ROUTER ID
Stop the Spoofing Now
Active Threat — Most Domains Are Exposed

Someone Is Sending Fake Email From Your Domain. Here's How to Stop It.

Domain spoofing doesn't require hacking your systems. It only requires the absence of one DNS record. Your customers can receive fraudulent invoices, phishing emails, and scam messages — all appearing to come from you. We stop it.

Check If Your Domain Is Exposed — Free

No sign-up required. Results in seconds.

mark_email_unread Spoofed Email — Inbox View
From: accounts@yourdomain.com
To: your.customer@theirdomain.com
Subject: Invoice #4821 — Payment Due Today
Please find attached invoice #4821 for $14,000. Payment is due today. Please transfer to the account details below...
warning This email was NOT sent by you. DMARC p=none — not blocked.
block With DMARC p=reject — this email never reaches the inbox.

Is Your Domain Being Spoofed Right Now?

Check your DMARC, SPF, and DKIM status in seconds — no sign-up required.

How Attackers Send Email From Your Domain Without Touching Your Systems

This is not a hack. It does not require your password, your server access, or any breach of your infrastructure. It requires only the absence of a DNS record you probably don't know is missing.

1

Attacker Looks Up Your Domain

Your domain name is publicly visible. Anyone can see it. The attacker notes that your DMARC policy is p=none — or missing entirely — from your DNS records.

2

They Forge the From Address

Email's "From:" field is not verified by default. The attacker sends email from any server, setting the From address to accounts@yourdomain.com. Their server, your name.

3

Your Customer Receives It

Because your DMARC policy is p=none, receiving mail servers are instructed to deliver the email anyway. Your customer sees your domain, your logo, your name — and trusts it.

shield
With DMARC p=reject, Step 3 Never Happens

A p=reject policy instructs every receiving mail server in the world to block any email claiming to be from your domain that cannot be cryptographically verified as legitimate. The spoofed email is rejected before it reaches any inbox.

gavel Real Business Case

A Client's Customer Paid $14,000 to a Fraudulent Account. The Email Came From Our Client's Own Domain.

The email had the client's logo. The client's email address in the From field. The client's name in the signature. It looked exactly like a legitimate invoice from a trusted supplier.

The customer transferred $14,000 to a fraudulent bank account. The client's DMARC policy was p=none. The spoofed email was delivered without any warning.

The client's systems were never breached. No passwords were stolen. No servers were hacked. The attacker only needed a domain name and the absence of a DNS record.

$14,000
Fraudulent Transfer
$417
Cost to Prevent It
33×
Return on Protection

What p=reject Actually Does — In Plain Language

No jargon. Here is what changes when your DMARC policy reaches enforcement.

cancel

Before: p=none

  • close Anyone can send email from your domain
  • close Spoofed emails reach your customers' inboxes
  • close You receive reports but nothing is blocked
  • close Your domain reputation is unprotected
  • close BEC attacks can succeed without any breach
verified_user

After: p=reject

  • check_circle Only verified senders can deliver email from your domain
  • check_circle Spoofed emails are rejected before reaching any inbox
  • check_circle Every mail server in the world enforces your policy
  • check_circle Your domain reputation is protected globally
  • check_circle BEC attacks using your domain are technically impossible
$2.9B
BEC losses in 2023 (FBI IC3)
94%
of cyberattacks start with email
68%
of domains stuck at p=none
$417
one-time cost to reach p=reject
Simple, Transparent Pricing

Complete your p=reject implementation and stay protected. Choose the billing that works for you.

Pay As You Go

Setup + Monthly

Full implementation to reach p=reject, plus month-to-month continuous protection.

$30 /month

+ $417 one-time setup fee

  • check_circle Full domain DNS audit & SPF/DKIM setup
  • check_circle Gradual DMARC rollout (none → reject)
  • check_circle Monthly DMARC aggregate reports
  • check_circle Alerts for new unauthorized senders
  • check_circle Month-to-month, cancel anytime
Get Started
SAVE $90

Annual Bundle

Our most popular option. Get your complete setup and a full year of monitoring in one discounted bundle.

$687 /year

Includes Setup + 3 Months Free

  • check_circle Bundled implementation fee
  • check_circle Full domain DNS audit & SPF/DKIM setup
  • check_circle Gradual DMARC rollout (none → reject)
  • check_circle 12 full months of active monitoring
  • check_circle Priority support & policy updates
Claim 3 Months Free
Find Out If Your Domain Is Being Spoofed — Free

We'll review your current DMARC, SPF, and DKIM setup, identify every exposure point, and tell you exactly what it takes to stop spoofing permanently.

fact_check

Comprehensive Exposure Report

Detailed findings on your domain's spoofing vulnerability, every unauthorised sender, and your path to full protection.

schedule

Results in 24 Hours

Most audits are complete within one business day. No obligation to proceed.

Most audits complete within 24 hours.

Frequently Asked Questions

How do I know if someone is spoofing my domain right now?

Use the domain scanner above — it checks your DMARC, SPF, and DKIM records in seconds. If your DMARC policy shows p=none or is missing entirely, your domain can be spoofed today. A free audit from Router ID will show you exactly what is exposed.

Will fixing this break our existing email?

Not if done correctly. Our process starts with a full audit and a monitoring phase before any enforcement. We only move to p=reject once every legitimate sender is confirmed and aligned. No legitimate email is affected.

We're a small business. Is this really necessary?

Small businesses are the primary target of BEC attacks precisely because they are less likely to have enforcement in place. The FBI reports that businesses of all sizes are affected. The cost of one fraudulent invoice typically exceeds the cost of full DMARC implementation by 30× or more.

How long does it take to stop the spoofing?

The audit is complete within 24 hours. Full p=reject enforcement — the point at which spoofing is technically blocked — typically takes 4–6 weeks. This timeline exists to ensure no legitimate email is disrupted during the transition, not because the technical work is slow.

ROUTER ID © 2026 Router ID Inc. All Rights Reserved.
DMARC Setup M365 DMARC Terms of Service
0
Skip to Content
Router ID
Security Roadmap
User Protection
Blog
Shop Now
Router ID
Security Roadmap
User Protection
Blog
Shop Now
Folder: Get Started
Back
Security Roadmap
Folder: Solutions
Back
User Protection
Blog
Shop Now

Router ID, Inc.

Your IT business starts here.

Copyright© 2025 Router ID Inc, all rights reserved.

About

Services

Shop Now

Privacy Policy