Your DMARC data, just a question away.

Connect Claude, Cursor, or any MCP-compatible assistant to your PowerDMARC account. Query DMARC reports, manage domains, and run DNS lookups – in plain English.

Called dmarc_aggregate_per_sending_source Live data

0sources

sending mail as powerdmarc.com

Same prompt. Different intelligence.

WITHOUT POWERDMARC MCP
WITH POWERDMARC MCP
Email security audit, powerdmarc.com
audit powerdmarc.com's email security, which domains are spoofable and what should our DMARC policy actually be?

General guidance on DMARC posture

Honest take, without access to your actual DMARC reports I can only walk you through the standard playbook. The typical recommendation is to start at p=none, monitor for a few weeks, then move toward p=quarantine and eventually p=reject.

For SPF, you'll want to stay under the 10 DNS lookup limit, and your DKIM keys should be at least 1024-bit (ideally 2048). BIMI requires a VMC and prior DMARC enforcement.

I don't have visibility into powerdmarc.com's actual sending sources, current policy, alignment failures, or any spoofing attempts targeting your subdomains, so I can't tell you which domains are spoofable.

Reply...
Opus 4.7 Extended
Email security audit, powerdmarc.com
audit powerdmarc.com's email security, which domains are spoofable and what should our DMARC policy actually be?
Called powerdmarc:get_domains() Live data

Domain portfolio

12 domains, 30-day window

Domain Score Spoofing (30d) Policy Status
powerdmarc.com621,284p=noneMonitor
mail.powerdmarc.com388,917no recordSpoofable
powerdmarc-billing.com2914,602no recordSpoofable
support.powerdmarc.com71312p=quarantinePartial
marketing.powerdmarc.com442,108p=noneSpoofable
powerdmarc.io940p=rejectEnforced

Three domains are actively spoofable right now, mail.powerdmarc.com, powerdmarc-billing.com, and marketing.powerdmarc.com. Combined, they absorbed ~25,600 spoofing attempts in the last 30 days...

Ask about a domain, recommend a policy, or generate a fix...
Opus 4.7 Extended

What can you ask your AI?

Three categories of questions, every one answered with live data from your PowerDMARC account. No dashboards, no XML.

01 · See

Get visibility

"List all my domains and their current DMARC policies."

Instant portfolio view, every domain with its policy, score, and enforcement status.

"Who is sending email as my domain right now?"

Full map of authorized senders, unknown sources, volumes, and authentication rates over 30 days.

"Where in the world is my email being reported from?"

DMARC reports grouped by country, including any geographic anomalies worth investigating.

02 · Diagnose

Find problems

"Show me who tried to spoof my domain this week."

Forensic failure data, every attacker source, attempt count, and authentication outcome.

"Audit my SPF record, am I under the 10 lookup limit?"

Validates SPF syntax, counts DNS lookups, flags PermError risk before it breaks your delivery.

"What's the health score across all my domains?"

Weighted score across SPF, DKIM, and DMARC alignment, with the weak spots called out.

03 · Fix

Take action

"Generate a DMARC record with quarantine policy."

DNS-ready record built to your specification, copy-paste into your registrar and you're live.

"Look up the DMARC record for any domain."

DNS lookups across 14 record types plus WHOIS, all from a single natural-language question.

"Add a new domain to my account and set it to monitor."

Create the domain, generate the policy record, and start collecting reports without leaving your AI.

All tools at your AI's fingertips

Every tool listed below is live in the PowerDMARC MCP server. Ask questions the way you'd ask a colleague, and get live data back from your account.

DMARC Reports
Query aggregate and forensic DMARC report data across any date range, grouped by country, host, org, result, or sending source.
Available tools
  • dmarc_aggregate_detailed_stats Full stats for a date range
  • dmarc_aggregate_per_country Grouped by country
  • dmarc_aggregate_per_host Per sending host
  • dmarc_aggregate_per_org Per reporting org
  • dmarc_aggregate_per_result Pass/fail breakdown
  • dmarc_aggregate_per_sending_source Per source IP
  • dmarc_forensic_data Forensic failure reports
Domain Health and Management
Get health scores, authentication status, mail volume history, and manage domains in your account.
Available tools
  • domain_health Health score and auth status
  • mail_volume_history Historical mail volume
  • dkim_analytics DKIM analytics
  • list_domains List all domains
  • get_domain Details for a domain
  • create_domain Register a new domain
  • delete_domain Remove a domain
DNS Lookups
Look up any DNS record type including A, AAAA, MX, TXT, SPF, DMARC, PTR, NS, CNAME, and WHOIS.
Available tools
  • dns_lookup A, AAAA, MX, TXT, SPF, DMARC, PTR, NS, CNAME
  • whois_lookup WHOIS registration info
Supported record types
AAAAAMXTXTNSCNAMESPFDMARCPTRWHOIS
Record Generators
Generate valid DMARC, SPF, and DKIM records on demand, plus analyze raw email headers to diagnose delivery issues.
Available tools
  • generate_dmarc_record Generate a DMARC TXT record
  • generate_spf_record Generate an SPF record
  • generate_dkim_record Generate a DKIM public key
  • analyze_email_header Diagnose raw email headers
Hosted Records
Query and manage your hosted DMARC, SPF, DKIM, BIMI, and MTA-STS records directly from your AI.
Available tools
  • get_hosted_dmarc Hosted DMARC record
  • get_hosted_spf Hosted SPF record
  • get_dkim_selectors DKIM selectors
  • get_hosted_bimi Hosted BIMI record
  • get_mta_sts_policy MTA-STS policy
MSSP Partner Tools Partners only
Manage all your client accounts, members, and domain groups directly from your AI assistant.
Available tools
  • mssp_list_accounts List all sub-accounts
  • mssp_list_members List members of a sub-account
  • mssp_create_member Add a user to a sub-account
  • mssp_delete_member Remove a user
  • mssp_domain_groups Manage domain groups
Audit Logs and Forensics
Pull account activity records and dig into forensic failure reports for any failed message.
Available tools
  • get_audit_logs Account activity, logins, config changes
  • dmarc_forensic_data Failure reports for individual messages

How to connect your AI in 3 steps

PowerDMARC hosts the MCP server for you. Just grab your token, pick your AI client, and you’re done.

Using PowerDMARC through a partner or reseller? Your config snippet is pre-filled and ready to copy from your portal. Head to the MCP Tab in your dashboard to get it.

1
Get your API token

Go to API Settings in your PowerDMARC dashboard and generate or copy your token.

2
Connect your AI client

Pick your AI client below. Some support one-click UI setup, others need a quick config snippet.

3
Test the connection

Ask your AI: “Check my DMARC setup.” If you see live data, you’re connected.

Select Your AI Client

Config file location
Configuration snippet
json
 

Frequently Asked Questions

PowerDMARC MCP — FAQ
Do I need to know how to code?
No. Most popular AI clients like Claude and Cursor let you add MCP servers directly through their settings UI. For others, it is a simple copy-paste of a config snippet. No terminal skills required.
What data does my AI get access to?
Only the data tied to your API token permissions. Your AI cannot access anything outside your account scope. You control the token, you control the access.
Does it work with ChatGPT?
Yes, it works with ChatGPT and any other AI assistant that supports the Model Context Protocol. If your client has an MCP config file, it works with PowerDMARC.
Is there a usage limit?
Standard plans include up to 60 tool calls per minute, which is more than enough for interactive use. Enterprise customers can request higher rate limits.

Ready to Connect Your AI?

Stop context-switching. Start asking.

Connect your AI to PowerDMARC in under two minutes and query your email security data the way you already work.