How to Verify a Business Email Is Legitimate

A five-minute technical and contextual checklist for confirming any business email is genuine before you act on it.

6 min read · April 4, 2026

What Makes a Business Email Legitimate

A legitimate business email has several verifiable characteristics: it comes from a domain the business actually owns and controls, that domain has been registered for a meaningful period of time, the domain has proper email authentication records (SPF, DKIM, DMARC), and the email's content and request are consistent with normal business interactions. None of these factors alone is definitive, but together they provide a strong picture of whether an email is genuine.

Fraudulent business emails, by contrast, typically exhibit one or more of the following: a domain registered recently (often within the last few months), missing or failing email authentication, a domain name that closely resembles but does not exactly match a legitimate business, or an email address from a free provider (Gmail, Yahoo) claiming to represent a formal business entity.

The process of checking these factors has become faster and more accessible. Most of the checks described here can be completed in two to three minutes using free tools, making business email verification a realistic step before acting on any request involving money, credentials, or sensitive information.

Check 1: Verify the Sending Domain

The most important check is confirming that the email actually comes from the domain the business controls. Look at the full email address — not the display name, which can be set to anything, but the actual domain after the @ symbol. Compare this to the domain of the business's official website.

Common spoofing tactics to watch for: typosquatting (microsft.com, arnazon.com, paypa1.com), using a subdomain to obscure the real domain (amazon.com.verify-account.net — the actual domain here is verify-account.net, not amazon.com), using a legitimate domain's TLD variant (company.co instead of company.com), and appending words to a legitimate domain (paypal-security.com, microsoft-support.net).

For vendors and partners you work with regularly, maintain a list of their verified email domains. Any email from a new domain claiming to be an existing vendor — especially if it requests a payment or login action — should be verified through an independent channel before you act.

Check 2: Look Up the Domain's Age and Registration

A WHOIS lookup reveals when the domain was registered, who registered it (some registrations are private), and when it expires. Use icann.org/whois or whois.domaintools.com — both are free. A domain registered within the last 60-90 days that claims to represent an established business is a strong indicator of fraud.

Pay attention to the registrar. While there is nothing inherently wrong with any legitimate registrar, some are more commonly associated with fraudulent domain registrations. Note whether the registration information is private — most businesses use privacy protection and that alone is not suspicious, but combined with a very new domain, it reduces verifiability.

For emails from companies that should have been operating for years, a domain less than a year old is inconsistent with their claimed history. Legitimate established businesses have owned their primary domain for years, often a decade or more. A newly registered domain claiming to be a long-standing company is almost certainly fraudulent.

Check 3: Validate Email Authentication Records

Email authentication protocols — SPF, DKIM, and DMARC — allow receiving email servers to verify that a message was actually sent by an authorized server for the claimed domain. Checking these records requires looking at your email client's full message headers, which varies by client but is always accessible.

In Gmail, open the message, click the three-dot menu in the upper right, and select 'Show original.' The resulting view shows the full message headers including authentication results. Look for lines like 'dkim=pass,' 'spf=pass,' and 'dmarc=pass.' Failures in any of these — especially from domains claiming to be major financial institutions or government agencies — are strong indicators of spoofing.

MXToolbox (mxtoolbox.com) allows you to look up a domain's SPF, DKIM, and DMARC records directly. If a business domain has no DMARC record at all, it means the domain owner has not set up email authentication — which itself is unusual for a professional business operation, though not definitively fraudulent.

Check 4: Search for Fraud Reports

Search the full email address in quotation marks in a search engine. Copy just the domain and search it alongside 'phishing,' 'scam,' and 'fraud.' Use ScamAdviser (scamadviser.com) to check the domain's reputation — it aggregates signals from multiple sources to produce a trust score. PhishTank (phishtank.com) maintains a community-verified database of phishing URLs.

For email addresses claiming to represent financial institutions, the institution's official website typically lists its genuine contact addresses and often has a dedicated fraud reporting section. Cross-reference the address that contacted you against the institution's official contact list.

Deep Checker Pro's email validation checks the email against known disposable email providers, validates MX records, identifies the email provider, and checks domain metadata — providing a rapid assessment of whether the email originates from a legitimate professional infrastructure or a throwaway account designed for one-time fraudulent use.

Check 5: Verify the Request Through Independent Channels

For any business email requesting payment, credential changes, or access modifications — regardless of how legitimate it appears — verify the request through an independent channel before acting. Call the person or organization using a phone number you sourced independently (from their official website, a previous business card, or a known contact), not from the email.

This out-of-band verification is the most reliable protection against even sophisticated business email compromise attacks. It catches the case where an authentic-looking email from a real domain is actually a compromised account being used by an attacker.

Establish clear internal policies for any request involving money movement: all wire transfer requests require verbal confirmation from the requesting party, regardless of how official the email appears. Organizations that have implemented this policy as standard practice have prevented millions in losses from BEC attacks. The call takes two minutes and makes fraud essentially impossible to execute successfully.

Frequently Asked Questions

How do I see the full email headers to check authentication?
In Gmail: open the email, click the three-dot menu (top right of the message), select 'Show original.' In Outlook: open the email, click File > Properties, and look at the Internet Headers box. In Apple Mail: open the email, go to View > Message > All Headers.
What does it mean if an email fails DMARC?
A DMARC failure means the email was not sent from an authorized server for that domain. This is a strong indicator that the email is either spoofed (the sender is not who they claim) or that the domain's email infrastructure is misconfigured. Treat DMARC failures from financial institutions or companies requesting action as phishing.
Can a legitimate business email come from Gmail or Yahoo?
Very small businesses sometimes use free email providers. However, any business requesting payment, credential changes, or access to sensitive systems should be operating on a professional domain. A request from a 'company' using a free email provider for business correspondence is at minimum an unprofessionalism flag, and potentially a fraud flag.
What is a lookalike domain and how do I spot one?
A lookalike domain is a domain registered to resemble a legitimate one, used to deceive recipients. Check character by character: paypa1.com uses the numeral 1 instead of the letter l. arnazon.com transposes letters. rn together (m) can look like m in some fonts. Copy the domain and compare it carefully to the legitimate domain.

Ready to search?

Try Deep Checker Pro free — scan 100+ platforms with no credit card required.

Get Started Free