SpoofCheck
🇫🇷Free email security analysis

Results for ib-mayer.de

50C
This domain is vulnerable to spoofing

SPF

Warning
v=spf1 include:spf.protection.outlook.com include:spf.mail.ib-mayer.de ip4:62.204.161.60 include:spf.cloud.ci-solution.com ~all
Read the guide

DKIM

OK
Selectors: selector1

DMARC

Missing

No record found

Read the guide

MX

OK
ibmayer-de0e.mail.protection.outlook.com

MTA-STS

Missing

No record found

Read the guide

Recommendations

  1. 1Add a DMARC record: _dmarc.yourdomain TXT "v=DMARC1; p=reject; adkim=s; aspf=s; rua=mailto:dmarc@yourdomain"

    Without DMARC, receiving mail servers have no way to know what to do when SPF or DKIM checks fail. Anyone can send emails pretending to be from your domain, and most servers will deliver them. DMARC with p=reject tells receivers to block unauthorized emails entirely.

  2. 2Harden your SPF by replacing ~all with -all (hardfail)

    With ~all (softfail), unauthorized senders are flagged but emails are usually still delivered. Switching to -all (hardfail) explicitly tells receiving servers to reject emails from unauthorized sources, providing much stronger protection against spoofing.

  3. 3Add MTA-STS to enforce TLS encryption for incoming emails

    Without MTA-STS, an attacker performing a man-in-the-middle attack can downgrade the connection between mail servers to plaintext, intercepting emails in transit. MTA-STS tells sending servers to only deliver via TLS with a valid certificate, preventing downgrade attacks.

Need help securing your domain?

If you're not sure how to apply these fixes, get in touch and we'll help you out.

Contact us
Check another domain

Badge for your website

Display your email security score on your website.

SpoofCheck badge for ib-mayer.de
<a href="https://spoofchecker.online/en/email-security/ib-mayer.de" target="_blank" rel="noopener"><img src="https://spoofchecker.online/api/badge/ib-mayer.de?score=50&grade=C" alt="Email security score for ib-mayer.de" height="28"></a>