Published November 24, 20253 min read
SPFDKIMMailqor badgedomain analysisAI analysis

How to detect phishing emails through domain analysis

Attackers rely on throwaway domains, hijacked infrastructure, and lookalike names. A disciplined domain analysis workflow lets you expose those tricks in seconds. This playbook combines manual checks, Mailqor signals, and lightweight tooling so analysts and business teams can identify risky senders before damage occurs.

Start with registrar and WHOIS context

Domain age, registrars, and privacy services reveal whether a sender deserves extra scrutiny.

  • Flag domains younger than 90 days or those registered via cryptocurrency-friendly registrars.
  • Compare WHOIS contacts to known brand records. Legitimate enterprises rarely hide behind generic privacy proxies for transactional mail.
  • Use Mailqor's WHOIS breakdown inside Gmail/Outlook to avoid juggling external tools.

Evaluate DNS hygiene

Misconfigured DNS is a telltale sign of phishing infrastructure.

  • Inspect MX records: disposable hosts or consumer ISPs are red flags for corporate messages.
  • Query TXT records to confirm SPF, DKIM, and DMARC existence. Missing authentication indicates either negligence or malicious intent.
  • Review BIMI assets or TLSA records when present; attackers typically skip them.

Compare domain spelling and homograph tricks

Visual similarity enables credential theft.

  • Use browser extensions or Mailqor's badge to surface Unicode homographs (e.g., substituting ì for i).
  • Cross-reference with your allowlist to highlight typosquats such as paypaI.com.

Analyze hosting fingerprints

Where a domain resolves tells a story.

  • Passive DNS platforms expose whether the domain previously hosted malware.
  • IP reputation feeds highlight bulletproof hosting providers favored by phishers.
  • TLS certificate data reveals copy-paste deployments when multiple phishing kits reuse letsencrypt defaults.

Feed findings back into Mailqor

Every investigation should enrich your detection system.

  • Add confirmed bad domains to Mailqor's suspicious list so badges warn employees instantly.
  • Escalate borderline domains for AI analysis; Mailqor summarizes risky traits for non-security teams.
  • Update allowlists when legitimate partners change infrastructure to avoid false alarms.

Conclusion: combine automation with analyst intuition

Domain analysis thrives on both structured data and human judgment. Mailqor's badge provides a fast triage signal, while deeper WHOIS and DNS reviews confirm whether a sender merits trust. Codify these steps into your phishing response playbook to shrink response time and empower every employee to escalate suspicious mail.

FAQ

How long should a domain exist before we trust it?
There is no universal threshold, but domains younger than 90 days deserve manual validation before approving money movement.

Can attackers fake WHOIS data?
Yes, but combining WHOIS with DNS, hosting, and badge signals exposes most impersonations.

Do lookalike domains always use Unicode?
No. Many rely on subtle typos (mailer vs. mailler). Maintain a list of critical suppliers to catch deviations quickly.

Mail checks

What Mailqor shows the moment you open an email.

finance@trusted.com

Monthly invoice approved

Verified

Mailqor confirms the domain. Proceed with your standard workflow.

support@newvendor.io

First note received

Not checked

Analysis pending—add this vendor to your watchlist.

billing@urgent-update.com

Immediate bank change request

Suspicious

Suspicious: call before making any payment changes.

Why Mailqor

Why teams use Mailqor every day

The same badge appears in Gmail and Outlook with clear actions for finance, support, and leadership.

  • Badge available in the Chrome Web Store
  • AI explanations for every anomaly