DMARC Secure
Weekly DMARC Report
Domain: example.com Period: Feb 17 – Feb 23, 2026 Generated: Feb 24, 2026
Overview
14,283
Total Emails
+8% vs prior week
96.4%
DMARC Pass
13,769 messages
514
Failed
3.6% of total
p=none
Policy
Not enforcing yet
DMARC Compliance
96.4%
Top Sending Sources
Source IP Hostname Volume SPF DKIM DMARC
198.51.100.22 mail-01.example.com 8,412 Pass Pass Pass
198.51.100.23 mail-02.example.com 3,891 Pass Pass Pass
203.0.113.50 sendgrid.net 1,466 Pass Pass Pass
192.0.2.88 unknown 301 Fail Fail Fail
192.0.2.14 unknown 213 Fail None Fail
Findings
Unauthorized senders detected
514 messages from 2 unknown IPs (192.0.2.88, 192.0.2.14) failed both SPF and DKIM. These are likely spoofing attempts or misconfigured third-party services.
DMARC policy is set to p=none
Your current policy monitors but does not reject unauthorized email. Spoofed messages are still being delivered to recipients' inboxes.
Primary mail servers fully aligned
All 3 authorized sources (mail-01, mail-02, SendGrid) pass SPF, DKIM, and DMARC. These are ready for enforcement.
Recommended Next Actions
  1. Investigate the 2 unknown sending IPs. If they are not legitimate services, no SPF/DKIM changes are needed.
    High priority
  2. Move DMARC policy to p=quarantine to start sending unauthorized mail to spam. Your authorized sources are fully passing.
    High priority
  3. After 2 weeks at p=quarantine with no issues, move to p=reject for full enforcement.
    Medium priority
  4. Review SendGrid's DKIM key rotation schedule to ensure continued alignment.
    Low priority