Scam emails pointing to non-existent websites exhibit various telltale signs. Firstly, the claim of errors on a nonexistent website is a major red flag. Additionally, these emails often display poor grammar, spelling errors, and a sense of urgency. They typically request personal information and may promise unrealistic rewards. Key indicators include unusual sender addresses, inconsistent domain names, and the absence of a resolving domain. Examining email headers, domain registration dates (via WHOIS), and website history (using tools like the Wayback Machine) can reveal further inconsistencies. Generic greetings instead of personalized addressing are common. While checking for HTTPS and padlock symbols is advisable, some phishing sites now use SSL to appear legitimate. Moreover, links may redirect to fake websites using URL obfuscation, and spear phishing tactics might leverage information from social media. Always inspect URLs for misspellings or different domain extensions.
9 marketer opinions
Scam emails pointing to non-existent websites exhibit several common signs. These include poor grammar and spelling, a sense of urgency, requests for personal information, and promises that seem too good to be true. Checking the sender's email address for inconsistencies, unusual domain names, and doing a WHOIS lookup to check the domain registration date can also be helpful. Be wary of unsolicited emails asking for money or sensitive information and unusual senders. Furthermore, look for generic greetings as genuine companies will address you by name. Also, check that the domain actually resolves and isn't just a random string, and verify the website's history using the Wayback Machine. Fake websites often mimic real ones, so carefully examine the URL, contact information, and overall content for discrepancies. Even though checking for HTTPS is useful, some phishing websites now also use SSL to appear legitimate.
Marketer view
Email marketer from Reddit shares that checking the sender's email address for inconsistencies or unusual domain names is a key indicator of a scam email. They further advised checking the email headers.
9 Feb 2024 - Reddit
Marketer view
Email marketer from ScamBusters.org explains that scam emails often contain poor grammar, spelling errors, and a sense of urgency, and may request personal information.
1 Nov 2021 - ScamBusters.org
3 expert opinions
Scam emails often point to non-existent websites or contain inconsistencies that reveal their malicious intent. A primary red flag is when the email claims to have found errors on a website that doesn't even exist. Further signs include generic greetings, requests for personal information, misspelled URLs, or the use of domain extensions different from the legitimate website.
Expert view
Expert from Email Geeks explains that the email is a scam because the website they claim to have found errors in does not exist. They also send mail telling her that a non-existent website's Google ranking is bad.
24 Jun 2021 - Email Geeks
Expert view
Expert from SpamResource.com explains that phishing emails often contain generic greetings and a request for personal information, which is a red flag.
17 Jan 2024 - SpamResource.com
5 technical articles
Phishing emails, often associated with scam attempts and non-existent websites, exhibit several characteristics outlined in documentation. They frequently attempt to trick recipients into divulging sensitive information like passwords, social security numbers, or bank account details and may contain unusual attachments. Scammers often employ threats or urgency to pressure quick action, while also leveraging techniques like poor spelling, grammar, and suspicious links. While URLs may appear legitimate, they can redirect to fake websites designed for credential theft or malware installation, employing URL obfuscation. Modern phishing might use information gleaned from social media to personalize the attack (spear phishing). Though HTTPS and padlock symbols are often cited as security indicators, it's essential to recognize that some phishing sites now use SSL to appear more legitimate.
Technical article
Documentation from NIST.gov explains to check the URL for HTTPS and a padlock symbol to ensure the website is secure, but also notes that some phishing sites have started using SSL to seem more legitimate.
9 Aug 2021 - NIST.gov
Technical article
Documentation from DigitalGuardian.com explains that in spear phishing emails, the email might use information that the attacker has gathered about you from social media or other sources to appear more legitimate.
20 May 2025 - DigitalGuardian.com
Are people still falling for email scams?
Can a competitor damage my domain reputation by sending spam with links to my site?
Can a competitor damage my domain reputation by sending spam with my URL?
How are bad actors using Google Forms to send spam?
How can email senders and users prevent and identify phishing emails?
Why are emails being marked as junk or phishing in Outlook 365?