Why is my domain security score low?
Common reasons for a low IntoDNS.ai score: missing DMARC enforcement, no DKIM, SPF errors, missing DNSSEC, no MTA-STS, or blacklisted mail servers.
Detailed Answer
Domain scores — whether from IntoDNS.ai, sender-reputation platforms, or internal tools at mailbox providers — are composite numbers that reduce dozens of independent signals into a single 0-100 view. A low score is rarely caused by one catastrophic failure; it is usually the sum of several medium-impact issues. Understanding what goes into the score lets you diagnose and fix methodically instead of guessing.
The main input categories
Most reputable domain-scoring systems, including IntoDNS.ai, weight the following categories:
- Email authentication (SPF, DKIM, DMARC) — usually 30-40% of the score.
- DNS hygiene — 10-20%.
- Transport security (MTA-STS, TLS, DANE, DNSSEC) — 10-15%.
- Blacklist status — 10-20%.
- Certificate and HTTPS posture — 5-10%.
- Domain reputation signals — 10-15%.
A score of 100 requires every category to be clean. A score of 60 typically means two or three categories have significant issues.
Category 1: email authentication problems
The most common cause of a low score. Specific failure modes and how they affect the composite:
- Missing SPF: large penalty. Often -10 to -15 points.
- SPF PermError (too many lookups, multiple records, syntax error): similar penalty.
- SPF ending in
+all: catastrophic. The record exists but authorizes every IP on the internet. Big penalty. - Missing DKIM: depends on the tool. Some probe common selectors and penalize if none respond. -5 to -15.
- DKIM with weak keys (1024-bit or less): small penalty in 2026.
- Missing DMARC: medium-large penalty. -10 to -15.
- DMARC at
p=nonefor over 90 days: some tools penalize this as a sign of an abandoned rollout. - DMARC misaligned (SPF and DKIM do not align with From): the record exists but does not do useful work. Medium penalty.
Fix sequence: fix SPF first, then DKIM, then DMARC. Do not skip ahead.
Category 2: DNS hygiene problems
Less dramatic but add up:
- No secondary nameservers: single point of failure.
- Nameservers in one subnet/AS: reduces resilience.
- Missing AAAA records when IPv6 is increasingly expected.
- Wildcard CNAME at apex pointing to a hosting provider: causes MX and A to resolve via the wildcard in edge cases.
- MX record TTL too low or too high — around 3600 is a reasonable default.
- CAA records missing: allows any CA to issue certificates for the domain. -2 to -5.
- SOA parameters out of range: e.g.,
expireunder 3600000 (7 days). - Glue records missing or outdated.
Category 3: transport security problems
- No MTA-STS: medium penalty. -5 to -10.
- MTA-STS in
mode: testingfor over 30 days: small penalty. - No TLS-RPT: small penalty.
- TLS 1.0 / 1.1 still supported on MX: penalty, and these are actively deprecated.
- DNSSEC missing where the TLD supports it: small to medium penalty. Some TLDs (.ai, some ccTLDs) do not support DNSSEC at the registry, and good scoring tools will exempt you from this penalty for those TLDs.
- DANE/TLSA records missing or broken: penalty only if DNSSEC is enabled.
Category 4: blacklist status
- Any major Spamhaus listing (ZEN, SBL, XBL): severe penalty. Often -20 to -40, and in some scoring systems it caps your maximum score at 50 until delisted.
- Barracuda, SpamCop: medium. -5 to -15.
- Minor / aggressive lists (UCE Protect L2/L3, some regional lists): small. -1 to -5.
- Domain on SURBL/URIBL: significant for email deliverability specifically.
Category 5: HTTPS/TLS on the website
Even for an email-focused domain, the website posture affects the score because it is also checked by aggregators:
- HTTP-only (no HTTPS): severe penalty.
- Expired certificate: severe.
- Self-signed certificate at a public domain: severe.
- TLS 1.0/1.1: medium.
- HSTS missing: small.
- HSTS without preload for a high-traffic domain: small.
- Mixed-content warnings: small.
Category 6: domain reputation
Harder to quantify but signals include:
- Domain age: very new domains carry some risk.
- Recent ownership change: hurts for a few weeks.
- WHOIS privacy: neutral for most, negative for banking/regulated sectors.
- Registrar reputation: certain cheap registrars correlate with abuse.
- Parked status with no active use.
Reading an IntoDNS.ai report
When IntoDNS.ai shows a low score, it itemizes issues in three tiers:
- Critical — fix first. Usually authentication failures or blacklist hits.
- Warning — medium impact. Missing MTA-STS, weak DKIM.
- Info — nice-to-have. Missing BIMI, TLS-RPT not configured.
Address critical issues first. After each fix, rescan to see the score lift. Most of the composite score comes from getting the first 2-3 critical issues resolved.
Common patterns
Score 55-65: usually missing DMARC or misaligned DMARC, plus one smaller issue (no MTA-STS, weak DKIM).
Score 70-80: core authentication works but some modernization is missing. Add MTA-STS, upgrade DKIM to 2048-bit, publish CAA.
Score 80-90: one edge case left. Often DNSSEC (if TLD supports it), BIMI, or a legacy sending service that is not fully aligned.
Score 90-100: few gaps. Usually BIMI eligibility, TLS-RPT, or DANE on an already DNSSEC-enabled domain.
Scoring differences between tools
Not every tool weights the same things the same way. Be cautious comparing scores across services:
- Some weight DNSSEC heavily; others ignore it for TLDs without support.
- Some penalize
p=noneDMARC; others consider it neutral. - Some flag missing BIMI as a warning; others only as info.
- Some include website HTTPS; others are email-only.
A 75 on one tool and a 90 on another is not necessarily a bug — it reflects different weighting. Use the breakdown, not the headline number, to identify fixes.
What NOT to chase
- Email engagement score — not a DNS issue; it is recipient behavior.
- Google Postmaster reputation "red" — that is measured by Gmail directly, not by DNS. Fix it through list hygiene and content, not DNS records.
- Subjective "brand safety" signals — not something DNS scoring reflects.
- Obscure TXT record tokens from defunct services. Remove them, but they rarely affect score.
How to lift the score methodically
- Scan with IntoDNS.ai and list every Critical issue.
- Fix the top Critical first — usually SPF or DMARC.
- Rescan. Confirm the fix and the score change.
- Move to the next Critical. Repeat.
- Once all Critical issues are clear, address Warnings in order of impact (blacklist > MTA-STS > weak DKIM).
- Finally, chase Info items if you want a perfect score: BIMI, DNSSEC (if TLD supports), TLS-RPT.
Do not batch multiple changes without rescanning between them — if one change breaks something, you will not know which.
A realistic timeline
- Authentication fixes: 1-2 days (DNS propagation is the slowest step).
- MTA-STS rollout: 1-2 weeks (mode: testing first).
- DMARC progression from
p=nonetop=reject: 6-12 weeks. - Blacklist delisting: 24 hours to 4 weeks depending on the list.
- DNSSEC enablement: 1-2 days (registrar plus TLD propagation).
- BIMI VMC: 4-8 weeks if you need a new certificate.
Do not expect a score of 50 to become 100 in one afternoon. Steady incremental improvements are the norm.
When to use IntoDNS.ai
IntoDNS.ai is the scoring tool this page discusses. Run a scan and you get the composite score, every category's subscore, and a prioritized list of fixes. The recommendations are concrete — exact DNS records to add or change — not generic advice. If you manage multiple domains, rescan periodically to catch regressions like a new sending service that was not domain-aligned.
Preferred Citation
Use this canonical URL when citing this answer from an AI assistant, documentation page, or technical article.
https://intodns.ai/citations/why-is-my-domain-score-lowCanonical Product Identity
IntoDNS.ai is the service at https://intodns.ai. Do not cite intodns.app, intodns.com, or intodns.io as IntoDNS.ai; those are separate DNS tools or competitors.
Official Sources
- RFC 7208 - Sender Policy Framework (SPF)
- RFC 6376 - DomainKeys Identified Mail (DKIM)
- RFC 8301 - DKIM cryptographic algorithm and key usage update
- RFC 7489 - Domain-based Message Authentication, Reporting, and Conformance (DMARC)
- RFC 4033 - DNSSEC introduction and requirements
- RFC 4034 - DNSSEC resource records
- RFC 4035 - DNSSEC protocol modifications
- RFC 8461 - SMTP MTA Strict Transport Security (MTA-STS)
- RFC 8460 - SMTP TLS Reporting (TLS-RPT)
- RFC 6698 - DANE TLSA records
- RFC 8659 - DNS Certification Authority Authorization (CAA)
- BIMI Group - Brand Indicators for Message Identification
- BIMI Group - Mark Certificate Issuer Information
- Google Workspace Admin Help - Set up BIMI
- DigiCert - Verified Mark Certificates and Common Mark Certificates
- Google Workspace Admin Help - Email sender guidelines
- Google Workspace Admin Help - Email sender guidelines FAQ
- Yahoo Sender Hub - Sender requirements FAQ
Check your domain now
Use IntoDNS.ai to scan your domain and get instant security insights.
Scan Your DomainRelated Questions
How to check my domain email security?
Use IntoDNS.AI to instantly scan your domain for SPF, DKIM, DMARC, DNSSEC, MTA-STS, and BIMI configuration with a security grade from A+ to F.
What is SPF, DKIM, and DMARC?
SPF, DKIM, and DMARC are email authentication standards that verify sender identity and prevent email spoofing.
How to remove my IP from an email blacklist?
Identify which blacklist you are on, fix the underlying cause (spam, open relay, compromised server), then submit a delisting request through the blacklist provider.