How to Tell If an Email Is Spam: A Quick Guide
Learn to identify spam and phishing emails before they cause harm. Here are the red flags to watch for and how to verify whether an email is legitimate.
That email in your inbox looks important. But something feels off. Maybe the sender name is slightly wrong, the request seems unusual, or the urgency feels manufactured. You're right to be suspicious — distinguishing legitimate email from spam and phishing attempts is a necessary skill.
This guide covers the warning signs that indicate an email might be spam, how to verify sender authenticity, and what to do when you're not sure.
Red Flags in the Sender Address
The sender field is the first place to check. Spammers often impersonate legitimate companies, but they usually can't perfectly replicate the real sender address.
Domain Mismatches
The email claims to be from your bank, but the sender address is:
support@bank-secure-login.cominstead ofsupport@yourbank.comamazon.orders@random-domain.netinstead of@amazon.compaypal-security@servicemessages.xyzinstead of@paypal.com
Legitimate companies send from their own domains. Random domains or slight misspellings indicate fraud.
Display Name Tricks
Email clients show a display name alongside (or instead of) the actual email address. Spammers exploit this:
- Display name: "Apple Support"
- Actual address:
apple-id-support@random-scam-domain.com
Always check the actual email address, not just the display name. Most email clients let you click on the sender name to reveal the real address.
Unusual Sender Patterns
Compare the sender to emails you've previously received from that organization:
- Different domain than usual?
- Different format (personal address vs. company address)?
- First email ever from an organization you've never contacted?
If a "security alert" comes from a different domain than your account notifications usually do, that's suspicious.
Content Warning Signs
The email body contains clues about its legitimacy.
Urgency and Threats
Phishing relies on panic. Common pressure tactics include:
- "Your account will be closed in 24 hours"
- "Immediate action required"
- "Suspicious activity detected"
- "You must verify your information now"
Legitimate companies rarely threaten immediate consequences via email. They give you time to respond through normal channels.
Requests for Sensitive Information
Real organizations don't ask for sensitive data through email:
- Passwords or PINs
- Full credit card numbers
- Social Security numbers
- Complete account credentials
If an email asks you to reply with personal information or click a link to "verify" sensitive details, it's almost certainly fraudulent.
Generic Greetings
Legitimate organizations that have your account usually address you by name. Warning signs:
- "Dear Customer"
- "Dear Account Holder"
- "Hello User"
Combined with other red flags, generic greetings suggest the sender doesn't actually know who you are.
Poor Grammar and Spelling
Many spam and phishing emails contain obvious errors:
- Misspelled company names
- Grammatical mistakes unusual for professional communication
- Awkward phrasing that doesn't match how the company normally writes
Legitimate businesses proofread their email. Consistent errors suggest the email isn't from who it claims.
Suspicious Attachments
Be cautious of unexpected attachments, especially:
- Executable files (.exe, .bat, .scr)
- Office documents asking you to enable macros
- ZIP files from unknown senders
- Any attachment when you weren't expecting one
If a "bank statement" or "invoice" arrives unexpectedly, verify with the sender through official channels before opening.
Analyzing Links Before Clicking
Links in phishing emails lead to fake sites designed to steal your credentials. Examine links before clicking.
Hover to Reveal
Most email clients show the actual URL when you hover over a link. Check that:
- The domain matches the legitimate company
- There are no subtle misspellings (paypa1.com instead of paypal.com)
- The URL isn't suspiciously long with random characters
- It uses HTTPS (though scammers can use HTTPS too)
URL Shorteners
Be suspicious of shortened URLs (bit.ly, tinyurl, etc.) in emails claiming to be from businesses. Legitimate companies typically use their own domains for links in official communications.
Login Page Verification
If you click a link and land on a login page, verify you're on the real site before entering credentials:
- Check the URL bar carefully
- Look for the company's actual domain
- Don't just trust the page appearance — phishing sites copy legitimate designs
When in doubt, don't use the link. Go directly to the organization's website by typing the address yourself.
Checking Sender Authentication
For technical verification, you can check whether an email passed authentication protocols.
View Email Headers
Email headers contain authentication results. To access them:
- Gmail: Open email → Three dots → Show original
- Outlook: Open email → Three dots → View message source
- Apple Mail: View → Message → All Headers
Look for lines containing:
Authentication-Results:
spf=pass
dkim=pass
dmarc=pass
If these show fail instead of pass, the email may not be from who it claims.
Verify the Sender's Domain
You can check whether a domain has proper email authentication set up:
- Check their SPF record — legitimate businesses maintain SPF
- Check their DMARC policy — organizations protecting against impersonation use DMARC
If a major company's domain shows no authentication records, the email claiming to be from them is likely spoofed.
Types of Spam to Recognize
Understanding common spam types helps you identify them:
Phishing
Attempts to steal login credentials or personal information by impersonating legitimate services. Usually involves fake login pages or requests for sensitive data.
Spear Phishing
Targeted phishing that references specific details about you or your organization to seem more credible. Often appears to come from colleagues or known contacts.
Business Email Compromise
Impersonation of executives or vendors requesting wire transfers, gift card purchases, or sensitive data. Often uses email addresses that look almost correct or claims email is being sent from a personal device.
Advance Fee Fraud
Promises of money in exchange for upfront payment. Includes lottery wins you didn't enter, inheritance from unknown relatives, and investment opportunities with guaranteed returns.
Tech Support Scams
Claims your computer is infected or your account has problems, asking you to call a number or download software. Legitimate companies don't proactively contact you about computer issues.
Invoice and Payment Scams
Fake invoices for services you didn't order or requests to update payment details. Designed to get you to pay fraudulent invoices or reveal payment credentials.
What to Do With Suspicious Email
When you've identified spam or aren't sure:
Don't Engage
- Don't click any links
- Don't open attachments
- Don't reply (even to unsubscribe — this confirms your address is active)
- Don't call any phone numbers in the email
Verify Through Other Channels
If the email might be legitimate but you're uncertain:
- Contact the company directly using contact information from their official website (not from the email)
- Log into your account directly by typing the URL rather than clicking links
- Call the person who allegedly sent the email using a known phone number
Report and Delete
- Mark as spam in your email client (helps train filters)
- Report phishing if your email provider has that option
- Delete the email
- If you've already clicked links or provided information, change passwords immediately and monitor accounts
Company Impersonation
If someone is impersonating a specific company:
- Forward the email to their abuse or security team (often abuse@company.com or security@company.com)
- Report to the FTC at reportfraud.ftc.gov
- Report to the Anti-Phishing Working Group at reportphishing@apwg.org
When Legitimate Email Looks Like Spam
Sometimes real email triggers your suspicion:
- Legitimate marketing from a new sender
- Transactional email from an unfamiliar service (behind a platform you use)
- Automated emails with unusual formatting
In these cases, verify through official channels before engaging. It's better to miss a legitimate email temporarily than to fall for a scam.
Stop Worrying About Email Deliverability
The Email Deliverability Suite monitors your SPF, DKIM, DMARC, MX records and blacklist status daily. Get alerts when something breaks — before your emails stop arriving.
Monitor everything, automatically
SPF, DKIM, DMARC, MX, and blacklist monitoring for unlimited domains. $39/month.