Results for proton.me
Analysis performed on April 15, 2026 at 02:56 PM
DKIM
OKSelectors: protonmail, protonmail3MX
OKmail.protonmail.ch, mailsec.protonmail.chMTA-STS
OKv=STSv1; id=190906205100Z;Recommendations
1Upgrade your DMARC policy from p=quarantine to p=reject for full blocking
With p=quarantine, spoofed emails are sent to spam instead of being blocked outright. Some recipients still check spam folders, and sophisticated attacks can be flagged as legitimate by users. p=reject ensures fraudulent emails never reach any folder.
2Add rua=mailto:dmarc@yourdomain to your DMARC to receive reports
Without DMARC reporting (rua=), you have no visibility into who is sending email on behalf of your domain. Aggregate reports let you detect spoofing attempts, identify misconfigured legitimate senders, and confidently tighten your policy over time.
3Harden your SPF by replacing ~all with -all (hardfail)
With ~all (softfail), unauthorized senders are flagged but emails are usually still delivered. Switching to -all (hardfail) explicitly tells receiving servers to reject emails from unauthorized sources, providing much stronger protection against spoofing.
Badge for your website
Display your email security score on your website.
<a href="https://spoofchecker.online/en/email-security/proton.me" target="_blank" rel="noopener"><img src="https://spoofchecker.online/api/badge/proton.me?score=77&grade=B" alt="Email security score for proton.me" height="28"></a>