SpoofCheck
🇫🇷Free email security analysis

Results for remaxcentre.ca

73B
This domain is vulnerable to spoofing

SPF

OK
v=spf1 ip4:162.212.233.50 ip4:67.227.87.245 ip4:216.169.99.81 ip4:199.243.173.138 ip4:216.221.82.22 ip4:216.75.169.173 ip4:70.28.73.41 ip4:142.112.18.46 ip4:70.28.59.88 ip4:142.116.44.249 ip4:69.17.142.138 ip4:72.38.134.26 ip4:209.146.166.34 ip4:184.94.52.186 ip4:70.28.73.40 ip4:72.138.156.254 ip4:207.210.37.52 ip4:65.110.168.224 ip4:209.226.79.138 include:spf.protection.outlook.com -all

DKIM

OK
Selectors: selector1

DMARC

Warning
v=DMARC1; p=none; rua=mailto:it@remaxcentre.ca;
Read the guide

MX

OK
remaxcentre-ca.mail.protection.outlook.com

MTA-STS

Missing

No record found

Read the guide

Recommendations

  1. 1Change your DMARC policy from p=none to p=reject to block spoofing

    With p=none, your DMARC record only monitors — it doesn't actually block spoofed emails. Attackers can still send emails as your domain and they'll be delivered normally. Switching to p=reject instructs receiving servers to drop fraudulent messages before they reach the inbox.

  2. 2Add MTA-STS to enforce TLS encryption for incoming emails

    Without MTA-STS, an attacker performing a man-in-the-middle attack can downgrade the connection between mail servers to plaintext, intercepting emails in transit. MTA-STS tells sending servers to only deliver via TLS with a valid certificate, preventing downgrade attacks.

Need help securing your domain?

If you're not sure how to apply these fixes, get in touch and we'll help you out.

Contact us
Check another domain

Badge for your website

Display your email security score on your website.

SpoofCheck badge for remaxcentre.ca
<a href="https://spoofchecker.online/en/email-security/remaxcentre.ca" target="_blank" rel="noopener"><img src="https://spoofchecker.online/api/badge/remaxcentre.ca?score=73&grade=B" alt="Email security score for remaxcentre.ca" height="28"></a>