Email Security Analysis of cc-desvressamer.fr

Complete verification of cc-desvressamer.fr's SPF, DKIM, DMARC, and MTA-STS records. Find out if this domain is protected against email spoofing.

Last updated: April 14, 2026

33D
This domain is vulnerable to spoofing

SPF

Warning
v=spf1 mx ip4:176.57.36.114 ip4:83.118.201.155 ~all
Read the guide

DKIM

Missing

No record found

Read the guide

DMARC

Warning
v=DMARC1; p=none
Read the guide

MX

OK
mx03.cloud.vadesecure.com, mx01.cloud.vadesecure.com, mx02.cloud.vadesecure.com, mx04.cloud.vadesecure.com

MTA-STS

Missing

No record found

Read the guide

Recommendations

  1. 1Change your DMARC policy from p=none to p=reject to block spoofing

    With p=none, your DMARC record only monitors — it doesn't actually block spoofed emails. Attackers can still send emails as your domain and they'll be delivered normally. Switching to p=reject instructs receiving servers to drop fraudulent messages before they reach the inbox.

  2. 2Add rua=mailto:dmarc@yourdomain to your DMARC to receive reports

    Without DMARC reporting (rua=), you have no visibility into who is sending email on behalf of your domain. Aggregate reports let you detect spoofing attempts, identify misconfigured legitimate senders, and confidently tighten your policy over time.

  3. 3Harden your SPF by replacing ~all with -all (hardfail)

    With ~all (softfail), unauthorized senders are flagged but emails are usually still delivered. Switching to -all (hardfail) explicitly tells receiving servers to reject emails from unauthorized sources, providing much stronger protection against spoofing.

  4. 4Enable DKIM in your email provider and add the public key to your DNS zone

    DKIM adds a cryptographic signature to your emails, proving they haven't been tampered with in transit and genuinely originated from your domain. Without it, attackers can forge emails that pass basic checks, and your legitimate emails are more likely to land in spam.

  5. 5Add MTA-STS to enforce TLS encryption for incoming emails

    Without MTA-STS, an attacker performing a man-in-the-middle attack can downgrade the connection between mail servers to plaintext, intercepting emails in transit. MTA-STS tells sending servers to only deliver via TLS with a valid certificate, preventing downgrade attacks.

Need help securing your domain?

If you're not sure how to apply these fixes, get in touch and we'll help you out.

Contact us

Run a live analysis

The results above are updated daily. For an instant check of cc-desvressamer.fr, run a live analysis.

Analyze cc-desvressamer.fr live

Guides to understand these results