How to Check If an Email Is Legitimate Before Replying

A practical checklist for verifying any suspicious email before you respond, click a link, or provide information.

5 min read · April 4, 2026

Why Email Verification Matters

Email is the primary vector for phishing, business email compromise (BEC), and impersonation fraud. The FBI's Internet Crime Complaint Center consistently ranks BEC among the highest-cost cybercrime categories, with losses totaling billions annually. The attacks range from crude mass phishing to sophisticated targeted impersonation — emails that appear to come from your CEO, a trusted vendor, or a government agency, requesting urgent action.

The tactics have grown more sophisticated alongside awareness of basic red flags. Modern phishing emails are often grammatically flawless, sent from convincing lookalike domains, and arrive in the context of ongoing business conversations that have been infiltrated. Knowing how to quickly assess an email's legitimacy is a skill every professional needs.

This checklist takes two to three minutes per email and catches the vast majority of fraudulent messages, from crude spam to targeted business email compromise attempts.

Step 1: Check the Sender's Actual Email Address

The display name in an email can say anything — 'PayPal Support,' 'Your CEO,' 'IRS Notice.' What matters is the actual email address. In most email clients, you can see the actual address by hovering over or clicking on the display name in the From field. Compare the domain of the actual address to the legitimate domain of the organization it claims to represent.

Common tactics include: using a lookalike domain (paypa1.com instead of paypal.com, microsoftonline-support.com instead of microsoft.com), using a legitimate but wrong domain (someone@amazon.co instead of @amazon.com), and using a legitimate company's domain in the display name but sending from a completely unrelated address.

For emails from people you know, check whether the address exactly matches previous correspondence. Business email compromise often uses an address that is one character different from the real one — easy to miss without looking carefully. Some attacks compromise the actual account, so even a matching address is not a guarantee if the message is requesting unusual action.

Step 2: Validate the Sending Domain

Once you have the sender's domain, check its age and legitimacy. A WHOIS lookup (use whois.domaintools.com or icann.org/whois) shows when the domain was registered. A domain registered last month that is sending urgent financial requests from an apparent Fortune 500 company is a significant red flag.

Check whether the domain has valid SPF, DKIM, and DMARC records. These are email authentication mechanisms that legitimate organizations implement. Many email clients show authentication status in message headers. An email failing DMARC authentication from a domain claiming to be a major bank or government agency is almost certainly fraudulent.

Tools like Deep Checker Pro's email validation feature check MX records, domain age, and whether an email comes from a legitimate provider or a disposable/temporary email service. Running the sender's email through such a check takes seconds and provides an objective data point about the address's legitimacy.

Step 3: Examine the Request Itself

Regardless of how convincing the sender appears, examine what the email is actually asking you to do. The following requests should always trigger heightened scrutiny, regardless of apparent source:

  • Wire transfers or cryptocurrency payments, especially urgent ones
  • Clicking a link to reset a password or verify account information
  • Providing login credentials, API keys, or other authentication information
  • Changing payment routing information (bank account numbers, ACH details)
  • Downloading and running an attachment
  • Calling a phone number to 'verify' your account

Legitimate organizations virtually never request credentials, payment routing changes, or large wire transfers exclusively via email. If a request seems unusual given your normal relationship with the apparent sender, verify it through a separate channel — call a phone number you already have on file, not one provided in the email.

Step 4: Search the Email Address and Domain

Search the full email address in quotation marks in a search engine. Phishing addresses are often reported by previous victims on sites like ScamAdviser, PhishTank, Spamhaus, and community forums. If the address appears in fraud reports, that is definitive confirmation to delete the message immediately.

Search the domain alongside terms like 'phishing,' 'scam,' and 'fraud.' Search the phone number if one was provided. Scam operations often use the same infrastructure across multiple victims, meaning a search will often surface reports from others who received similar messages.

For high-stakes emails — requests from apparent executives, vendors, or financial institutions — verify by contacting the claimed sender through an independently sourced phone number or a direct in-person message. This out-of-band verification is the gold standard for confirming that an email requesting unusual action is genuine.

Step 5: If in Doubt, Do Not Act

The defining feature of fraudulent emails is urgency. 'Act immediately or your account will be suspended.' 'This offer expires today.' 'The CEO needs this wire transferred before close of business.' Urgency is manufactured to prevent you from pausing to verify.

A genuine vendor, executive, or service provider will not be damaged if you take 30 minutes to verify a request before acting on it. A genuine payment instruction will survive a phone call to confirm. Any organization that threatens consequences for basic verification is either poorly run or fraudulent.

If you work in an organization, report suspicious emails to your security or IT team rather than just deleting them. Your report may protect colleagues from the same attack. If a phishing attempt impersonates a real organization (a bank, a government agency), many organizations have abuse reporting addresses (abuse@bank.com) or official reporting channels where you can forward the message.

Frequently Asked Questions

How can I tell if a link in an email is safe to click?
Hover over the link without clicking to see the actual destination URL in your browser's status bar. The visible URL should match the legitimate domain of the organization. Check the destination domain carefully for lookalike spellings. When in doubt, navigate to the website directly by typing its URL in your browser rather than clicking the link.
What is business email compromise (BEC)?
BEC is a sophisticated scam where attackers impersonate executives, vendors, or partners to trick employees into wiring money or revealing credentials. It often involves either compromising a real email account or using a convincing lookalike address. It is the highest-dollar category of email fraud.
Can I get in trouble for clicking a phishing link?
Clicking a link can expose your device to malware or your credentials to capture, but you are not legally at fault for being targeted. If you clicked and believe your credentials or device may be compromised, change affected passwords immediately, enable two-factor authentication, and notify your IT team.
What should I do if I already replied to a suspicious email?
Do not provide any further information. If you provided any credentials, change them immediately and enable two-factor authentication. If you initiated a payment, contact your bank immediately — wire transfers can sometimes be recalled if reported within hours. Report the incident to your IT or security team.

Ready to search?

Try Deep Checker Pro free — scan 100+ platforms with no credit card required.

Get Started Free