What Makes a Business Email Legitimate
A legitimate business email has several verifiable characteristics: it comes from a domain the business actually owns and controls, that domain has been registered for a meaningful period of time, the domain has proper email authentication records (SPF, DKIM, DMARC), and the email's content and request are consistent with normal business interactions. None of these factors alone is definitive, but together they provide a strong picture of whether an email is genuine.
Fraudulent business emails, by contrast, typically exhibit one or more of the following: a domain registered recently (often within the last few months), missing or failing email authentication, a domain name that closely resembles but does not exactly match a legitimate business, or an email address from a free provider (Gmail, Yahoo) claiming to represent a formal business entity.
The process of checking these factors has become faster and more accessible. Most of the checks described here can be completed in two to three minutes using free tools, making business email verification a realistic step before acting on any request involving money, credentials, or sensitive information.
Check 1: Verify the Sending Domain
The most important check is confirming that the email actually comes from the domain the business controls. Look at the full email address — not the display name, which can be set to anything, but the actual domain after the @ symbol. Compare this to the domain of the business's official website.
Common spoofing tactics to watch for: typosquatting (microsft.com, arnazon.com, paypa1.com), using a subdomain to obscure the real domain (amazon.com.verify-account.net — the actual domain here is verify-account.net, not amazon.com), using a legitimate domain's TLD variant (company.co instead of company.com), and appending words to a legitimate domain (paypal-security.com, microsoft-support.net).
For vendors and partners you work with regularly, maintain a list of their verified email domains. Any email from a new domain claiming to be an existing vendor — especially if it requests a payment or login action — should be verified through an independent channel before you act.
Check 2: Look Up the Domain's Age and Registration
A WHOIS lookup reveals when the domain was registered, who registered it (some registrations are private), and when it expires. Use icann.org/whois or whois.domaintools.com — both are free. A domain registered within the last 60-90 days that claims to represent an established business is a strong indicator of fraud.
Pay attention to the registrar. While there is nothing inherently wrong with any legitimate registrar, some are more commonly associated with fraudulent domain registrations. Note whether the registration information is private — most businesses use privacy protection and that alone is not suspicious, but combined with a very new domain, it reduces verifiability.
For emails from companies that should have been operating for years, a domain less than a year old is inconsistent with their claimed history. Legitimate established businesses have owned their primary domain for years, often a decade or more. A newly registered domain claiming to be a long-standing company is almost certainly fraudulent.
Check 3: Validate Email Authentication Records
Email authentication protocols — SPF, DKIM, and DMARC — allow receiving email servers to verify that a message was actually sent by an authorized server for the claimed domain. Checking these records requires looking at your email client's full message headers, which varies by client but is always accessible.
In Gmail, open the message, click the three-dot menu in the upper right, and select 'Show original.' The resulting view shows the full message headers including authentication results. Look for lines like 'dkim=pass,' 'spf=pass,' and 'dmarc=pass.' Failures in any of these — especially from domains claiming to be major financial institutions or government agencies — are strong indicators of spoofing.
MXToolbox (mxtoolbox.com) allows you to look up a domain's SPF, DKIM, and DMARC records directly. If a business domain has no DMARC record at all, it means the domain owner has not set up email authentication — which itself is unusual for a professional business operation, though not definitively fraudulent.
Check 4: Search for Fraud Reports
Search the full email address in quotation marks in a search engine. Copy just the domain and search it alongside 'phishing,' 'scam,' and 'fraud.' Use ScamAdviser (scamadviser.com) to check the domain's reputation — it aggregates signals from multiple sources to produce a trust score. PhishTank (phishtank.com) maintains a community-verified database of phishing URLs.
For email addresses claiming to represent financial institutions, the institution's official website typically lists its genuine contact addresses and often has a dedicated fraud reporting section. Cross-reference the address that contacted you against the institution's official contact list.
Deep Checker Pro's email validation checks the email against known disposable email providers, validates MX records, identifies the email provider, and checks domain metadata — providing a rapid assessment of whether the email originates from a legitimate professional infrastructure or a throwaway account designed for one-time fraudulent use.
Check 5: Verify the Request Through Independent Channels
For any business email requesting payment, credential changes, or access modifications — regardless of how legitimate it appears — verify the request through an independent channel before acting. Call the person or organization using a phone number you sourced independently (from their official website, a previous business card, or a known contact), not from the email.
This out-of-band verification is the most reliable protection against even sophisticated business email compromise attacks. It catches the case where an authentic-looking email from a real domain is actually a compromised account being used by an attacker.
Establish clear internal policies for any request involving money movement: all wire transfer requests require verbal confirmation from the requesting party, regardless of how official the email appears. Organizations that have implemented this policy as standard practice have prevented millions in losses from BEC attacks. The call takes two minutes and makes fraud essentially impossible to execute successfully.
Frequently Asked Questions
How do I see the full email headers to check authentication?
What does it mean if an email fails DMARC?
Can a legitimate business email come from Gmail or Yahoo?
What is a lookalike domain and how do I spot one?
Ready to search?
Try Deep Checker Pro free — scan 100+ platforms with no credit card required.
Get Started Free