<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: live-direct-marketing</title>
    <description>The latest articles on DEV Community by live-direct-marketing (@livedirectmarketing).</description>
    <link>https://dev.to/livedirectmarketing</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3885246%2F25dc6a41-f478-485e-9e00-686f124d1060.png</url>
      <title>DEV Community: live-direct-marketing</title>
      <link>https://dev.to/livedirectmarketing</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/livedirectmarketing"/>
    <language>en</language>
    <item>
      <title>Building an Agent-Native Cold Outreach Platform: MCP, A2A, and Pay-Per-Inbox Billing</title>
      <dc:creator>live-direct-marketing</dc:creator>
      <pubDate>Fri, 08 May 2026 16:30:49 +0000</pubDate>
      <link>https://dev.to/livedirectmarketing/building-an-agent-native-cold-outreach-platform-mcp-a2a-and-pay-per-inbox-billing-l4p</link>
      <guid>https://dev.to/livedirectmarketing/building-an-agent-native-cold-outreach-platform-mcp-a2a-and-pay-per-inbox-billing-l4p</guid>
      <description>&lt;p&gt;LDM launches on Product Hunt this weekend. Sharing what's under the hood for builders.&lt;/p&gt;

&lt;h2&gt;
  
  
  The two technical bets
&lt;/h2&gt;

&lt;p&gt;Most cold email tools (Instantly, Smartlead, Lemlist, Apollo) are built UI-first. Sales teams click through onboarding, build sequences in dashboards, monitor in dashboards. The API is an afterthought. Agent integration is a webhook at best.&lt;/p&gt;

&lt;p&gt;LDM is built API-first, then UI. This let me make two unusual technical bets.&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Native MCP server, not a plugin
&lt;/h3&gt;

&lt;p&gt;&lt;code&gt;ldm-crm-mcp&lt;/code&gt; ships as an npm package. Drop it into Claude Desktop's &lt;code&gt;claude_desktop_config.json&lt;/code&gt; and the agent gets typed access to:&lt;br&gt;
contacts.create(data)&lt;br&gt;
contacts.search(query)&lt;br&gt;
pipelines.list()&lt;br&gt;
pipelines.move_card(card_id, stage_id)&lt;br&gt;
campaigns.create(spec)&lt;br&gt;
campaigns.send(id)&lt;br&gt;
dialogs.list(filter)&lt;br&gt;
dialogs.reply(dialog_id, message)&lt;br&gt;
billing.summary(period)&lt;/p&gt;

&lt;p&gt;The agent doesn't scrape a UI or call REST manually. It calls tools with typed args, gets typed results. Errors come back as proper tool-call failures, not HTTP status codes the agent has to interpret.&lt;/p&gt;

&lt;p&gt;This sounds basic but no other cold outreach platform ships an MCP server today. Smartlead, Lemlist, Instantly — all UI-first, API as afterthought, no MCP.&lt;/p&gt;
&lt;h3&gt;
  
  
  2. A2A agent card at /.well-known
&lt;/h3&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;curl https://live-direct-marketing.online/.well-known/agent-card.json
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;Returns the A2A protocol manifest — what LDM can do, how to authenticate, what tasks it accepts. Other agents can discover and delegate to LDM without any human pre-configuration.&lt;/p&gt;

&lt;p&gt;Why this matters: as agentic systems compose, agents need to discover services they don't know about. A2A is Google's proposed protocol for that. We shipped it as a default, not an add-on.&lt;/p&gt;
&lt;h2&gt;
  
  
  The pay-per-inbox methodology
&lt;/h2&gt;

&lt;p&gt;The other unusual bet — billing.&lt;/p&gt;

&lt;p&gt;Every other cold email tool charges per send. SMTP returns 250 OK, vendor charges, recipient gets it in spam folder. Up to 40% of B2B cold outreach goes to spam (Validity / GlockApps benchmarks). Customers pay for the invisible half.&lt;/p&gt;

&lt;p&gt;LDM bills only on &lt;strong&gt;verified inbox delivery&lt;/strong&gt;. Methodology:&lt;br&gt;
For each outbound message M sent at time T from sender S to provider P:&lt;/p&gt;

&lt;p&gt;Run concurrent seed test: send equivalent message to our seed mailbox&lt;br&gt;
at provider P from sender S within ±5min window of T&lt;br&gt;
Classify seed result: Inbox, Promotions, Spam, Not-received&lt;br&gt;
Bill on M only if seed verdict ∈ {Inbox, Promotions}&lt;br&gt;
If seed verdict = Spam: don't bill, log as cohort_negative&lt;br&gt;
Maintain rolling cohort accuracy per (provider, sender) pair, exposed in API&lt;/p&gt;

&lt;p&gt;Critical honesty: this is &lt;strong&gt;probabilistic, not per-message guarantee&lt;/strong&gt;. We can't see inside the recipient's mailbox. What we can do is bet our revenue that the seed cohort matches the real recipient pool within ±X% — and publish backtest data to prove it.&lt;/p&gt;

&lt;p&gt;This is why we don't promise "100% inbox guarantee". Anyone who promises that without controlling the recipient mailbox is lying. We promise: "if our seed cohort says spam, you don't pay."&lt;/p&gt;
&lt;h2&gt;
  
  
  Edge cases we don't pretend to solve
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Corporate Exchange / M365 tenants with custom rules.&lt;/strong&gt; Our seed cohort can't replicate a recipient's corporate spam policy. We mark these recipients with &lt;code&gt;cohort_confidence: low&lt;/code&gt; in the API response. We're explicit about it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Apple Mail Privacy Protection prefetches images.&lt;/strong&gt; Open-pixel data is unreliable. Opens are a UX signal in dashboard, never a billing trigger.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Engagement-based gaming.&lt;/strong&gt; We don't bill on engagement (opens, clicks, replies), so there's nothing to game. Billing is on cohort delivery — which depends on sender domain reputation, which can't be gamed.&lt;/p&gt;
&lt;h2&gt;
  
  
  The architecture
&lt;/h2&gt;

&lt;p&gt;For builders curious about the stack:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Backend&lt;/strong&gt;: NestJS + TypeScript + Prisma with multi-tenant DB-per-tenant pattern on PostgreSQL&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Workers&lt;/strong&gt;: BullMQ + Redis for queue management, separate worker pools for send / seed-test / cohort-classification / billing&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Monorepo&lt;/strong&gt;: Turborepo with &lt;code&gt;api&lt;/code&gt;, &lt;code&gt;web&lt;/code&gt;, &lt;code&gt;mcp-server&lt;/code&gt;, &lt;code&gt;agent-card&lt;/code&gt;, shared &lt;code&gt;core&lt;/code&gt; package&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Hosting&lt;/strong&gt;: EU (Netherlands), GDPR-aligned&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;MCP transport&lt;/strong&gt;: stdio (for Claude Desktop / Cursor) and HTTP-SSE (for remote agents)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AI&lt;/strong&gt;: hybrid OpenAI + Anthropic for content generation, classification, ICP discovery&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;
  
  
  Try it
&lt;/h2&gt;

&lt;p&gt;Sandbox key in one curl, no signup form:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;curl &lt;span class="nt"&gt;-X&lt;/span&gt; POST https://developers.live-direct-marketing.online/v1/signup &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;-H&lt;/span&gt; &lt;span class="s2"&gt;"Content-Type: application/json"&lt;/span&gt; &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;-d&lt;/span&gt; &lt;span class="s1"&gt;'{"email": "you@example.com"}'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Then drop into Claude Desktop config:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"mcpServers"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"ldm"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"command"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"npx"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"args"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"-y"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"ldm-crm-mcp"&lt;/span&gt;&lt;span class="p"&gt;],&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"env"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nl"&gt;"LDM_API_KEY"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"ldm_pk_..."&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Restart Claude. Ask: "show me my LDM pipelines". The agent calls the tool, you see real (empty) data.&lt;/p&gt;

&lt;h2&gt;
  
  
  What I want feedback on
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;MCP tool surface&lt;/strong&gt;: what's missing? What's awkward to call?&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Billing methodology&lt;/strong&gt;: where does the cohort approach break down beyond corporate Exchange?&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;A2A agent card schema&lt;/strong&gt;: is the manifest complete enough for cross-agent delegation?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Comments here, on Product Hunt, or DM on X.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Product Hunt launch:&lt;/strong&gt; &lt;a href="https://www.producthunt.com/products/live-direct-marketing?utm_source=devto&amp;amp;utm_medium=article" rel="noopener noreferrer"&gt;https://www.producthunt.com/products/live-direct-marketing?utm_source=devto&amp;amp;utm_medium=article&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Docs:&lt;/strong&gt; &lt;a href="https://developers.live-direct-marketing.online" rel="noopener noreferrer"&gt;https://developers.live-direct-marketing.online&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;MCP server:&lt;/strong&gt; npm package &lt;code&gt;ldm-crm-mcp&lt;/code&gt;&lt;br&gt;
Перед публикацией — три вещи проверь&lt;/p&gt;

&lt;p&gt;ldm-crm-mcp реально опубликован на npm? В памяти у меня ldm-inbox-check-mcp (из awesome-mcp-servers). Если crm-версии нет — либо публикуй пакет до dev.to-публикации, либо поменяй в статье на реальное название&lt;br&gt;
Tool surface в первой code-секции (contacts.create, pipelines.list и т.д.) — это то что реально экспортирует твой MCP сервер? Если нет — поправь под актуальные exports. dev.to-аудитория проверит и спалит несовпадение&lt;br&gt;
/.well-known/agent-card.json — он реально отдаётся? Если нет — либо подними, либо убери эту секцию из статьи&lt;/p&gt;

&lt;p&gt;Если хоть один пункт нет — лучше отложи статью на день после PH, доделаешь и опубликуешь когда всё работает. На dev.to легче перенести дату, чем чинить репутацию после "это не работает" коммента.You said: давай в формате md без таблицдавай в формате md без таблиц12:29 PMClaude responded: curl &lt;a href="https://live-direct-marketing.markdown---" rel="noopener noreferrer"&gt;https://live-direct-marketing.markdown---&lt;/a&gt;&lt;br&gt;
title: "Building an Agent-Native Cold Outreach Platform: MCP, A2A, and Pay-Per-Inbox Billing"&lt;br&gt;
published: true&lt;br&gt;
description: How we built the first cold email platform with native MCP server and A2A agent card, plus the methodology behind pay-per-inbox billing.&lt;br&gt;
tags: mcp, ai, agents, saas&lt;br&gt;
canonical_url: &lt;a href="https://live-direct-marketing.online" rel="noopener noreferrer"&gt;https://live-direct-marketing.online&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  cover_image: 
&lt;/h2&gt;

&lt;p&gt;LDM launches on Product Hunt this weekend. Sharing what's under the hood for builders.&lt;/p&gt;
&lt;h2&gt;
  
  
  The two technical bets
&lt;/h2&gt;

&lt;p&gt;Most cold email tools — Instantly, Smartlead, Lemlist, Apollo — are built UI-first. Sales teams click through onboarding, build sequences in dashboards, monitor in dashboards. The API is an afterthought. Agent integration is a webhook at best.&lt;/p&gt;

&lt;p&gt;LDM is built API-first, then UI. This let me make two unusual technical bets.&lt;/p&gt;
&lt;h3&gt;
  
  
  1. Native MCP server, not a plugin
&lt;/h3&gt;

&lt;p&gt;&lt;code&gt;ldm-crm-mcp&lt;/code&gt; ships as an npm package. Drop it into Claude Desktop's &lt;code&gt;claude_desktop_config.json&lt;/code&gt; and the agent gets typed access to operations like creating contacts, listing pipelines, moving cards between stages, building campaigns, sending them, reading dialogs, replying in threads, and pulling billing summaries.&lt;/p&gt;

&lt;p&gt;The agent doesn't scrape a UI or call REST manually. It calls tools with typed args, gets typed results. Errors come back as proper tool-call failures, not HTTP status codes the agent has to interpret.&lt;/p&gt;

&lt;p&gt;This sounds basic but no other cold outreach platform ships an MCP server today. Smartlead, Lemlist, Instantly — all UI-first, API as afterthought, no MCP.&lt;/p&gt;
&lt;h3&gt;
  
  
  2. A2A agent card at /.well-known
&lt;/h3&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;curl https://live-direct-marketing.online/.well-known/agent-card.json
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;Returns the A2A protocol manifest — what LDM can do, how to authenticate, what tasks it accepts. Other agents can discover and delegate to LDM without any human pre-configuration.&lt;/p&gt;

&lt;p&gt;Why this matters: as agentic systems compose, agents need to discover services they don't know about. A2A is Google's proposed protocol for that. We shipped it as a default, not an add-on.&lt;/p&gt;
&lt;h2&gt;
  
  
  The pay-per-inbox methodology
&lt;/h2&gt;

&lt;p&gt;The other unusual bet — billing.&lt;/p&gt;

&lt;p&gt;Every other cold email tool charges per send. SMTP returns 250 OK, vendor charges, recipient gets it in spam folder. Up to 40% of B2B cold outreach goes to spam — that's the Validity and GlockApps benchmark range. Customers pay for the invisible half.&lt;/p&gt;

&lt;p&gt;LDM bills only on verified inbox delivery. The methodology in plain English:&lt;/p&gt;

&lt;p&gt;For each outbound message at time T from sender S to provider P, we run a concurrent seed test — send an equivalent message to our seed mailbox at provider P from sender S within a five-minute window of T. The seed result gets classified as Inbox, Promotions, Spam, or Not-received. We bill on the first two outcomes only. If the seed verdict is Spam, we don't charge and we log it as cohort_negative. We maintain rolling cohort accuracy per provider-sender pair and expose it in the API.&lt;/p&gt;

&lt;p&gt;Critical honesty: this is probabilistic, not a per-message guarantee. We can't see inside the recipient's mailbox. What we can do is bet our revenue that the seed cohort matches the real recipient pool within a known error margin — and publish backtest data to prove it.&lt;/p&gt;

&lt;p&gt;This is why we don't promise "100% inbox guarantee". Anyone who promises that without controlling the recipient mailbox is lying. We promise: if our seed cohort says spam, you don't pay.&lt;/p&gt;
&lt;h2&gt;
  
  
  Edge cases we don't pretend to solve
&lt;/h2&gt;

&lt;p&gt;Corporate Exchange and M365 tenants with custom rules. Our seed cohort can't replicate a recipient's corporate spam policy. We mark these recipients with cohort_confidence: low in the API response. We're explicit about it instead of pretending it works.&lt;/p&gt;

&lt;p&gt;Apple Mail Privacy Protection prefetches images. Open-pixel data is unreliable. Opens are a UX signal in the dashboard, never a billing trigger.&lt;/p&gt;

&lt;p&gt;Engagement-based gaming. We don't bill on engagement — opens, clicks, replies — so there's nothing to game. Billing is on cohort delivery, which depends on sender domain reputation, which can't be gamed.&lt;/p&gt;
&lt;h2&gt;
  
  
  The architecture
&lt;/h2&gt;

&lt;p&gt;For builders curious about the stack: NestJS with TypeScript and Prisma on the backend, multi-tenant DB-per-tenant pattern on PostgreSQL, BullMQ on Redis for queue management with separate worker pools for send / seed-test / cohort-classification / billing. Monorepo on Turborepo with separate packages for api, web, mcp-server, agent-card, and shared core. EU-hosted in the Netherlands, GDPR-aligned. MCP transport over stdio for Claude Desktop and Cursor, plus HTTP-SSE for remote agents. AI is hybrid OpenAI plus Anthropic for content generation, classification, and ICP discovery.&lt;/p&gt;
&lt;h2&gt;
  
  
  Try it
&lt;/h2&gt;

&lt;p&gt;Sandbox key in one curl, no signup form:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;curl &lt;span class="nt"&gt;-X&lt;/span&gt; POST https://developers.live-direct-marketing.online/v1/signup &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;-H&lt;/span&gt; &lt;span class="s2"&gt;"Content-Type: application/json"&lt;/span&gt; &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;-d&lt;/span&gt; &lt;span class="s1"&gt;'{"email": "you@example.com"}'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Then drop into Claude Desktop config:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"mcpServers"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"ldm"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"command"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"npx"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"args"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"-y"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"ldm-crm-mcp"&lt;/span&gt;&lt;span class="p"&gt;],&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"env"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nl"&gt;"LDM_API_KEY"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"ldm_pk_..."&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Restart Claude. Ask "show me my LDM pipelines". The agent calls the tool, you see real (empty) data.&lt;/p&gt;

&lt;h2&gt;
  
  
  What I want feedback on
&lt;/h2&gt;

&lt;p&gt;The MCP tool surface — what's missing, what's awkward to call. The billing methodology — where the cohort approach breaks down beyond corporate Exchange. The A2A agent card schema — whether the manifest is complete enough for cross-agent delegation.&lt;/p&gt;

&lt;p&gt;Comments here, on Product Hunt, or DM on X.&lt;/p&gt;




&lt;p&gt;Product Hunt launch: &lt;a href="https://www.producthunt.com/products/live-direct-marketing?utm_source=devto&amp;amp;utm_medium=article" rel="noopener noreferrer"&gt;https://www.producthunt.com/products/live-direct-marketing?utm_source=devto&amp;amp;utm_medium=article&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Docs: &lt;a href="https://developers.live-direct-marketing.online" rel="noopener noreferrer"&gt;https://developers.live-direct-marketing.online&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;MCP server: npm package &lt;code&gt;ldm-crm-mcp&lt;/code&gt;&lt;/p&gt;

</description>
      <category>mcp</category>
      <category>a2a</category>
      <category>ai</category>
      <category>agents</category>
    </item>
    <item>
      <title>The state of email infrastructure: what 660K DNS records reveal in 2026</title>
      <dc:creator>live-direct-marketing</dc:creator>
      <pubDate>Tue, 28 Apr 2026 12:26:32 +0000</pubDate>
      <link>https://dev.to/livedirectmarketing/the-state-of-email-infrastructure-what-660k-dns-records-reveal-in-2026-l10</link>
      <guid>https://dev.to/livedirectmarketing/the-state-of-email-infrastructure-what-660k-dns-records-reveal-in-2026-l10</guid>
      <description>&lt;p&gt;The conventional wisdom is that Google Workspace and Microsoft 365 dominate business email. I pulled the DNS records of every domain in &lt;a href="https://tranco-list.eu/" rel="noopener noreferrer"&gt;Tranco top-1M&lt;/a&gt; to check.&lt;/p&gt;

&lt;p&gt;Their combined share: &lt;strong&gt;37.94%&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;The other ~62% — half a million domains — live somewhere else: hosted at registrars, in regional providers, on cPanel installs at small hosters, or on actual self-managed mail servers. The "duopoly" framing is a thing people say, not a thing the data shows.&lt;/p&gt;

&lt;p&gt;This post is about what you actually find when you build a daily DNS snapshot of email infrastructure for the entire public web, what it can and can't tell you, and what's surprisingly broken about it.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;TL;DR.&lt;/strong&gt; Daily snapshot of OpenINTEL's Tranco-1M scan, 2026-01-01. &lt;strong&gt;660,114 domains&lt;/strong&gt; publish MX, &lt;strong&gt;616,352&lt;/strong&gt; publish SPF, &lt;strong&gt;431,133&lt;/strong&gt; publish DMARC. Receiving-side share: Google 21.7%, Microsoft 16.3%, Yandex 1.9%, Mimecast 1.5%, Zoho 1.0% — and &lt;strong&gt;25.9% "Unknown"&lt;/strong&gt; plus another 24% on generic shared-hosting MX patterns. Sending-side: Amazon SES (5.86%) edged past SendGrid (4.66%) by domain count. &lt;strong&gt;20.3% of all DMARC records are &lt;code&gt;p=none&lt;/code&gt; with no reporting endpoint&lt;/strong&gt; — formal compliance, zero protection. Methodology is open and reproducible. Caveats below.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Why measure email infrastructure from DNS
&lt;/h2&gt;

&lt;p&gt;Email is the oldest still-relevant protocol on the public internet, the primary B2B channel, and one of the main attack vectors for phishing. And yet there's no good open dataset of how the ecosystem actually looks: who hosts what, who sends what, and how authentication is configured.&lt;/p&gt;

&lt;p&gt;What exists today:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Valimail's Email Fraud Landscape&lt;/strong&gt; — annual since 2017, DMARC-only, focused on industry cohorts (Fortune 500, US Gov, healthcare). Closed dataset, behind a lead form.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Academic OpenINTEL papers&lt;/strong&gt; — solid methodology, but each is a one-shot snapshot for a specific publication, not maintained.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;BuiltWith / Datanyze&lt;/strong&gt; — commercial technographics, not reproducible, not for research.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The gap: &lt;strong&gt;an open daily snapshot, across all four layers (MX, SPF, DMARC, SaaS senders), at top-1M scale, with transparent methodology.&lt;/strong&gt; That's what this is.&lt;/p&gt;

&lt;h2&gt;
  
  
  The data
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Source
&lt;/h3&gt;

&lt;p&gt;Base dataset is the daily forward-DNS snapshot from &lt;a href="https://openintel.nl/" rel="noopener noreferrer"&gt;OpenINTEL&lt;/a&gt; (University of Twente / SURFnet / SIDN Labs), running since 2015. OpenINTEL queries the entire Tranco top-1M every day for MX, TXT, NS, A, AAAA, SOA, CAA, DNSSEC records and publishes Apache Parquet. Methodology paper: &lt;a href="https://ieeexplore.ieee.org/document/7460060" rel="noopener noreferrer"&gt;van Rijswijk-Deij et al., IEEE JSAC 2016&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Domain list is &lt;a href="https://tranco-list.eu/" rel="noopener noreferrer"&gt;Tranco&lt;/a&gt; — the research-grade replacement for the deprecated Alexa list, hardened against manipulation (&lt;a href="https://tranco-list.eu/assets/tranco-ndss19.pdf" rel="noopener noreferrer"&gt;Le Pochat et al., NDSS 2019&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;For 2026-01-01: 660,114 domains have valid MX, 616,352 publish SPF (&lt;code&gt;v=spf1&lt;/code&gt;), 431,133 publish DMARC (&lt;code&gt;v=DMARC1&lt;/code&gt;).&lt;/p&gt;

&lt;h3&gt;
  
  
  Classification
&lt;/h3&gt;

&lt;p&gt;For each domain we look at four things:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="c1"&gt;# 1. Mailbox provider — primary MX target (lowest preference)
# matched against ~80 regex rules in mx_providers.py
&lt;/span&gt;&lt;span class="n"&gt;RULES&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="p"&gt;[&lt;/span&gt;
    &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;r&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;\.mail\.protection\.outlook\.com$&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Microsoft 365&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;),&lt;/span&gt;
    &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;r&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;aspmx\.l\.google\.com$|aspmx.*\.googlemail\.com$&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Google Workspace&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;),&lt;/span&gt;
    &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;r&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;mx\d?\.yandex\.net$&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Yandex 360&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;),&lt;/span&gt;
    &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;r&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;\.mimecast\.com$&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Mimecast&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;),&lt;/span&gt;
    &lt;span class="c1"&gt;# ... specific rules first, generic fallbacks last:
&lt;/span&gt;    &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;r&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;^mail\.&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Generic / unmatched (mail.*)&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;),&lt;/span&gt;
    &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;r&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;^mx\d*\.&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Generic / unmatched (mx*.*)&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;),&lt;/span&gt;
&lt;span class="p"&gt;]&lt;/span&gt;

&lt;span class="c1"&gt;# 2. ESPs — every include: in the SPF record, matched against esps.py
# (Amazon SES, SendGrid, Mailgun, Mailchimp, Brevo, etc.)
&lt;/span&gt;
&lt;span class="c1"&gt;# 3. SaaS senders — same mechanism, separate dictionary saas_senders.py
# (Shopify, Atlassian, Pardot, KnowBe4, Trustpilot, etc.)
&lt;/span&gt;
&lt;span class="c1"&gt;# 4. DMARC — _dmarc.&amp;lt;domain&amp;gt; TXT, parsed for p=, sp=, pct=, rua=
# Domain is "enforced" if p ∈ {quarantine, reject} AND pct=100
# (or pct absent — RFC 7489 §6.6.4 default is 100)
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;If no rule matches, the domain goes to "Unknown / Other" — never dropped — and its MX target is logged for the next dictionary iteration. &lt;strong&gt;Domains are never excluded.&lt;/strong&gt; Total by category = total domains, always.&lt;/p&gt;

&lt;h2&gt;
  
  
  Receiving side: who hosts inbound mail
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;#&lt;/th&gt;
&lt;th&gt;Mailbox provider&lt;/th&gt;
&lt;th&gt;Domains&lt;/th&gt;
&lt;th&gt;Share&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;Unknown / Other&lt;/td&gt;
&lt;td&gt;171,044&lt;/td&gt;
&lt;td&gt;25.91%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;Google Workspace&lt;/td&gt;
&lt;td&gt;143,171&lt;/td&gt;
&lt;td&gt;21.69%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Microsoft 365&lt;/td&gt;
&lt;td&gt;107,277&lt;/td&gt;
&lt;td&gt;16.25%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Generic / unmatched (mail.*)&lt;/td&gt;
&lt;td&gt;91,739&lt;/td&gt;
&lt;td&gt;13.90%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Generic / unmatched (mx*.*)&lt;/td&gt;
&lt;td&gt;59,783&lt;/td&gt;
&lt;td&gt;9.06%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Yandex 360&lt;/td&gt;
&lt;td&gt;12,587&lt;/td&gt;
&lt;td&gt;1.91%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;Mimecast&lt;/td&gt;
&lt;td&gt;9,850&lt;/td&gt;
&lt;td&gt;1.49%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;Generic / unmatched (smtp.*)&lt;/td&gt;
&lt;td&gt;7,649&lt;/td&gt;
&lt;td&gt;1.16%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9&lt;/td&gt;
&lt;td&gt;Zoho Mail&lt;/td&gt;
&lt;td&gt;6,800&lt;/td&gt;
&lt;td&gt;1.03%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;td&gt;Amazon WorkMail&lt;/td&gt;
&lt;td&gt;4,707&lt;/td&gt;
&lt;td&gt;0.71%&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Two observations that contradict typical industry talking points:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. The Google/Microsoft duopoly isn't dominant.&lt;/strong&gt; Combined: 37.94%. The long tail of registrar email, regional hosters, small SaaS, and self-hosted setups is &lt;strong&gt;half the market&lt;/strong&gt; (25.91% Unknown + 24.12% generic = 50.03%).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. "Generic" doesn't mean self-hosted.&lt;/strong&gt; A hostname like &lt;code&gt;mail.example.com&lt;/code&gt; is the default for cPanel/DirectAdmin shared hosting (Hostinger, GoDaddy, OVH, hundreds of regional providers). The unmatched MX targets confirm registrars dominate the long tail:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;#&lt;/th&gt;
&lt;th&gt;MX target&lt;/th&gt;
&lt;th&gt;Domains&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;route1.mx.cloudflare.net&lt;/td&gt;
&lt;td&gt;7,728&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;route2.mx.cloudflare.net&lt;/td&gt;
&lt;td&gt;7,727&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;route3.mx.cloudflare.net&lt;/td&gt;
&lt;td&gt;7,726&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;eforward5.registrar-servers.com&lt;/td&gt;
&lt;td&gt;6,930&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;mx1.hostinger.com&lt;/td&gt;
&lt;td&gt;5,110&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;smtp.secureserver.net (GoDaddy)&lt;/td&gt;
&lt;td&gt;5,078&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;mx3-hosting.jellyfish.systems&lt;/td&gt;
&lt;td&gt;2,212&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;mx1.privateemail.com (Namecheap)&lt;/td&gt;
&lt;td&gt;1,658&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Cloudflare Email Routing alone shows up on ~23,000 domains across its three MX targets. It's a free email-forwarding service with no real inbox, but as primary MX it's massive — and worth its own writeup.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Yandex 360 at 1.91%&lt;/strong&gt; looks weirdly low. It is — Tranco is biased toward US/EU and global SaaS. Russian domains with low international traffic are underrepresented. Any conclusion about the Russian email market from this dataset will be wrong; you'd need a separate &lt;code&gt;.ru&lt;/code&gt; ccTLD slice.&lt;/p&gt;

&lt;h2&gt;
  
  
  Sending side: ESPs
&lt;/h2&gt;

&lt;p&gt;Share of the 616,352 SPF-publishing domains. Sums to &amp;gt;100% — most domains authorize multiple ESPs (e.g., Mailchimp for newsletters + SendGrid for transactional):&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;#&lt;/th&gt;
&lt;th&gt;ESP&lt;/th&gt;
&lt;th&gt;Domains&lt;/th&gt;
&lt;th&gt;Share&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;Amazon SES&lt;/td&gt;
&lt;td&gt;36,148&lt;/td&gt;
&lt;td&gt;5.86%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;SendGrid (Twilio)&lt;/td&gt;
&lt;td&gt;28,695&lt;/td&gt;
&lt;td&gt;4.66%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Mailgun&lt;/td&gt;
&lt;td&gt;25,066&lt;/td&gt;
&lt;td&gt;4.07%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Zendesk&lt;/td&gt;
&lt;td&gt;24,053&lt;/td&gt;
&lt;td&gt;3.90%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Mailchimp&lt;/td&gt;
&lt;td&gt;23,606&lt;/td&gt;
&lt;td&gt;3.83%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Mandrill&lt;/td&gt;
&lt;td&gt;22,008&lt;/td&gt;
&lt;td&gt;3.57%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;Salesforce&lt;/td&gt;
&lt;td&gt;15,426&lt;/td&gt;
&lt;td&gt;2.50%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;Mailjet (Sinch)&lt;/td&gt;
&lt;td&gt;12,720&lt;/td&gt;
&lt;td&gt;2.06%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9&lt;/td&gt;
&lt;td&gt;Brevo (ex-Sendinblue)&lt;/td&gt;
&lt;td&gt;6,892&lt;/td&gt;
&lt;td&gt;1.12%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;td&gt;Elastic Email&lt;/td&gt;
&lt;td&gt;4,399&lt;/td&gt;
&lt;td&gt;0.71%&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Important caveats:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Domain count ≠ email volume.&lt;/strong&gt; Amazon SES leads by domains because it's the cheapest IaaS-tier sender — small projects pile onto it. Big mailing lists actually run on specialized platforms with worse domain counts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Mandrill is part of Mailchimp.&lt;/strong&gt; Combined Intuit MailChimp share is 7.40%, formally first. But many Mandrill SPF includes are leftover from migrations — actual usage is lower.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;All numbers are a lower bound.&lt;/strong&gt; SPF flattening — replacing &lt;code&gt;include:&lt;/code&gt; chains with raw IP networks to fit the &lt;a href="https://datatracker.ietf.org/doc/html/rfc7208#section-4.6.4" rel="noopener noreferrer"&gt;10-lookup limit (RFC 7208 §4.6.4)&lt;/a&gt; — hides the original ESP. Sample checks suggest 5–15% of larger corporate domains are flattened. If they all unflattened tomorrow, the top ESPs would gain a few percentage points.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The third layer: SaaS senders
&lt;/h2&gt;

&lt;p&gt;Business apps that send mail on behalf of their customers:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;#&lt;/th&gt;
&lt;th&gt;SaaS app&lt;/th&gt;
&lt;th&gt;Domains&lt;/th&gt;
&lt;th&gt;Share&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;Shopify&lt;/td&gt;
&lt;td&gt;5,446&lt;/td&gt;
&lt;td&gt;0.88%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;Pardot (Salesforce)&lt;/td&gt;
&lt;td&gt;5,191&lt;/td&gt;
&lt;td&gt;0.84%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;KnowBe4&lt;/td&gt;
&lt;td&gt;3,309&lt;/td&gt;
&lt;td&gt;0.54%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Trustpilot&lt;/td&gt;
&lt;td&gt;1,966&lt;/td&gt;
&lt;td&gt;0.32%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Atlassian (Jira/Confluence)&lt;/td&gt;
&lt;td&gt;1,864&lt;/td&gt;
&lt;td&gt;0.30%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Firebase (Google)&lt;/td&gt;
&lt;td&gt;1,614&lt;/td&gt;
&lt;td&gt;0.26%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;Lark / Feishu&lt;/td&gt;
&lt;td&gt;1,181&lt;/td&gt;
&lt;td&gt;0.19%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;BigCommerce&lt;/td&gt;
&lt;td&gt;1,157&lt;/td&gt;
&lt;td&gt;0.19%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9&lt;/td&gt;
&lt;td&gt;NetSuite (Oracle)&lt;/td&gt;
&lt;td&gt;1,139&lt;/td&gt;
&lt;td&gt;0.18%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;td&gt;Qualtrics&lt;/td&gt;
&lt;td&gt;1,104&lt;/td&gt;
&lt;td&gt;0.18%&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Two interesting datapoints here:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;KnowBe4 at #3 (3,309 domains).&lt;/strong&gt; KnowBe4 is security-awareness training — they send simulated phishing emails to your employees from your own domain (so the simulation is realistic). To do that, customers add KnowBe4 to their SPF. So 3,309 ≈ active KnowBe4 customer count in Tranco-1M, modulo SPF flattening. That's a public proxy metric for the security-awareness market — usually impossible to estimate without vendor reports.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Lark / Feishu at #7 (1,181 domains).&lt;/strong&gt; ByteDance's Slack competitor showing measurable Western expansion. Useful trendline candidate.&lt;/p&gt;

&lt;h2&gt;
  
  
  DMARC: the compliance theater
&lt;/h2&gt;

&lt;p&gt;431,133 domains publish DMARC = 69.95% of SPF-publishing domains. Looks great. The devil's in &lt;code&gt;pct=&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;Here are the 11 most common verbatim DMARC records:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;#&lt;/th&gt;
&lt;th&gt;DMARC record&lt;/th&gt;
&lt;th&gt;Domains&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;&lt;code&gt;v=DMARC1; p=none;&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;50,658&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;&lt;code&gt;v=DMARC1; p=none&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;32,837&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;&lt;code&gt;v=DMARC1; p=none; rua=mailto:rua@dmarc.brevo.com&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;7,172&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;&lt;code&gt;v=DMARC1; p=quarantine;&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;4,365&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;&lt;code&gt;v=DMARC1;p=none;&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;3,974&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;&lt;code&gt;v=DMARC1; p=quarantine&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;3,636&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;&lt;code&gt;v=DMARC1; p=reject; fo=1; rua=...@emaildefense.proofpoint.com; ruf=...&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;3,333&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;&lt;code&gt;v=DMARC1; p=reject;&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;3,319&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9&lt;/td&gt;
&lt;td&gt;&lt;code&gt;v=DMARC1; p=quarantine; adkim=s; aspf=s&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;2,978&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;td&gt;&lt;code&gt;v=DMARC1; p=reject&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;2,753&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11&lt;/td&gt;
&lt;td&gt;&lt;code&gt;v=DMARC1; p=none; sp=none; rua=mailto:dmarc@mailinblue.com!10m; ...&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;2,353&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Add up #1, #2, #5 — all &lt;code&gt;p=none&lt;/code&gt; with no &lt;code&gt;rua=&lt;/code&gt; — and you get &lt;strong&gt;87,469 domains, 20.3% of all DMARC records.&lt;/strong&gt; This is what I call &lt;strong&gt;DMARC compliance theater&lt;/strong&gt;: the domain "has DMARC" formally, but there's no monitoring, no enforcement, no reporting endpoint. Usually this is auto-generated by a registrar setup wizard to satisfy the &lt;a href="https://blog.google/products/gmail/gmail-security-authentication-spam-protection/" rel="noopener noreferrer"&gt;Google/Yahoo bulk sender requirements from Feb 2024&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;There's also a fun side effect of how vendors deploy DMARC at scale — their reporting endpoints are visible in DNS as fingerprints:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Brevo&lt;/strong&gt; — &lt;code&gt;rua=mailto:rua@dmarc.brevo.com&lt;/code&gt; on 7,172 domains. Brevo auto-generates this template for customers.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Proofpoint Email Defense&lt;/strong&gt; — 3,333 enterprise customers route aggregate reports through &lt;code&gt;emaildefense.proofpoint.com&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Valimail&lt;/strong&gt; — &lt;code&gt;dmarc_agg@vali.email&lt;/code&gt; on ~3,700 domains. Note: Valimail &lt;a href="https://sacra.com/research/valimail-at-30m-arr/" rel="noopener noreferrer"&gt;publicly claims 65,000 customers&lt;/a&gt; — most of them are SMBs not in Tranco top-1M.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Practical implication for your own domain:&lt;/strong&gt; counting DMARC adoption by record presence is the wrong metric. The right metric is &lt;strong&gt;enforcement rate&lt;/strong&gt; — domains with &lt;code&gt;p ∈ {quarantine, reject}&lt;/code&gt; AND &lt;code&gt;pct=100&lt;/code&gt;. By that measure, the picture is much smaller, and the trend (+1.86% over the last 90 days) is slow.&lt;/p&gt;

&lt;h2&gt;
  
  
  What this measures, and what it doesn't
&lt;/h2&gt;

&lt;p&gt;To be honest about it:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;DNS configuration ≠ email volume.&lt;/strong&gt; All numbers are domain counts. We see declarations, not actual traffic.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Tranco bias toward US/EU.&lt;/strong&gt; RU/CN/JP/KR conclusions from this dataset will be wrong; you need ccTLD-specific slices.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SPF flattening undercounts ESPs.&lt;/strong&gt; Notable for large corporate domains (5–15%).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CNAME chains on MX aren't unrolled.&lt;/strong&gt; A domain with MX &lt;code&gt;mail.example.com&lt;/code&gt; → CNAME → &lt;code&gt;example-com.mail.protection.outlook.com&lt;/code&gt; lands in "Unknown" instead of Microsoft 365. This will be fixed in the next iteration.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;DKIM isn't measured at all.&lt;/strong&gt; Reading a DKIM key requires knowing the selector (&lt;code&gt;selector1._domainkey.example.com&lt;/code&gt;), which is arbitrary. OpenINTEL doesn't query it. There's no way to get DKIM coverage at this scale without active probing.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Vanity-MX setups for security vendors&lt;/strong&gt; (Mimecast/Proofpoint customers using their own brand on the MX) are undetectable from DNS alone.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Snapshots only.&lt;/strong&gt; Trends come from snapshot diffs. ESP/MX changes between snapshots are invisible.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What you can do with this
&lt;/h2&gt;

&lt;p&gt;If you run a domain:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Audit your DMARC record.&lt;/strong&gt; If it's &lt;code&gt;v=DMARC1; p=none;&lt;/code&gt; with no &lt;code&gt;rua=&lt;/code&gt;, you're in the compliance theater bucket. Set &lt;code&gt;rua=mailto:dmarc@yourdomain.com&lt;/code&gt;, let it run for 2–4 weeks, then move to &lt;code&gt;p=quarantine; pct=10&lt;/code&gt; and ramp up. Tools: &lt;a href="https://dmarc.postmarkapp.com/" rel="noopener noreferrer"&gt;Postmark's DMARC Digests&lt;/a&gt;, &lt;a href="https://dmarcian.com/" rel="noopener noreferrer"&gt;dmarcian&lt;/a&gt;, &lt;a href="https://easydmarc.com/" rel="noopener noreferrer"&gt;EasyDMARC&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check if your SPF is flattened.&lt;/strong&gt; If your record has 30 IP networks instead of &lt;code&gt;include:&lt;/code&gt; directives, you're losing visibility for analytics and overloading every receiving resolver. Modern platforms can auto-flatten safely. Manual flattening is technical debt.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Unroll CNAMEs on your MX.&lt;/strong&gt; Doesn't affect deliverability, but improves discoverability in security audits and industry analytics.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you build email tooling:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The combined Generic + Unknown ~50% is your TAM if you're building any kind of "mailbox-as-a-service" product targeting non-Google/non-Microsoft.&lt;/li&gt;
&lt;li&gt;The KnowBe4 / Pardot / Atlassian patterns are reusable: any SaaS that sends from customer domains leaves a fingerprint in SPF. You can build adoption metrics for any vendor with a known SPF include.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you do research:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The dataset is open and reproducible. Classifier dictionaries are public. OpenINTEL has reasonable data agreements for academic use. Pull requests for missed providers/ESPs are welcome — they'll be in the next daily run.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What's next
&lt;/h2&gt;

&lt;p&gt;In rough priority order:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;CNAME unrolling for MX targets&lt;/strong&gt; — should move some "Unknown" mass into Microsoft 365 / Google Workspace and tighten the duopoly estimate.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;BIMI keys&lt;/strong&gt; (&lt;code&gt;default._bimi.&amp;lt;domain&amp;gt;&lt;/code&gt;) — the brand-indicator follow-up to DMARC. Requires &lt;code&gt;p=quarantine|reject&lt;/code&gt; with &lt;code&gt;pct=100&lt;/code&gt; plus a VMC certificate; should be a small but interesting cohort.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;MTA-STS / DANE / TLS-RPT&lt;/strong&gt; — the next layer of email security beyond authentication. OpenINTEL queries these; metrics not yet computed.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Per-ccTLD slices&lt;/strong&gt; — fix the Tranco bias for regional analyses (.ru, .cn, .de, .jp).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cross-tabs&lt;/strong&gt;: domains with &lt;code&gt;p=reject&lt;/code&gt; per ESP, DMARC adoption among Cloudflare Email Routing users, etc. — 2D slices unlock more interesting stories than 1D rankings.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Historical reconstruction back to 2017&lt;/strong&gt; — OpenINTEL has the archive; building it into a time series.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Reproducibility &amp;amp; contributions
&lt;/h2&gt;

&lt;p&gt;Each daily report ships with:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The OpenINTEL snapshot date.&lt;/li&gt;
&lt;li&gt;SHA256 hashes of &lt;code&gt;mx_providers.py&lt;/code&gt;, &lt;code&gt;esps.py&lt;/code&gt;, &lt;code&gt;saas_senders.py&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;The top-100 unmatched MX targets and SPF includes — published explicitly so anyone can suggest dictionary additions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Raw OpenINTEL Parquet is deleted after analysis (per their data agreement); only aggregates persist.&lt;/p&gt;

&lt;p&gt;Three classifications I already know need fixing for the next iteration:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;eforward*.registrar-servers.com  → Namecheap email forwarding (currently generic)
route*.mx.cloudflare.net         → Cloudflare Email Routing (currently unknown)
mailstore1.secureserver.net      → GoDaddy (currently unknown)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Daily snapshots: &lt;a href="https://check.live-direct-marketing.online/email-stats/" rel="noopener noreferrer"&gt;https://check.live-direct-marketing.online/email-stats/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you spot a misclassification or a missing ESP/provider, drop it in the comments or open an issue — it'll show up in tomorrow's run.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;What I'd love to know in comments:&lt;/strong&gt; are you tracking your DMARC enforcement rate? What does it look like for your stack? And if you've seen flattening hide an ESP in your own SPF, how did you debug it?&lt;/p&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;OpenINTEL — &lt;a href="https://openintel.nl/" rel="noopener noreferrer"&gt;https://openintel.nl/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Tranco list — &lt;a href="https://tranco-list.eu/" rel="noopener noreferrer"&gt;https://tranco-list.eu/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;van Rijswijk-Deij et al., "A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements", IEEE JSAC 2016&lt;/li&gt;
&lt;li&gt;Le Pochat et al., "Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation", NDSS 2019&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://datatracker.ietf.org/doc/html/rfc7489" rel="noopener noreferrer"&gt;RFC 7489&lt;/a&gt; — DMARC&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://datatracker.ietf.org/doc/html/rfc7208" rel="noopener noreferrer"&gt;RFC 7208&lt;/a&gt; — SPF&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.google/products/gmail/gmail-security-authentication-spam-protection/" rel="noopener noreferrer"&gt;Google/Yahoo bulk sender requirements (Feb 2024)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>email</category>
      <category>security</category>
      <category>devops</category>
    </item>
    <item>
      <title>Top 5 Free Email Deliverability Tools You Should Be Using in 2026</title>
      <dc:creator>live-direct-marketing</dc:creator>
      <pubDate>Sun, 19 Apr 2026 22:26:19 +0000</pubDate>
      <link>https://dev.to/livedirectmarketing/top-5-free-email-deliverability-tools-you-should-be-using-in-2026-5gil</link>
      <guid>https://dev.to/livedirectmarketing/top-5-free-email-deliverability-tools-you-should-be-using-in-2026-5gil</guid>
      <description>&lt;h1&gt;
  
  
  Top 5 Free Email Deliverability Tools You Should Be Using in 2026
&lt;/h1&gt;

&lt;p&gt;If you send cold emails, newsletters, or transactional mail — you've probably wondered: &lt;strong&gt;"Is my email actually reaching the inbox?"&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;ESPs confirm SMTP delivery (status 250), but that only means the server accepted the message. Your email could still be sitting in Spam, Promotions, or never displayed at all. Open rate tracking is unreliable thanks to Apple Mail Privacy Protection and Outlook image blocking.&lt;/p&gt;

&lt;p&gt;The only way to know for sure is to &lt;strong&gt;test placement directly&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;After 5+ years in B2B cold outreach, I've tested dozens of tools. Here are the 5 best free options in 2026 — what each does well, where it falls short, and when to use which.&lt;/p&gt;




&lt;h2&gt;
  
  
  1. Inbox Placement Test (by LDM)
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;What it does:&lt;/strong&gt; Gives you 5-7 seed addresses across Gmail, Outlook, Yahoo, Mail.ru, and Yandex. You send your test email, and see live where it lands — Inbox, Spam, or Promotions. Results stream via SSE in under 2 minutes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Free tier:&lt;/strong&gt; Unlimited tests. No signup, no credit card.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best for:&lt;/strong&gt; Quick pre-campaign checks. Covers both Western and CIS providers — the only tool on this list that tests Mail.ru and Yandex.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Also includes:&lt;/strong&gt; Full SPF, DKIM, and DMARC authentication check with actionable recommendations. REST API available for automated testing at scale.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Try it:&lt;/strong&gt; &lt;a href="https://check.live-direct-marketing.online/" rel="noopener noreferrer"&gt;check.live-direct-marketing.online&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  2. Mail-Tester
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;What it does:&lt;/strong&gt; You send an email to a unique address, and it returns a score from 1 to 10 based on spam likelihood. Checks SPF, DKIM, DMARC, blacklists, and content.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Free tier:&lt;/strong&gt; 3 tests per day.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best for:&lt;/strong&gt; Quick spam score checks and content analysis. Great UI, very beginner-friendly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Limitation:&lt;/strong&gt; Tests against a single mailbox — doesn't show per-provider placement (Gmail vs Outlook vs Yahoo). Score is helpful but doesn't tell you the actual folder.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Website:&lt;/strong&gt; &lt;a href="https://www.mail-tester.com/" rel="noopener noreferrer"&gt;mail-tester.com&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  3. MXToolbox
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;What it does:&lt;/strong&gt; Swiss army knife for email infrastructure. Checks DNS records, blacklists, SMTP diagnostics, SPF/DKIM/DMARC validation, and mail flow.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Free tier:&lt;/strong&gt; Most diagnostic tools are free. Some advanced monitoring requires a paid plan.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best for:&lt;/strong&gt; Diagnosing infrastructure problems — DNS misconfigurations, blacklist issues, MX record errors. More of a diagnostic tool than a placement tester.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Limitation:&lt;/strong&gt; Doesn't test actual inbox placement. Tells you if your setup is correct, but not where your email lands.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Website:&lt;/strong&gt; &lt;a href="https://mxtoolbox.com/" rel="noopener noreferrer"&gt;mxtoolbox.com&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  4. GlockApps
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;What it does:&lt;/strong&gt; Full inbox placement testing across major providers with detailed reports. Shows placement per provider, spam filters triggered, authentication results.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Free tier:&lt;/strong&gt; 2 free tests (lifetime, not per day). Paid plans start at $59/month.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best for:&lt;/strong&gt; Teams and agencies that need ongoing monitoring and detailed analytics. The most comprehensive paid tool in this category.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Limitation:&lt;/strong&gt; Free tier is extremely limited. Essentially a trial, not a free tool.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Website:&lt;/strong&gt; &lt;a href="https://glockapps.com/" rel="noopener noreferrer"&gt;glockapps.com&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  5. Postmark DMARC Tool
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;What it does:&lt;/strong&gt; Free DMARC monitoring. Parses DMARC aggregate reports and sends you weekly digests so you can see who's sending email from your domain and whether authentication passes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Free tier:&lt;/strong&gt; Completely free DMARC monitoring for any domain.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best for:&lt;/strong&gt; Long-term DMARC monitoring — catches unauthorized senders and authentication failures over time. Complements placement testing tools.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Limitation:&lt;/strong&gt; DMARC-only. Doesn't test inbox placement or spam scoring.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Website:&lt;/strong&gt; &lt;a href="https://dmarc.postmarkapp.com/" rel="noopener noreferrer"&gt;dmarc.postmarkapp.com&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  When to Use What
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Scenario&lt;/th&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Pre-campaign placement check&lt;/td&gt;
&lt;td&gt;Inbox Placement Test&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Quick spam score&lt;/td&gt;
&lt;td&gt;Mail-Tester&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;DNS/infrastructure diagnostics&lt;/td&gt;
&lt;td&gt;MXToolbox&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Ongoing monitoring (paid)&lt;/td&gt;
&lt;td&gt;GlockApps&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;DMARC monitoring&lt;/td&gt;
&lt;td&gt;Postmark&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CIS market (Mail.ru, Yandex)&lt;/td&gt;
&lt;td&gt;Inbox Placement Test&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  My Workflow
&lt;/h2&gt;

&lt;p&gt;Before every campaign, I run this sequence:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;MXToolbox&lt;/strong&gt; — verify DNS, SPF, DKIM, DMARC records are correct&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Inbox Placement Test&lt;/strong&gt; — send a test email, check actual folder placement across providers&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Mail-Tester&lt;/strong&gt; — get a spam score and content analysis&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Fix issues&lt;/strong&gt; — usually SPF/DKIM misconfiguration or content triggers&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Re-test&lt;/strong&gt; — confirm fixes worked before sending to the real list&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This takes about 10 minutes and has saved me from countless campaigns landing in Spam.&lt;/p&gt;




&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;Most deliverability problems are authentication issues, not content issues. Fix SPF, DKIM, and DMARC first — then worry about subject lines and copy.&lt;/p&gt;

&lt;p&gt;All five tools above are free (or have meaningful free tiers) and cover different angles. Use them together for the most complete picture.&lt;/p&gt;

&lt;p&gt;What tools are you using for deliverability? Drop a comment — always looking for new ones to test.&lt;/p&gt;

</description>
      <category>email</category>
      <category>deliverability</category>
      <category>webdev</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>How I Built a Free Inbox Placement Test with Node.js and SSE</title>
      <dc:creator>live-direct-marketing</dc:creator>
      <pubDate>Fri, 17 Apr 2026 22:30:48 +0000</pubDate>
      <link>https://dev.to/livedirectmarketing/how-i-built-a-free-inbox-placement-test-with-nodejs-and-sse-11gc</link>
      <guid>https://dev.to/livedirectmarketing/how-i-built-a-free-inbox-placement-test-with-nodejs-and-sse-11gc</guid>
      <description>&lt;h2&gt;
  
  
  The Problem
&lt;/h2&gt;

&lt;p&gt;I've been doing B2B cold outreach for 5+ years. The #1 blind spot? ESPs confirm SMTP delivery — status 250, "message accepted." But they never tell you which folder your email actually landed in.&lt;/p&gt;

&lt;p&gt;Your campaign could have a 0% open rate not because of bad copy, but because every email is sitting in Spam. And you'd never know.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Solution
&lt;/h2&gt;

&lt;p&gt;I built a free tool that answers one question: &lt;strong&gt;did my email hit Inbox, Spam, or Promotions?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Try it here: &lt;a href="https://check.live-direct-marketing.online/" rel="noopener noreferrer"&gt;https://check.live-direct-marketing.online/&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  How It Works
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;You enter your email address&lt;/li&gt;
&lt;li&gt;You get 5-7 seed addresses across Gmail, Outlook, Yahoo, Mail.ru, and Yandex&lt;/li&gt;
&lt;li&gt;You send your test email from your real mailing system&lt;/li&gt;
&lt;li&gt;Results stream in live — placement per provider + full authentication report&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Tech Stack
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Backend:&lt;/strong&gt; Node.js&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Live updates:&lt;/strong&gt; Server-Sent Events (SSE) — lightweight, no WebSocket overhead&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Folder detection:&lt;/strong&gt; IMAP connection to seed mailboxes, parsing folder placement&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Authentication parsing:&lt;/strong&gt; SPF, DKIM, DMARC results extracted from email headers&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Frontend:&lt;/strong&gt; Vanilla JS, no framework — keeps it fast&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Why SSE over WebSocket?
&lt;/h3&gt;

&lt;p&gt;For this use case SSE is a better fit. The data flows one direction: server → client. No need for bidirectional communication. SSE auto-reconnects, works through proxies, and is dead simple to implement:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight javascript"&gt;&lt;code&gt;&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;evtSource&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="k"&gt;new&lt;/span&gt; &lt;span class="nc"&gt;EventSource&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="s1"&gt;/api/test/stream?id=&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="nx"&gt;testId&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="nx"&gt;evtSource&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;onmessage&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;e&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="o"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;result&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nx"&gt;JSON&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;parse&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;e&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;data&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
  &lt;span class="nf"&gt;updateUI&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;result&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="p"&gt;};&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  IMAP Folder Detection
&lt;/h3&gt;

&lt;p&gt;The core logic connects to each seed mailbox via IMAP, searches for the test email by Message-ID, and checks which folder it landed in:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;INBOX → your email is fine&lt;/li&gt;
&lt;li&gt;[Gmail]/Spam, Junk, etc. → problem with reputation or authentication&lt;/li&gt;
&lt;li&gt;[Gmail]/Promotions → not critical, but reduces visibility&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Authentication Breakdown
&lt;/h3&gt;

&lt;p&gt;Every incoming email has authentication headers. The tool parses them and gives you a clear SPF/DKIM/DMARC status — pass, fail, or missing. This is usually the first thing to fix if you're landing in Spam.&lt;/p&gt;

&lt;h2&gt;
  
  
  What I Learned
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Mail.ru and Yandex matter&lt;/strong&gt; if you target CIS markets. Most tools ignore them.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SPF/DKIM/DMARC issues&lt;/strong&gt; are the #1 reason emails land in Spam — not content, not subject lines.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Live results&lt;/strong&gt; (SSE) make a huge UX difference vs "check back in 5 minutes."&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Try It
&lt;/h2&gt;

&lt;p&gt;Free, no signup, no credit card: &lt;a href="https://check.live-direct-marketing.online/" rel="noopener noreferrer"&gt;https://check.live-direct-marketing.online/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Feedback welcome — what providers or features should I add next?&lt;/p&gt;

</description>
      <category>email</category>
      <category>deliverability</category>
      <category>webdev</category>
      <category>opensource</category>
    </item>
  </channel>
</rss>
