ROUTER ID
Stop the Spoofing Now
Active Threat — Most Domains Are Exposed

Someone Is Sending Fake Email From Your Domain. Here's How to Stop It.

Domain spoofing doesn't require hacking your systems. It only requires the absence of one DNS record. Your customers can receive fraudulent invoices, phishing emails, and scam messages — all appearing to come from you. We stop it.

Check If Your Domain Is Exposed — Free

No sign-up required. Results in seconds.

mark_email_unread Spoofed Email — Inbox View
From: accounts@yourdomain.com
To: your.customer@theirdomain.com
Subject: Invoice #4821 — Payment Due Today
Please find attached invoice #4821 for $14,000. Payment is due today. Please transfer to the account details below...
warning This email was NOT sent by you. DMARC p=none — not blocked.
block With DMARC p=reject — this email never reaches the inbox.

Is Your Domain Being Spoofed Right Now?

Check your DMARC, SPF, and DKIM status in seconds — no sign-up required.

How Attackers Send Email From Your Domain Without Touching Your Systems

This is not a hack. It does not require your password, your server access, or any breach of your infrastructure. It requires only the absence of a DNS record you probably don't know is missing.

1

Attacker Looks Up Your Domain

Your domain name is publicly visible. Anyone can see it. The attacker notes that your DMARC policy is p=none — or missing entirely — from your DNS records.

2

They Forge the From Address

Email's "From:" field is not verified by default. The attacker sends email from any server, setting the From address to accounts@yourdomain.com. Their server, your name.

3

Your Customer Receives It

Because your DMARC policy is p=none, receiving mail servers are instructed to deliver the email anyway. Your customer sees your domain, your logo, your name — and trusts it.

shield
With DMARC p=reject, Step 3 Never Happens

A p=reject policy instructs every receiving mail server in the world to block any email claiming to be from your domain that cannot be cryptographically verified as legitimate. The spoofed email is rejected before it reaches any inbox.

gavel Real Business Case

A Client's Customer Paid $14,000 to a Fraudulent Account. The Email Came From Our Client's Own Domain.

The email had the client's logo. The client's email address in the From field. The client's name in the signature. It looked exactly like a legitimate invoice from a trusted supplier.

The customer transferred $14,000 to a fraudulent bank account. The client's DMARC policy was p=none. The spoofed email was delivered without any warning.

The client's systems were never breached. No passwords were stolen. No servers were hacked. The attacker only needed a domain name and the absence of a DNS record.

$14,000
Fraudulent Transfer
$417
Cost to Prevent It
33×
Return on Protection

What p=reject Actually Does — In Plain Language

No jargon. Here is what changes when your DMARC policy reaches enforcement.

cancel

Before: p=none

  • close Anyone can send email from your domain
  • close Spoofed emails reach your customers' inboxes
  • close You receive reports but nothing is blocked
  • close Your domain reputation is unprotected
  • close BEC attacks can succeed without any breach
verified_user

After: p=reject

  • check_circle Only verified senders can deliver email from your domain
  • check_circle Spoofed emails are rejected before reaching any inbox
  • check_circle Every mail server in the world enforces your policy
  • check_circle Your domain reputation is protected globally
  • check_circle BEC attacks using your domain are technically impossible
$2.9B
BEC losses in 2023 (FBI IC3)
94%
of cyberattacks start with email
68%
of domains stuck at p=none
$417
one-time cost to reach p=reject
Protection That Costs Less Than One Fraudulent Invoice

One fee to stop spoofing. One low rate to keep it stopped.

One-Time Fix

Stop the Spoofing

Full audit, configuration, and safe p=reject rollout.

$417 one-time
  • check_circle Full Sender Audit
  • check_circle SPF & DKIM Hardening
  • check_circle Safe p=reject Rollout
  • check_circle Legacy Record Cleanup
Stop the Spoofing Now

Stay Protected

Continuous monitoring so protection never lapses.

$30 /month
  • check_circle Real-time Threat Alerting
  • check_circle Quarterly Health Checks
  • check_circle New Sender Authorization
  • check_circle Forensic Report Analysis
Add Monitoring
Find Out If Your Domain Is Being Spoofed — Free

We'll review your current DMARC, SPF, and DKIM setup, identify every exposure point, and tell you exactly what it takes to stop spoofing permanently.

fact_check

Comprehensive Exposure Report

Detailed findings on your domain's spoofing vulnerability, every unauthorised sender, and your path to full protection.

schedule

Results in 24 Hours

Most audits are complete within one business day. No obligation to proceed.

Most audits complete within 24 hours.

Frequently Asked Questions

How do I know if someone is spoofing my domain right now?

Use the domain scanner above — it checks your DMARC, SPF, and DKIM records in seconds. If your DMARC policy shows p=none or is missing entirely, your domain can be spoofed today. A free audit from Router ID will show you exactly what is exposed.

Will fixing this break our existing email?

Not if done correctly. Our process starts with a full audit and a monitoring phase before any enforcement. We only move to p=reject once every legitimate sender is confirmed and aligned. No legitimate email is affected.

We're a small business. Is this really necessary?

Small businesses are the primary target of BEC attacks precisely because they are less likely to have enforcement in place. The FBI reports that businesses of all sizes are affected. The cost of one fraudulent invoice typically exceeds the cost of full DMARC implementation by 30× or more.

How long does it take to stop the spoofing?

The audit is complete within 24 hours. Full p=reject enforcement — the point at which spoofing is technically blocked — typically takes 4–6 weeks. This timeline exists to ensure no legitimate email is disrupted during the transition, not because the technical work is slow.

ROUTER ID © 2026 Router ID Inc. All Rights Reserved.
DMARC Setup M365 DMARC Terms of Service
0
Skip to Content
Router ID
Solutions
Meraki
emailSecurity
Web Application Firewall
Blog
Shop Now
Router ID
Solutions
Meraki
emailSecurity
Web Application Firewall
Blog
Shop Now
Folder: Services
Back
Solutions
Folder: Solutions
Back
Meraki
emailSecurity
Web Application Firewall
Blog
Shop Now

Router ID, Inc.

Your IT business starts here.

Copyright© 2025 Router ID Inc, all rights reserved.

About

Services

Shop Now

Privacy Policy