GDPR Compliance

We use cookies to ensure you get the best experience on our website. By continuing, you accept our use of cookies, privacy policy and terms of service.

DMARC Forensic Reports (RUF) — Per-Email Failure Data

See Every Individual
Spoofing Attempt in Detail.

DMARC aggregate reports (RUA) tell you volumes and pass rates. Forensic reports (RUF) tell you exactly who sent a specific failing email — the sender IP, the exact headers, the subject line, the recipient address, and the reason each authentication check failed. Migomail processes RUF reports into a searchable intelligence feed.

Per-Email Failure Data Sender IP & Geolocation Full Header Analysis Searchable Intelligence Threat Alerts
DMARC Forensic Reports
Per-Email
Failure Granularity
Full
Source IP Visibility
Yes
Header & Subject Data
< 1hr
Report Processing Time
Real-Time
Threat Alerts
4.9★
Customer Rating
DMARC Forensic Report Capabilities

What RUA Reports Don't Show You —
What RUF Reports Do

DMARC aggregate reports show that 1,730 emails failed authentication last month. Forensic reports show you that one specific attacker sent 847 of those from a VPS in Eastern Europe targeting your CFO. The difference between aggregate and forensic data is the difference between statistics and intelligence.

01

Per-Email Forensic Data

Where a DMARC aggregate report tells you that 1,200 emails from IP 185.x.x.x failed DMARC last month, a forensic report gives you the complete data for each individual failing message — the exact timestamp, the sender address used, the recipient address targeted, every email header, the subject line, the DKIM failure reason, the SPF failure reason, and what the receiving server did with the message.

Individual message failure dataFull email headers includedExact timestamp per failureRecipient address per failure
02

Sender IP Geolocation & ASN

Every forensic report includes the IP address that sent the failing email. Migomail enriches this with: the geographic location (country, city), the Autonomous System (AS) name and number, the internet service provider, and whether the IP is a known VPS provider, proxy, or Tor exit node — giving you immediate context about the likely nature of the sender.

IP country and cityAS name and numberISP identificationVPS/proxy/Tor flagging
03

DKIM Failure Analysis

When DKIM fails in a forensic report, Migomail analyses the failure reason: was the signature missing (the sender did not sign at all), was the signature invalid (modified in transit or wrong key), was the selector not found (the DNS record was removed), or was the domain in the signature misaligned with the From: address? Each failure type has a different implication — missing DKIM usually means a spoofing attempt, invalid DKIM usually means message tampering.

Missing vs invalid signatureSelector validationd= alignment checkKey mismatch detection
04

SPF Failure Analysis

SPF failure in a forensic report can mean different things. Migomail classifies each SPF failure by type: hardfail (-all match — the IP is explicitly not authorised), softfail (~all — the IP is not authorised but the domain is lenient), neutral (?all — the domain does not make a claim), or none (no SPF record at all). An attacker using your domain from a completely unrelated IP will generate a hardfail — the most dangerous and clearest spoofing signal.

hardfail vs softfail classificationnone vs neutral distinctionSPF void lookup detectionEnvelope from alignment check
05

Searchable Forensic Intelligence Feed

Migomail stores and indexes every processed forensic report, making them searchable by sender IP, recipient address, subject line pattern, DKIM failure reason, date range, or any combination. This lets you investigate a specific suspected phishing campaign by searching for all forensic reports from a specific IP range, or all reports targeting a specific executive's email address.

Full-text search across all reportsFilter by IP, domain, recipient, dateSubject line pattern matchingCampaign correlation across reports
06

Threat Detection & Alerting

Migomail analyses your forensic report stream for patterns that indicate active threat activity — sudden volume spikes from a new IP, repeated targeting of specific executive addresses (CEO, CFO, finance team), use of typosquatted domains in the From: address, or high-volume phishing campaign signatures. Alerts fire in real time with the specific threat pattern and recommended action.

Volume spike detectionExecutive targeting alertsTyposquatting domain alertsCampaign pattern recognition
07

Privacy-Compliant Report Processing

DMARC forensic reports can contain personal data — recipient email addresses, message content. Many domains restrict RUF reporting or disable it entirely for privacy reasons. Migomail's forensic processing is GDPR-compliant: recipient addresses are pseudonymised by default, message body content is not stored, and retention periods are configurable. A separate privacy-preserving mode strips all personal identifiers before storage.

Recipient address pseudonymisationNo message body storageConfigurable retention periodGDPR-compliant processing mode
08

RUF + RUA Combined Dashboard

Forensic and aggregate report data are displayed in a combined dashboard — so when you see a spike in your aggregate DMARC pass rate, you can click through directly to the forensic reports for that time period and IP cluster to understand exactly what was happening. The combined view correlates aggregate statistics with individual failure evidence.

Unified RUA + RUF dashboardClick-through from aggregate to forensicIP-based correlationTimeline view across both datasets
What a Forensic Report Contains

Every Field in a DMARC RUF Report —
and What Each One Reveals About the Attack

A DMARC forensic report is delivered as an email attachment (ARF format). Migomail decodes it automatically and presents every field in a structured, searchable format. This is what a real forensic report from a phishing attempt looks like.

DMARC Forensic Report (RUF) — Decoded by Migomail
🚨 DMARC FAIL
report-date
2024-12-02T08:14:22Z — exact timestamp of the failing message
reporting-mta
gmail.com — provider that received and reported this failure
original-rcpt-to
cfo@yourclient.com — the targeted recipient
delivery-result
policy — quarantined under p=quarantine (would be rejected at p=reject)
source-ip
185.220.101.47 — the IP that sent the email
geo-location
Germany, Frankfurt — Migomail enrichment
asn
AS205100 — F3 Netze e.V. — known Tor exit node provider
ip-classification
Tor Exit Node — high-risk sender type
dkim-result
fail — reason: no DKIM signature present (attacker did not sign)
dkim-domain
— (absent) — no d= parameter in headers
spf-result
hardfail — 185.220.101.47 not in SPF record for yourbrand.com
dmarc-result
fail — both DKIM and SPF failed alignment
from-header
CEO <ceo@yourbrand.com> — attacker impersonated your CEO
subject-header
Urgent: Wire transfer approval needed today
reply-to
ceo@yourbrand-secure.net — typosquatted reply-to
received
from mail.tor-exit.example by mx.google.com — route through Tor
CLASSIFICATION: Business Email Compromise (BEC) attempt — CEO impersonation targeting CFO via Tor exit node — wire transfer social engineering
① Incident Metadata

The exact timestamp, the receiving provider, the targeted recipient address, and what the provider did with the message — delivered, quarantined, or rejected. Without forensic reports, you never know which specific addresses are being targeted.

② Source Identification

The raw IP from the report, enriched by Migomail with geolocation, ASN data, and IP classification. A Tor exit node sending email as your CEO is a high-confidence BEC signal. A misconfigured AWS Lambda function sending as your domain is a completely different problem requiring a different response.

③ Authentication Results

DKIM fail with no signature present means the attacker did not attempt to sign — they simply used your domain in the From: header without any authentication. SPF hardfail means the sending IP is explicitly not in your SPF record. Both failing together with no alignment = certain spoofing attempt.

④ Email Headers

The actual From: header, subject line, and Reply-To address from the spoofed email. This is what your customers or employees saw. The typosquatted reply-to domain (yourbrand-secure.net) is where the attacker wanted replies to go — now you know to register and block that domain.

Forensic Failure Classification

Four Types of DMARC Failure —
Each Requiring a Different Response

Not every DMARC failure in a forensic report is a phishing attack. Migomail classifies each failure by type — so you respond to the right problem with the right action, and do not raise alarms about configuration issues.

Domain Spoofing / BEC Attempt
Active threat — attacker using your domain to deceive recipients
Key Forensic Indicators
No DKIM signature + SPF hardfail
From: your domain · Source: unrelated IP
Reply-To: attacker-controlled domain
Recommended Response
Immediate alert to security team
Block source IP at firewall if persistent
Register any typosquatted reply-to domains
Escalate DMARC policy to p=reject
Misconfigured Legitimate Sender
Your own tool or platform sending without proper authentication
Key Forensic Indicators
DKIM missing · SPF softfail or neutral
Known tool IP (AWS, Google, Sendgrid)
Legitimate From: address and content
Recommended Response
Identify the sending platform from IP/ASN
Add DKIM signing to that platform
Add platform IP range to SPF record
Verify fix using test send + forensic report
Email Forwarding Failure
Legitimate email forwarded through a third-party server breaking SPF
Key Forensic Indicators
SPF fail · DKIM often still passes
Forwarding server IP in source
Original message content — not spoofing
Recommended Response
DKIM pass + alignment = DMARC still passes
If DMARC fails: check DKIM signing at source
ARC (Authenticated Received Chain) as long-term fix
No immediate threat — note and monitor
DKIM Key Rotation Failure
Your own legitimate send during a DKIM key rotation or DNS propagation gap
Key Forensic Indicators
DKIM invalid (key mismatch)
SPF pass · From: your domain
Known sending IP — legitimate content
Recommended Response
Check current DKIM key in DNS vs signing key
Verify key rotation completed fully
Investigation Workflow

From Forensic Alert to
Threat Contained — Three Steps

Migomail structures forensic report data into an actionable investigation workflow — so your security team spends time responding to threats, not decoding XML.

Step 1
Detect
Alert fires when Migomail identifies a forensic failure pattern that exceeds normal thresholds or matches a known threat signature.
Input: Forensic report stream (continuous)
Input: Baseline failure rate per source
Input: Threat signature library
New attack source alert with IP + geolocation
Executive targeting alert with recipient list
Campaign signature alert with estimated scope
Step 2
Analyse
Investigate the specific forensic reports behind the alert — full report data, source clustering, campaign timeline, and pattern context.
Input: Linked forensic reports for this alert
Input: Historical data for same source IPs
Input: Aggregate report correlation (RUA data)
Source classification (spoofing / misconfigured / forwarding)
Attack scope estimate (volume, duration, targets)
Typosquatted domains identified from Reply-To headers
Step 3
Act
Take the right action based on the classification — immediate security response for spoofing, authentication fix for misconfiguration, policy escalation for persistent threats.
Input: Classification from Step 2
Input: Current DMARC policy level
Input: Affected sender platform (if misconfigured)
Specific remediation steps per classification
DMARC policy escalation recommendation
Verification: new forensic reports confirm fix
How It Works

From DNS Record to
Searchable Threat Intelligence in 5 Steps

01
Add RUF Address
Add a ruf= tag to your DMARC record pointing to Migomail's forensic report endpoint. Migomail generates the exact record value. This single change begins forensic report collection immediately.
02
Reports Received
When a receiving mail server processes a DMARC-failing email sent using your domain, it sends a forensic report (ARF format) to your ruf= address within minutes of the event.
03
Decode & Enrich
Migomail decodes the ARF report, extracts all fields, enriches the source IP with geolocation and ASN data, and classifies the failure type (spoofing / misconfigured sender / forwarding / key rotation).
04
Index & Alert
The decoded report is indexed in the searchable forensic feed. If the failure matches a threat pattern — new IP, executive targeting, volume spike — an alert fires immediately with full report context.
05
Investigate & Act
Use the searchable forensic feed to investigate specific events, correlate across the aggregate (RUA) dashboard, and track whether your remediation actions (DKIM fix, SPF update, policy escalation) stop the failures.
RUA vs RUF — What Each Report Type Shows You

Aggregate Reports Tell You There Is a Problem.
Forensic Reports Tell You Exactly What It Is.

DMARC Aggregate (RUA)
Statistical summary · Daily reports
Number of failing emails
1,730 this month
Failing source IP
185.220.101.x range (47 IPs)
DKIM result
fail
SPF result
hardfail
Specific recipient targeted
Unknown — not in RUA
Email subject line
Unknown — not in RUA
Reply-To address used
Unknown — not in RUA
IP geolocation & ASN
Unknown — not in RUA
Attack type classification
Unknown — not in RUA
Individual message timestamps
Unknown — not in RUA
DMARC Forensic (RUF)
Per-email intelligence · Near real-time
Number of failing emails
1,730 individual reports
Failing source IP
185.220.101.47 (specific IP per message)
DKIM result
fail — no signature present (spoofing)
SPF result
hardfail — IP not in SPF record
Specific recipient targeted
cfo@yourclient.com (executive targeting)
Email subject line
"Urgent: Wire transfer approval needed"
Reply-To address used
ceo@yourbrand-secure.net (typosquat)
IP geolocation & ASN
Germany · AS205100 · Tor exit node
Attack type classification
BEC / CEO impersonation (high confidence)
Individual message timestamps
2024-12-02T08:14:22Z (each message)
Per-Email
Forensic Granularity
< 1hr
Report Processing
4 Types
Failure Classification
4.9★
Customer Rating
What Security Teams Say

From CISOs, SOC Analysts, and
IT Security Managers on Migomail

★★★★★

The forensic report data revealed something our aggregate reports completely missed: all 1,200 of the failing emails from that IP range in the previous month were targeting the same 3 people — our CEO, CFO, and Head of Finance. The RUA report showed us a volume and a source. The RUF report showed us it was a coordinated BEC campaign targeting our wire transfer approval chain. That is operationally critical intelligence that changes how we respond. We immediately briefed those three executives on phishing awareness and escalated our DMARC to p=reject within the week.

Rajan Mehrotra
CISO, Manufacturing Enterprise
★★★★★

We had been getting DMARC failures in our aggregate reports for weeks from what looked like a block of IPs in Southeast Asia. The volume was low enough that it was not triggering any alerts — maybe 40–50 failures a day. When we finally pulled the forensic reports, we saw that all 40–50 failures were targeting the same person: our Head of Procurement. Same subject line pattern ("PO approval required"), same reply-to domain (a typosquat). Low and slow BEC campaign designed to stay below volume thresholds. The forensic data caught what volume monitoring missed. That specific type of campaign — low volume, precise targeting — is invisible in aggregate reports and very visible in forensic reports.

Aditya Venkataraman
SOC Lead, Financial Services

Ready to See Every Spoofing Attempt in Forensic Detail?

Add one ruf= tag to your DMARC record. Migomail receives, decodes, enriches, and alerts on every forensic report — giving you the intelligence to identify BEC campaigns, misconfigured senders, and email-based attacks in real time.

star-1
star-2
Hero image

“Rackwave Technologies has significantly improved our marketing performance while providing reliable cloud services. We’ve been using their solutions for a while now, and the experience has been seamless, scalable, and results-driven.”

David Larry

Founder & CEO

Have a question or feedback? Fill out the form below, and we'll get back to you as soon as possible.

Sending your message…

Trusted for overall simplicity

Based on 400+ reviews with customer satisfaction on
Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot
FAQ

Frequently Asked Questions

Common questions about DMARC forensic reports (RUF).

  • What is the difference between DMARC aggregate reports (RUA) and forensic reports (RUF)?

    DMARC aggregate reports (RUA) are daily statistical summaries — they tell you the total volume of emails that passed or failed authentication from each source IP, but they do not contain any individual message data. Forensic reports (RUF) are per-email failure reports — sent near-instantly after a DMARC-failing message is processed, they contain the full headers of the specific failing message, the source IP, the DKIM and SPF failure reasons, and the recipient address. Aggregate reports tell you how many emails failed. Forensic reports tell you exactly what each failing email said and who it targeted.

  • Are DMARC forensic reports (RUF) enabled by default when I have a DMARC record?

    No. Forensic reporting requires a separate ruf= tag in your DMARC record, pointing to a reporting address that can receive ARF (Abuse Reporting Format) emails. Without a ruf= tag, your DMARC record generates aggregate reports only. Not all mailbox providers send forensic reports — Gmail does not send them at all for privacy reasons. Yahoo, Fastmail, and several others do. Migomail's forensic data therefore comes from the providers that participate in RUF reporting.

  • Does Gmail send DMARC forensic reports?

    No. Gmail does not send DMARC forensic reports (RUF) — only aggregate reports (RUA). This is a deliberate privacy decision by Google. However, forensic reports from Yahoo, Fastmail, and other participating providers still provide substantial visibility into attack patterns — since many phishing campaigns send to multiple providers simultaneously, attacks visible in Yahoo RUF reports often indicate campaigns also targeting Gmail users.

  • Are DMARC forensic reports a privacy concern?

    Yes, potentially — forensic reports can contain the recipient email address and, depending on configuration, a copy of the email body. For this reason, many privacy-conscious organisations disable forensic reporting or restrict it. Migomail addresses this with a privacy-preserving mode that pseudonymises recipient addresses before storage, does not store email body content, and applies configurable retention limits. You can also configure your ruf= tag with rf=afrf to limit report content to headers only (no body), which most providers already do by default.

  • Can I use forensic reports to identify which employees are being targeted by phishing campaigns?

    Yes — this is one of the most operationally valuable uses of forensic data. The recipient address in each forensic report shows which of your contacts or customers received the spoofed email. If you see 47 forensic reports all targeting cfo@yourdomain.com, that is a specific, targeted BEC campaign aimed at a specific executive. Aggregate reports would show only that 47 emails failed — not who they were targeting. This distinction is critical for prioritising the human response (briefing the targeted individuals) alongside the technical response.

  • What is a Business Email Compromise (BEC) attack and how do forensic reports help detect it?

    Business Email Compromise (BEC) is a type of social engineering attack where an attacker impersonates a trusted person (typically a CEO, CFO, or financial controller) to trick employees or partners into transferring money, sharing credentials, or taking other harmful actions. BEC attackers commonly spoof the victim company's email domain in the From: header. DMARC forensic reports expose BEC attempts in detail — the spoofed From: address, the target recipient, the subject line content ("Wire transfer approval needed"), and the attacker-controlled Reply-To address where responses would be directed.