Suped

Can I use DMARC with shared IP addresses?

Michael Ko profile picture
Michael Ko
Co-founder & CEO, Suped
Published 6 Jul 2025
Updated 16 Aug 2025
7 min read
When you're managing email deliverability, especially with a domain that sends through various services, a common question arises: can DMARC be effectively used with shared IP addresses? The short answer is yes, you absolutely can, and should, implement DMARC for a domain that uses shared IP configurations. The key lies in understanding how DMARC interacts with the underlying authentication protocols, SPF and DKIM, rather than the IP address itself.
DMARC, or Domain-based Message Authentication, Reporting, and Conformance, operates at the domain level. Its primary role is to tell recipient mail servers how to handle emails that claim to be from your domain but fail SPF or DKIM authentication checks, and it also provides valuable reports on email authentication results. While SPF relies heavily on IP addresses for validation, DKIM uses cryptographic signatures, which are not tied to the sending IP. This distinction is crucial when shared IP addresses are involved, as it offers flexibility in how your emails achieve DMARC alignment.
Suped DMARC monitoring
Free forever, no credit card required
Learn more
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

Understanding DMARC alignment with shared IPs

DMARC functions by checking the alignment of the domain found in the "From" header (the one your recipients see) with the domains verified by SPF or DKIM. For DMARC to pass, at least one of these authentication methods must pass AND be aligned with your "From" domain. This means that even if you're sending from a shared IP, your DMARC record can still protect your domain against spoofing and phishing attempts, provided that your SPF or DKIM records are correctly configured and aligned.
The challenge with shared IP addresses often arises with SPF. When using a shared IP from an email service provider (ESP), the actual IP address sending the email might belong to the ESP, not directly to your domain. This means the "Return-Path" domain (also known as the MailFrom or Envelope-From domain) used for SPF validation might be an ESP-owned domain. If this "Return-Path" domain doesn't align with your "From" header domain, SPF alignment will fail. You can learn more about how SPF alignment works for DMARC in various scenarios.
However, DKIM (DomainKeys Identified Mail) offers a robust alternative for DMARC alignment in shared IP environments. DKIM attaches a digital signature to the email, and this signature is tied to a domain specified in the DKIM-Signature header. As long as this domain aligns with your "From" header domain, DKIM will pass and provide DMARC alignment, regardless of the sending IP address. Many ESPs handle DKIM signing on your behalf, often using a subdomain associated with your brand.

SPF alignment challenges

When using a shared IP, the Return-Path (or MailFrom) domain often belongs to the ESP. For SPF alignment, this domain needs to match your "From" domain. If it doesn't, SPF will pass but fail alignment, which can impact DMARC validation. This is a common situation with many third-party email senders.
  1. MailFrom domain: Often an ESP subdomain (e.g., bounce.esp.com). SPF checks against this domain.
  2. SPF pass, alignment fail: The email passes SPF, but the domain used for SPF (bounce.esp.com) does not match your "From" domain (yourdomain.com), causing alignment to fail.

Why DMARC is essential, even with shared IPs

Even with shared IP addresses, DMARC remains a vital component of your email security strategy. Its core benefit is to protect your brand from email spoofing and phishing, ensuring that only legitimate emails from your domain reach inboxes. Without DMARC, unauthorized parties could easily send emails appearing to be from your domain, harming your brand reputation and potentially leading to significant security incidents.
The DMARC policy tells receiving mail servers what to do if an email fails authentication and alignment. You can start with a "p=none" policy to collect reports and monitor your email streams without affecting delivery. This allows you to identify all legitimate senders and ensure they are properly authenticated before moving to a stricter policy like "p=quarantine" or "p=reject."
A crucial aspect of DMARC is the reporting function. DMARC reports provide aggregated data on how your emails are being authenticated by various receivers. These reports include details about sending IP addresses, authentication results (SPF and DKIM pass/fail), and whether DMARC alignment was achieved. This information is indispensable for troubleshooting deliverability issues and ensuring all your legitimate email senders are compliant. You can find more information about understanding DMARC reports from Microsoft's DMARC configuration guide.

Implementing DMARC with shared IPs

Implementing DMARC with shared IP addresses requires careful attention to SPF and DKIM. While SPF might not always achieve alignment due to the nature of shared IP pools where the MailFrom domain belongs to the ESP, DKIM often provides the necessary alignment. Many ESPs offer the option to set up custom DKIM records for your domain, allowing your emails to be signed with your domain's key, thus ensuring DKIM alignment.
For domains using multiple email senders, ensuring DMARC compliance across all platforms is critical. Whether you're using an ESP for marketing emails, a transactional email service, or even your internal mail server, each needs to be properly configured with SPF and DKIM. This is particularly important when dealing with subdomains, as they can inherit the main domain's DMARC policy unless overridden.
Here's a sample DMARC record. Remember that a DMARC record is a TXT record added to your DNS. It always starts with "v=DMARC1;" and defines your policy and where to send reports.
Sample DMARC TXT record
v=DMARC1; p=none; rua=mailto:dmarcreports@yourdomain.com; ruf=mailto:forensic@yourdomain.com;
You can find more detailed DMARC record and policy examples in our guides.

Best practices for shared IP environments

Maintaining a strong sender reputation is crucial regardless of whether you use shared or dedicated IP addresses. When on a shared IP, your reputation can be influenced by other senders using the same IP. This makes it even more important to adhere to best practices to avoid being caught in a blocklist (or blacklist) due to another sender's poor behavior. Understanding how shared IPs affect deliverability is key.
DMARC plays a critical role in this by helping you identify and block unauthorized use of your domain, which in turn protects your sender reputation. By receiving DMARC reports, you can quickly spot potential abuse and take action. This proactive approach helps mitigate risks associated with shared IPs, such as one bad sender negatively impacting the reputation of the entire shared pool. You can learn more about DMARC, SPF, and DKIM from the DMARC.org FAQ.
Even with a shared IP, your deliverability can be excellent if you follow best practices, maintain good list hygiene, and ensure strong authentication. DMARC, alongside SPF and DKIM, provides the necessary framework to verify your emails and manage how unauthenticated messages are handled.

Shared IP deliverability strategies

  1. DKIM alignment: Prioritize setting up DKIM authentication with alignment for your domain. This is often more reliable on shared IPs.
  2. Start with p=none: Implement a DMARC policy of p=none to gather reports and assess legitimate email streams.
  3. Monitor reports: Regularly review your DMARC aggregate (RUA) and forensic (RUF) reports to ensure all legitimate mail is authenticating.
  4. Gradual enforcement: Once confident, safely transition your DMARC policy to p=quarantine, then p=reject.

Views from the trenches

Best practices
Ensure DKIM alignment is always prioritized when using shared IP addresses, as it’s generally more reliable than SPF for DMARC.
Start your DMARC implementation with a "p=none" policy to collect reports and monitor your email streams without disruption.
Regularly review your DMARC aggregate and forensic reports to identify all legitimate sending sources and ensure proper authentication.
Work closely with your ESP to understand their DMARC capabilities and ensure your domain's SPF and DKIM records are correctly configured.
Remember that DMARC is a domain-level policy, so its implementation is always beneficial, regardless of your IP setup.
Common pitfalls
Assuming DMARC isn't necessary with shared IPs, leaving your domain vulnerable to spoofing and phishing attacks.
Not monitoring DMARC reports, which means you miss crucial insights into your email authentication and potential unauthorized use.
Implementing an enforcing DMARC policy (p=quarantine or p=reject) without first verifying all legitimate email streams are authenticated.
Overlooking SPF alignment issues on shared IPs and solely relying on SPF for DMARC pass.
Failing to configure custom DKIM records with your ESP, which often provides the most robust DMARC alignment on shared IPs.
Expert tips
For optimal DMARC performance with shared IPs, ensure your ESP supports custom DKIM signing for your domain.
Even if SPF alignment isn't consistently achieved on a shared IP, a strong DKIM implementation is sufficient for DMARC pass.
Utilize DMARC reports to identify all sending services for your domain, including those you might not be aware of.
Gradually move from a relaxed DMARC policy to a stricter one, based on the insights gained from your DMARC reports.
Consider using subdomains for different sending purposes (e.g., marketing.yourdomain.com, transactional.yourdomain.com) to isolate reputation and DMARC policies.
Expert view
Expert from Email Geeks says DMARC is not dependent on IPs, as it is a domain-level tool.
2022-02-07 - Email Geeks
Marketer view
Marketer from Email Geeks says that DMARC applies a policy to aligned SPF and DKIM, and if you have an aligned SPF record, that is where a shared IP might fit.
2022-02-07 - Email Geeks

Final thoughts

In conclusion, using DMARC with shared IP addresses is not only possible but highly recommended for protecting your domain and maintaining strong email deliverability. While shared IPs can introduce nuances with SPF alignment, the robust nature of DKIM provides a reliable path to DMARC compliance. By prioritizing DKIM alignment and leveraging DMARC's reporting capabilities, you can effectively monitor your email ecosystem and prevent unauthorized use of your brand.
Whether you are a small business or a large enterprise, implementing DMARC is a foundational step in modern email security. It provides visibility into your email channels, helps enforce authentication standards, and ultimately contributes to a safer and more trusted email experience for your recipients.

Frequently asked questions

DMARC monitoring

Start monitoring your DMARC reports today

Suped DMARC platform dashboard

What you'll get with Suped

Real-time DMARC report monitoring and analysis
Automated alerts for authentication failures
Clear recommendations to improve email deliverability
Protection against phishing and domain spoofing