How to Tell If an Email Is Spam: A Quick Guide

Learn to identify spam and phishing emails before they cause harm. Here are the red flags to watch for and how to verify whether an email is legitimate.

Troubleshooting

That email in your inbox looks important. But something feels off. Maybe the sender name is slightly wrong, the request seems unusual, or the urgency feels manufactured. You're right to be suspicious — distinguishing legitimate email from spam and phishing attempts is a necessary skill.

This guide covers the warning signs that indicate an email might be spam, how to verify sender authenticity, and what to do when you're not sure.

Red Flags in the Sender Address

The sender field is the first place to check. Spammers often impersonate legitimate companies, but they usually can't perfectly replicate the real sender address.

Domain Mismatches

The email claims to be from your bank, but the sender address is:

  • support@bank-secure-login.com instead of support@yourbank.com
  • amazon.orders@random-domain.net instead of @amazon.com
  • paypal-security@servicemessages.xyz instead of @paypal.com

Legitimate companies send from their own domains. Random domains or slight misspellings indicate fraud.

Display Name Tricks

Email clients show a display name alongside (or instead of) the actual email address. Spammers exploit this:

  • Display name: "Apple Support"
  • Actual address: apple-id-support@random-scam-domain.com

Always check the actual email address, not just the display name. Most email clients let you click on the sender name to reveal the real address.

Unusual Sender Patterns

Compare the sender to emails you've previously received from that organization:

  • Different domain than usual?
  • Different format (personal address vs. company address)?
  • First email ever from an organization you've never contacted?

If a "security alert" comes from a different domain than your account notifications usually do, that's suspicious.

Content Warning Signs

The email body contains clues about its legitimacy.

Urgency and Threats

Phishing relies on panic. Common pressure tactics include:

  • "Your account will be closed in 24 hours"
  • "Immediate action required"
  • "Suspicious activity detected"
  • "You must verify your information now"

Legitimate companies rarely threaten immediate consequences via email. They give you time to respond through normal channels.

Requests for Sensitive Information

Real organizations don't ask for sensitive data through email:

  • Passwords or PINs
  • Full credit card numbers
  • Social Security numbers
  • Complete account credentials

If an email asks you to reply with personal information or click a link to "verify" sensitive details, it's almost certainly fraudulent.

Generic Greetings

Legitimate organizations that have your account usually address you by name. Warning signs:

  • "Dear Customer"
  • "Dear Account Holder"
  • "Hello User"

Combined with other red flags, generic greetings suggest the sender doesn't actually know who you are.

Poor Grammar and Spelling

Many spam and phishing emails contain obvious errors:

  • Misspelled company names
  • Grammatical mistakes unusual for professional communication
  • Awkward phrasing that doesn't match how the company normally writes

Legitimate businesses proofread their email. Consistent errors suggest the email isn't from who it claims.

Suspicious Attachments

Be cautious of unexpected attachments, especially:

  • Executable files (.exe, .bat, .scr)
  • Office documents asking you to enable macros
  • ZIP files from unknown senders
  • Any attachment when you weren't expecting one

If a "bank statement" or "invoice" arrives unexpectedly, verify with the sender through official channels before opening.

Analyzing Links Before Clicking

Links in phishing emails lead to fake sites designed to steal your credentials. Examine links before clicking.

Hover to Reveal

Most email clients show the actual URL when you hover over a link. Check that:

  • The domain matches the legitimate company
  • There are no subtle misspellings (paypa1.com instead of paypal.com)
  • The URL isn't suspiciously long with random characters
  • It uses HTTPS (though scammers can use HTTPS too)

URL Shorteners

Be suspicious of shortened URLs (bit.ly, tinyurl, etc.) in emails claiming to be from businesses. Legitimate companies typically use their own domains for links in official communications.

Login Page Verification

If you click a link and land on a login page, verify you're on the real site before entering credentials:

  • Check the URL bar carefully
  • Look for the company's actual domain
  • Don't just trust the page appearance — phishing sites copy legitimate designs

When in doubt, don't use the link. Go directly to the organization's website by typing the address yourself.

Checking Sender Authentication

For technical verification, you can check whether an email passed authentication protocols.

View Email Headers

Email headers contain authentication results. To access them:

  • Gmail: Open email → Three dots → Show original
  • Outlook: Open email → Three dots → View message source
  • Apple Mail: View → Message → All Headers

Look for lines containing:

Authentication-Results:
  spf=pass
  dkim=pass
  dmarc=pass

If these show fail instead of pass, the email may not be from who it claims.

Verify the Sender's Domain

You can check whether a domain has proper email authentication set up:

If a major company's domain shows no authentication records, the email claiming to be from them is likely spoofed.

Types of Spam to Recognize

Understanding common spam types helps you identify them:

Phishing

Attempts to steal login credentials or personal information by impersonating legitimate services. Usually involves fake login pages or requests for sensitive data.

Spear Phishing

Targeted phishing that references specific details about you or your organization to seem more credible. Often appears to come from colleagues or known contacts.

Business Email Compromise

Impersonation of executives or vendors requesting wire transfers, gift card purchases, or sensitive data. Often uses email addresses that look almost correct or claims email is being sent from a personal device.

Advance Fee Fraud

Promises of money in exchange for upfront payment. Includes lottery wins you didn't enter, inheritance from unknown relatives, and investment opportunities with guaranteed returns.

Tech Support Scams

Claims your computer is infected or your account has problems, asking you to call a number or download software. Legitimate companies don't proactively contact you about computer issues.

Invoice and Payment Scams

Fake invoices for services you didn't order or requests to update payment details. Designed to get you to pay fraudulent invoices or reveal payment credentials.

What to Do With Suspicious Email

When you've identified spam or aren't sure:

Don't Engage

  • Don't click any links
  • Don't open attachments
  • Don't reply (even to unsubscribe — this confirms your address is active)
  • Don't call any phone numbers in the email

Verify Through Other Channels

If the email might be legitimate but you're uncertain:

  • Contact the company directly using contact information from their official website (not from the email)
  • Log into your account directly by typing the URL rather than clicking links
  • Call the person who allegedly sent the email using a known phone number

Report and Delete

  • Mark as spam in your email client (helps train filters)
  • Report phishing if your email provider has that option
  • Delete the email
  • If you've already clicked links or provided information, change passwords immediately and monitor accounts

Company Impersonation

If someone is impersonating a specific company:

  • Forward the email to their abuse or security team (often abuse@company.com or security@company.com)
  • Report to the FTC at reportfraud.ftc.gov
  • Report to the Anti-Phishing Working Group at reportphishing@apwg.org

When Legitimate Email Looks Like Spam

Sometimes real email triggers your suspicion:

  • Legitimate marketing from a new sender
  • Transactional email from an unfamiliar service (behind a platform you use)
  • Automated emails with unusual formatting

In these cases, verify through official channels before engaging. It's better to miss a legitimate email temporarily than to fall for a scam.

Stop Worrying About Email Deliverability

The Email Deliverability Suite monitors your SPF, DKIM, DMARC, MX records and blacklist status daily. Get alerts when something breaks — before your emails stop arriving.

Monitor everything, automatically

SPF, DKIM, DMARC, MX, and blacklist monitoring for unlimited domains. $39/month.