Skip to content

Someone received mail allegedly from us, how do we analyse it?

Headers of the suspicious message reveal which server actually sent it, whether SPF/DKIM failed, and what the Return-Path domain is.

Try this first

  1. 1Request the full headers (View source / Show original)
  2. 2Paste into a header analyser (mha.azurewebsites.net or mxtoolbox)
  3. 3Look at Authentication-Results and Received-from
  4. 4Compare Return-Path and From domain to confirm spoofing

When to bring us in

For ongoing phishing in your name, report to the attacker's hosting provider and APWG.

See also

None of the above fits?

Describe your situation below. We pass your input plus the steps you already saw to our AI and return tailored next-step advice. If it's too risky to DIY, we'll say so.

Who are you?

For the AI question we need your email and company, so we can follow up if the AI gets stuck, and to prevent abuse.

Limited to 2 questions per hour and 5 per day, kept lean so the AI stays useful. For more, contacting us directly works better for you and us.

Or skip the DIY entirely

Our Managed IT clients do not look these things up. One point of contact, a fixed monthly price, resolved within working hours.