How to Tell If an Email Is a Scam — 8 Red Flags (2026)
Scam emails are no longer easy to spot. AI tools have given attackers the ability to produce perfectly written, correctly branded emails that are nearly identical to the real thing. These eight red flags cut through the polish and expose the scam underneath — even when the email looks legitimate at first glance.
Quick Answer
The fastest way to tell if an email is a scam: check the actual sending email address (not just the display name), hover over any links to see where they really go, and ask whether you were expecting this email. If any link looks suspicious, copy it and check it with SafeSearchScan's URL Checker before clicking.
3.4B
Scam emails sent daily
$2.9B
Lost to email fraud in 2023
1 in 8
Employees click phishing links
Why Modern Scam Emails Are So Convincing
Ten years ago, you could spot most scam emails from the subject line — poor spelling, bizarre claims, obvious impersonation. That era is over. In 2026, AI tools let anyone generate fluent, grammatically perfect email copy in any language in seconds. Scammers use the same email marketing templates as legitimate businesses, complete with correct logos, footer boilerplate, and unsubscribe links.
The result is that the traditional advice — "look for bad spelling and grammar" — is no longer sufficient. Modern scam emails can pass a quick read without triggering any obvious red flags. The tells are now structural (sender address, link destinations, authentication headers) rather than cosmetic.
The eight red flags below focus on these structural signals — the things that remain hard to fake even with sophisticated tools.
The 8 Red Flags of a Scam Email
The sender address doesn't match the claimed company
CriticalThis is the single most reliable indicator of a scam email, and it takes five seconds to check. Look at the actual sending email address — not just the display name shown at the top. Scammers put legitimate-looking names in the display field ("PayPal Security Team") while the real sending address is something entirely different.
- •The domain after @ should match the company's real domain exactly
- •PayPal emails come from @paypal.com — not @paypal-security.com, @paypal.helpdesk.net, or @secure-paypal.com
- •Legitimate companies use their own domains — not Gmail, Outlook, or Yahoo
- •Some scam domains are very subtle: paypa1.com (lowercase L vs number 1), paypal.com.verify.net (paypal.com is a subdomain of the scammer's domain)
What to look for:
The display name is trivial to fake and means nothing. The actual sending domain is what matters.
Example:
Display name: "Amazon Order Support" | Actual address: support@amazon-order-help-desk.com
It creates extreme urgency or threatens serious consequences
CriticalManufactured urgency is the engine of email scams. It overrides your critical thinking and pushes you to act before verifying. Any email that demands immediate action under threat of consequences should make you suspicious, not compliant.
- •"Your account will be permanently deleted in 24 hours"
- •"Unusual sign-in detected — verify immediately to prevent loss of access"
- •"You have an outstanding payment — failure to respond will result in legal action"
- •"Your parcel will be returned unless you pay the customs fee by 5pm today"
- •"FINAL NOTICE — Your tax refund has been declined. Respond within 48 hours"
Common urgency tactics:
Legitimate companies do have deadlines and send reminders. The difference is that legitimate urgency is about your convenience ("renew before your subscription expires") rather than manufactured threats ("your account will be deleted for not verifying"). Real banks do not send emails threatening to arrest you.
Example:
"Your Apple ID has been compromised. Verify within 12 hours or your account will be permanently suspended."
The links go somewhere unexpected
CriticalNever click a link in a suspicious email without first checking where it actually goes. Hover your mouse over the link without clicking — the real destination URL will appear in the bottom left of your browser or email client.
The URL displayed and the URL you're being taken to are completely different things. A link can say "Click here to verify your Amazon account" and actually take you to amazon-account-verify.ru.
- •The domain doesn't match the claimed sender (paypal.com link actually goes to paypa1-secure.net)
- •The URL uses a subdomain to mimic the real domain (amazon.com.login.verify.net — note that the actual domain is verify.net)
- •The URL contains random characters, numbers, or very long strings
- •The URL uses a URL shortener (bit.ly, tinyurl) to hide the real destination
- •The URL doesn't start with https://
Signs that a link is malicious:
Copy any suspicious URL and paste it into SafeSearchScan's URL Checker to analyse the destination before visiting it.
Example:
Link text: "Verify your Barclays account" | Actual URL: barclays.account-secure-verify.com/login
It asks for information the sender shouldn't need
HighLegitimate companies already have the information they need about you. Your bank knows your full account number, your password, your date of birth, and your address — because you gave them this information when you opened your account. They never need to ask you to "confirm" or "re-enter" this information by clicking a link in an email.
- •Your full password (they will ask you to reset it, not tell them what it is)
- •Your full card number, CVV, or PIN
- •Your National Insurance or Social Security number
- •Your "verification code" that was just texted to you (this is a two-factor bypass attempt)
- •Your answers to security questions
- •Copies of your ID documents (initial account setup via secure portal is different — unsolicited requests are not)
Information that legitimate companies will never ask for via email:
If you're ever unsure whether a request is genuine, do not use the contact information in the email. Look up the company's official number and call them directly.
Example:
"To verify your identity, please reply with your date of birth and the last 4 digits of your card."
You weren't expecting it
HighThe most dangerous scam emails are the ones that feel relevant to your life — a delivery notification, a receipt for something, a bill that's overdue. Attackers know you're more likely to click if the email connects to something real.
This is why it's important to pause on any unexpected email that asks you to take action, even if it seems to concern a service you actually use. Ask yourself: was I expecting this?
- •Delivery notifications for packages you don't remember ordering
- •Invoices or receipts for purchases you didn't make
- •Password reset emails you didn't request
- •Account suspension notices out of nowhere
- •"Someone is trying to access your account" alerts
Common unexpected email pretexts:
If you receive an unexpected email about your account with a service you use, don't click the link in the email. Instead, open a new browser tab, navigate to the service's website directly by typing the address, and log in to see if there's actually an issue.
Example:
"Your DHL parcel has been held at customs. Click here to pay the £2.99 release fee."
The email headers fail authentication checks
HighEvery email carries technical routing information in its headers — a record of every server it passed through on its way to you. Legitimate companies set up email authentication records (SPF, DKIM, and DMARC) to prove their emails are genuine. Scammers frequently fail these checks.
- •SPF (Sender Policy Framework): verifies that the email was sent from a server authorised to send on behalf of the claimed domain
- •DKIM (DomainKeys Identified Mail): uses a cryptographic signature to verify the email wasn't tampered with in transit
- •DMARC: defines what should happen to emails that fail SPF or DKIM checks
What the three protocols check:
You don't need to understand the technical details — SafeSearchScan's Email Header Analyzer checks all three automatically. Paste in the raw email headers (available in every email client) and you'll see instantly whether the email passes or fails these authentication checks.
Example:
Use SafeSearchScan's Email Header Analyzer to check SPF, DKIM, and DMARC authentication on any email.
The greeting is generic, not personalised
Medium"Dear Customer", "Dear User", "Hello Account Holder", "Dear Valued Member" — your bank, your streaming service, and your email provider all know your name. Bulk scam emails are sent to millions of addresses simultaneously, which is why they use generic greetings.
Personalised scam emails (called spear phishing) do use your real name, sometimes gathered from previous data breaches or social media. So a generic greeting is a red flag, but a personalised greeting doesn't mean the email is safe.
- •Data breaches (check if your email is in a breach at SafeSearchScan's Email Breach Checker)
- •Social media profiles (your name is often public)
- •Purchased lists from underground forums
- •The first part of your email address (john.smith@email.com → "Dear John Smith")
How scammers get your name:
The absence of your name is a reliable red flag. The presence of your name is not a guarantee of legitimacy.
Example:
"Dear Customer, your account has been flagged for unusual activity. Please verify immediately."
Something about the email just feels off
MediumThis sounds vague, but your instincts are a genuine and underrated security tool. After years of using email, most people have an intuitive sense of what legitimate email from their bank, delivery company, or streaming service looks and reads like. When something deviates from that pattern — even in ways that are hard to articulate — pay attention.
- •The logo looks slightly different from usual
- •The writing style is slightly off compared to normal communications from this company
- •The email layout is different from what you normally receive
- •The email is from a company you've never actually interacted with
- •The offer or claim seems too good or too alarming to be plausible
- •The email refers to an account you don't have
Things that might trigger a feeling something is wrong:
When you feel uncertain, don't click anything. Navigate to the company's website directly, log in, and check whether the communication is genuine. Two minutes of verification is worth far more than the consequences of being wrong.
Example:
The email looks right but something feels slightly different. That feeling is worth listening to.
Check a Suspicious Link or Email Address
Found a suspicious link in an email? Check it before clicking with SafeSearchScan's free tools — no account needed.
The Most Common Email Scam Types in 2026
Parcel and delivery scams
Fake delivery notifications are among the most clicked scam emails because people are frequently expecting deliveries and react automatically. Common pretexts include unpaid customs fees, a delivery attempt requiring rescheduling, or a "security hold" on a package. The real goal is either to collect a small payment (and your card details) or to steal your account credentials on the impersonated delivery service.
Bank and financial institution impersonation
Scammers impersonate major banks, payment processors (PayPal, Stripe), and buy-now-pay-later services to steal login credentials. The email warns of "unusual activity", a "security alert", or a pending payment issue — all designed to get you to log in via the fake link. These fake login pages are increasingly sophisticated, sometimes real-time proxying the actual bank's website to capture your two-factor authentication code as well.
Tax and government impersonation
HMRC, IRS, and other tax authority impersonation emails are sent in large volumes particularly around tax season. They typically claim either that you're owed a refund (to collect your bank details) or that you owe unpaid taxes and face legal action (to collect immediate payment). Real tax authorities communicate primarily by post for important matters and never demand payment via bank transfer, gift cards, or cryptocurrency.
Business email compromise (BEC)
The most financially damaging email scam targeting businesses. Attackers impersonate executives (CEO, CFO) or vendors to instruct employees to transfer funds, change bank account details for invoice payments, or share sensitive data. Losses run into the billions annually. These emails are highly targeted, use information from LinkedIn and the company website, and often involve patient long-term infiltration of internal communications.
Romance and advance-fee fraud
These longer-form scams build a relationship over weeks or months before requesting money. The advance-fee variant (the classic "Nigerian prince" format, now far more sophisticated) promises a large sum in return for an upfront payment to cover "fees." These scams are responsible for some of the largest individual financial losses to email fraud, sometimes hundreds of thousands of pounds or dollars per victim.
Analyse Email Headers for Free
SafeSearchScan's Email Header Analyzer checks SPF, DKIM, and DMARC authentication — revealing spoofed and fraudulent emails in seconds.
Analyze Email Headers →Scam Email Checklist
Run through this whenever you receive an unexpected email
Does the sending address match the company's real domain?
Do the links in the email go where they claim? (hover to check)
Is the email creating urgency, fear, or threatening consequences?
Is it asking for information the sender should already have?
Were you expecting this communication?
Does the greeting use your real name?
Do the email headers pass SPF, DKIM, and DMARC?
Does the request make sense for the claimed sender?
One suspicious answer is enough to warrant extra caution. Don't click anything until you've verified through another channel.
Analyze Any Email Header — Free
Paste email headers to instantly see if the sender is spoofed, where it really came from, and SPF/DKIM results.
Analyze Email Headers Free →Frequently Asked Questions
Can a scam email come from a real email address?
Yes. Email spoofing lets attackers make an email appear to come from any address they choose. More concerning: cybercriminals also compromise real email accounts (by stealing credentials) and send scam emails from legitimate accounts. A familiar sender address is no guarantee the email is safe — always check the content, links, and request itself, not just who sent it.
What should I do if I receive a scam email?
Do not click any links, open attachments, or reply. Mark it as spam or phishing in your email client. If it impersonates a real company, forward it to that company's abuse or phishing address (e.g., phishing@paypal.com). In the UK, forward scam emails to report@phishing.gov.uk. In the US, forward to the FTC at spam@uce.gov. Then delete the email.
Are scam emails always asking for money?
No. Many scam emails aim to steal credentials (your username and password) rather than direct payment. They send you to a fake login page that looks like a real service (your bank, Netflix, Amazon) and capture your login details. These credential-stealing scams can be more damaging than direct payment fraud, as they give attackers ongoing access to your accounts.
How can I check if an email is in a breach database?
SafeSearchScan's Email Breach Checker lets you check any email address against known data breach databases for free. If your email address appears in a breach, scammers may already have personal information about you — which they use to craft convincing personalised scam emails.
What is the most common type of email scam in 2026?
Business email compromise (BEC) — where attackers impersonate executives or vendors to authorise fraudulent payments — is the most financially damaging category, causing billions in losses annually. For consumers, the most common are parcel delivery scams, bank impersonation, and tax refund scams. AI-generated scam emails have made all categories more convincing in recent years.
Related Articles
How to Spot a Phishing Email
9 warning signs — overlaps with scam emails
Already Clicked a Link?
Step-by-step guide for the next 60 minutes
Is This Link Safe to Click?
Five ways to check any URL before opening it
Is This Website Safe?
7 checks before entering your details
What Is Ransomware?
How scam emails lead to ransomware infection
Is This File Safe to Open?
5 checks for email attachments