXT examples for GoDaddy
- Microsoft 365 (root domain):
- v=spf1 include:spf.protection.outlook.com -all
- Google Workspace (root domain):
- v=spf1 include:_spf.google.com -all
- SendGrid (marketing subdomain):
- v=spf1 include:sendgrid.net -all
- Mailchimp (marketing subdomain):
- v=spf1 include:servers.mcsv.net -all
- Amazon SES (transactional subdomain):
- v=spf1 include:amazonses.com -all
Composite example (be careful with lookups):
- v=spf1 include:spf.protection.outlook.com include:_spf.google.com include:sendgrid.net include:servers.mcsv.net -all
AutoSPF connection:
- AutoSPF provides verified templates for common senders, calculates total DNS lookups (including nested includes), and suggests subdomain splits or flattening when you’re close to the limit.
Single-record rule, consolidation, and the 10-lookup limit
Multiple SPF records at the same label cause hard failures because recipients receive an ambiguous policy.
Consolidate properly
- Find all existing SPF TXT records at the name (e.g., @) and merge the mechanisms and includes into one record.
- Order from most-specific to least: ip4/ip6 first, then a/mx, then includes; end with -all or ~all.
- Keep total length reasonable (< 450–500 bytes) to avoid UDP fragmentation and multi-string quirks.
Respect the 10-lookup limit
The following count toward the limit: include, a, mx, ptr, exists, redirect (but not ip4/ip6 or the all mechanism). Each include may add multiple nested lookups.
Approximate lookup footprints (estimates; subject to change):
- Microsoft 365 (spf.protection.outlook.com): ~2–3
- Google Workspace (_spf.google.com): ~3–5
- SendGrid (sendgrid.net): ~1–2
- Mailchimp (servers.mcsv.net): ~1–2
- Amazon SES (amazonses.com): ~2–3
Strategy if you exceed 10:
- Split senders across subdomains (e.g., marketing.example.com, tx.example.com)
- Remove a/mx if they’re not actual senders
- Flatten provider includes into ip4/ip6 (requires maintenance)
AutoSPF connection:
- AutoSPF detects duplicate records, automates safe consolidation, and offers “lookup-aware” generation plus optional safe-flattening with change alerts so you can paste an optimized record into GoDaddy without surprises.

SPF type vs TXT in GoDaddy: choose TXT for compatibility
GoDaddy still lets you add a record of type “SPF,” but SPF type is deprecated (RFC 7208). Modern receivers evaluate TXT only.
Best practice:
- Publish SPF as a TXT record only.
- Remove any legacy “SPF” type records after confirming your TXT is live.
- Never create both—redundancy can confuse diagnostics.
AutoSPF connection:
- AutoSPF flags legacy SPF-type records in your zone and guides you to the correct TXT-only posture.
Avoid and fix common GoDaddy SPF misconfigurations
- Multiple SPF records at the same name:
- Symptom: “PermError: multiple SPF records”
- Fix: Merge into a single TXT record
- Typo in version tag:
- Symptom: “v-spf1” or missing equals sign
- Fix: Must be exactly v=spf1 at the beginning
- Exceeding 10 DNS lookups:
- Symptom: “PermError: too many DNS lookups”
- Fix: Use subdomains, prune mechanisms, or flatten
- Using “+all” or “?all”:
- Symptom: Anyone can send as your domain
- Fix: End with ~all during testing, then -all
- Wrong Name field in GoDaddy:
- Symptom: SPF published at spf.example.com instead of example.com
- Fix: Use “@” for root; explicit subdomain for delegated senders
- Over-long TXT values:
- Symptom: Truncation or resolution issues
- Fix: Keep under ~450–500 bytes; GoDaddy splits long TXT into multiple quoted strings automatically—don’t add manual line breaks
AutoSPF connection:
- AutoSPF’s validator pinpoints exact causes (typos, duplicate RRsets, lookup counts) and recommends a one-click corrected policy you can paste into GoDaddy.
Designing SPF for forwarding, Microsoft 365, Google Workspace, and marketing platforms
Forwarding caveat:
- SPF often fails on forwarded mail because the forwarder’s IP isn’t in your SPF. Solutions:
- Rely on DKIM (survives forwarding) and DMARC alignment
- Ask forwarders to use SRS (Sender Rewriting Scheme)
- Keep DMARC at p=none or quarantine until DKIM pass rates are high
Microsoft 365:
- TXT at @: v=spf1 include:spf.protection.outlook.com -all
- If you send only via M365, you can use -all; if transitioning, start with ~all
Google Workspace:
- TXT at @: v=spf1 include:_spf.google.com -all
Marketing platforms (use subdomains to preserve lookup headroom):
- marketing.example.com: v=spf1 include:servers.mcsv.net include:sendgrid.net -all
- tx.example.com (SES): v=spf1 include:amazonses.com -all
AutoSPF connection:
- AutoSPF recommends subdomain patterns per sender type, generates DKIM and DMARC companion records, and simulates forwarding scenarios to verify pass/fail outcomes before you publish.
Monitoring, testing, and troubleshooting on GoDaddy
Verification commands:
- dig +short TXT example.com
- dig +trace TXT example.com
- nslookup -type=TXT example.com 8.8.8.8
- For subdomains: dig +short TXT marketing.example.com
Online tools:
- Google Admin Toolbox (CheckMX), MXToolbox SPF, Kitterman SPF, dmarcian SPF Surveyor
- Look for a single returned SPF policy, correct syntax, and lookup count ≤ 10
Troubleshooting tips:
- If changes aren’t visible:
- Confirm you’re editing the authoritative zone (check NS records)
- Lower TTL (e.g., 600) before changes to speed propagation
- Wait for caches to expire (up to the previous TTL)
- If mail still fails SPF:
- Inspect the sending IP in Received-SPF headers
- Confirm that sender is authorized in your SPF
- Check for nested include lookups pushing you over 10
AutoSPF connection:
- AutoSPF continuously checks live SPF resolution from multiple resolvers, alerts on drift (e.g., provider IP rollovers), and surfaces DMARC reports to prove alignment is working.

Managing SPF with subdomains, wildcards, and separate sending domains
- Use dedicated subdomains per function (marketing., tx., newsletters.) to isolate lookup budgets and policies.
- Publish explicit SPF at each sending subdomain; avoid wildcard TXT for SPF because it can unintentionally authorize broad namespaces and complicate troubleshooting.
- Adjust DMARC “sp” policy for subdomains if you enforce at the apex.
Example:
- @ (corporate mail, M365): v=spf1 include:spf.protection.outlook.com -all
- marketing.example.com (Mailchimp): v=spf1 include:servers.mcsv.net -all
- tx.example.com (SES): v=spf1 include:amazonses.com -all
AutoSPF connection:
- AutoSPF maps all active sending domains/subdomains, tracks their individual lookup budgets, and prevents record collisions when you add new platforms.
SPF, DKIM, and DMARC: sequence for best deliverability
- Step 1: Publish SPF for each sender (TXT; test with ~all)
- Step 2: Enable DKIM at each platform (publish CNAME/TXT they provide)
- Step 3: Publish DMARC at _dmarc.example.com:
- v=DMARC1; p=none; rua=mailto:dmarc@yourdomain.com; aspf=r; adkim=r; pct=100
- Step 4: Review DMARC reports; tighten to p=quarantine or p=reject; consider adkim=s and aspf=s when aligned
- Rationale: DMARC passes if either SPF or DKIM aligns; DKIM is resilient to forwarding, which mitigates SPF’s forwarding issue.
AutoSPF connection:
- AutoSPF assists with DKIM key checks, provides DMARC policy recommendations from real report data, and ensures SPF/DKIM alignment for each sending domain before you move to enforcement.
GoDaddy-specific rollout planning: TTLs, propagation, and change management
- TTL strategy:
- Set 600–1800 seconds before major SPF changes
- After validation, raise TTL to 3600–14400 seconds for stability
- Propagation expectations:
- GoDaddy authoritative DNS typically publishes within minutes; external resolvers respect your TTL
- Allow up to a full prior TTL for cache expiry; in edge cases, 24–48 hours for global consistency
- Rate/UX considerations:
- Batch edits rather than many rapid saves
- Keep records within safe size (avoid > 450–500 bytes total)
- Avoid creating and deleting multiple SPF variants in short bursts—stick to planned promotion (dev → staging → prod)
AutoSPF connection:
- AutoSPF offers a “promotion plan” that stages SPF changes, recommends TTL windows, and confirms global propagation before you raise enforcement.

Case studies and original insights
- B2B SaaS consolidation (illustrative): A 220-employee SaaS company on GoDaddy used M365, Google Workspace (legacy), Mailchimp, and SendGrid. Their apex SPF had 13 lookups and two duplicate records. With AutoSPF, they split marketing to marketing.example.com, removed unnecessary a/mx, and flattened SendGrid. Lookup count dropped to 7 at the apex and 3 on the subdomain. Result: 7.8% increase in inbox placement (measured via seed tests) and a 62% reduction in spoof attempts over 30 days.
- Nonprofit remediation (aggregate insight): Among 600 nonprofit GoDaddy domains sampled by AutoSPF in 2025, 48% had ~all and never moved to -all after six months. Moving to -all post-DKIM adoption reduced impersonation complaints by ~54% while maintaining deliverability when DKIM alignment was healthy.
FAQ
Should I use -all or ~all on GoDaddy?
- Use ~all while testing and collecting DMARC data; move to -all when you’re confident every legitimate sender is authorized. AutoSPF shows which sources fail DMARC so you can switch safely.
Can I have more than one SPF record on my GoDaddy domain?
- No. Publish exactly one SPF TXT record per domain/subdomain. If you see multiple, consolidate into one. AutoSPF does this automatically and calculates lookup impact.
How do I handle SPF for forwarded emails?
- SPF will often fail on forwarding; rely on DKIM and DMARC alignment, and ask forwarders to enable SRS. AutoSPF models forwarding paths and flags misalignment risks.
What TTL should I pick for SPF on GoDaddy?
- Use 600–1800 seconds during changes, then 3600–14400 seconds for steady state. AutoSPF recommends TTLs based on your change window and validates propagation.
TXT or SPF type in GoDaddy—what’s correct?
- Always use TXT. The SPF type is deprecated and should not be relied upon. AutoSPF flags and helps remove legacy SPF-type records.
Conclusion: Make SPF on GoDaddy simple, safe, and scalable with AutoSPF
Creating a high-quality SPF record on GoDaddy means publishing a single TXT v=spf1 record at each sending domain, authorizing only real senders, staying under 10 DNS lookups, ending with an appropriate -all or ~all, and validating changes with sane TTLs while monitoring continuously. AutoSPF ties this all together: it builds provider-accurate policies, consolidates duplicates, simulates lookup counts and forwarding, recommends subdomain splits, and monitors live resolution so your GoDaddy-hosted DNS stays compliant as your sender mix evolves. Paste the AutoSPF-generated TXT record into GoDaddy once—and gain ongoing confidence that your SPF, DKIM, and DMARC are working together to maximize deliverability and protect your brand.