Unexpected DMARC Reports Flood emvdmarc[.]com After Domain Acquisition

December 1, 2025

After acquiring emvdmarc[.]com, DMARC reports from 12 unrelated organizations started arriving, highlighting potential misconfigurations or routing issues.

Unexpected DMARC Reports Flood emvdmarc[.]com After Domain Acquisition

We recently purchased the domain emvdmarc[.]com, and after configuring a catch all mailbox, we started receiving DMARC aggregate reports for random domains.

Within a few days, we received reports for 12 organizations, and we haven’t been able to determine who previously owned emvdmarc[.]com AND why email addresses under this domain are still being used as reporting endpoints.

BECAUSE none of the domains whose reports we’re receiving list an @emvdmarc[.]com address in their current DMARC policy.

My guess is that some routing rules are still in place, causing certain reporters to forward DMARC XML to @emvdmarc[.]com. But the question is why only a subset of reporters continue sending reports to these addresses.

If anyone can help identify & tag the previous owner or if you can share this post to help surface the right contact, we're happy to facilitate the domain transfer back to the appropriate party.

Related posts
All posts
Google.com Scam Sent via Gmail API - DMARC Passed, No Account Compromise

A scam email sent from @google.com passed SPF, DKIM, and DMARC without a compromised account. Here’s what it reveals about modern email threats.

Google.com Scam Sent via Gmail API - DMARC Passed, No Account Compromise
When Vendors Control Your DNS: A Hidden DMARC Security Risk

A real-world example of how third-party DNS control can silently block DMARC visibility, redirect domain telemetry, and introduce serious email security and data exposure risks.

When Vendors Control Your DNS: A Hidden DMARC Security Risk
2.3 million emails. One exposed API key. $10K bill.

How DMARC forensics exposed an API key leak, 2.3M unauthorized emails, and a $10K bill.

2.3 million emails. One exposed API key. $10K bill.