A DMARC aggregate report showing source_ip: 167.89.123.45with a DMARC failure tells you almost nothing actionable. The same record, enriched with WHOIS data, tells you: “This is a Twilio SendGrid IP — your transactional email service is sending without proper DKIM alignment.” That is the difference between a mystery and a fix.
What Is IP Enrichment?
IP enrichment is the process of augmenting a raw IP address with contextual metadata from WHOIS and RIR (Regional Internet Registry) databases. The WHOIS protocol, defined in RFC 3912, provides registration information about IP address allocations — including the organization that owns the block, the ASN (Autonomous System Number), the country of registration, and abuse contact information.
For DMARC analysis, IP enrichment turns a list of cryptic IP addresses into a readable inventory of sending services.
How WHOIS IP Lookup Works
When you query a WHOIS database for an IP address, the response includes:
- Organization name:The company or entity that registered the IP block (e.g., “Google LLC”, “Amazon.com, Inc.”, “Twilio SendGrid”)
- ASN: The Autonomous System Number — a unique identifier for a network (e.g., AS15169 = Google, AS16509 = Amazon)
- IP range (CIDR): The full IP block the address belongs to (e.g.,
209.85.128.0/17) - Country: The country where the IP block is registered
- Abuse contact: Where to report abuse from this IP range
IP enrichment in DMARC analysis queries these databases for every source_ip in the report and joins the metadata back to the record.
What Enriched DMARC Data Reveals
Known email service providers
Well-known email service providers maintain large, stable IP blocks with consistent WHOIS registrations. When you see a record from an IP belonging to “Mailchimp Inc.” or “Salesforce.com”, you immediately know which platform is responsible for those messages — and whether it has authentication configured correctly.
Forgotten third-party services
Many organizations discover sending sources in DMARC reports that they had forgotten about: a CRM integration set up by a former employee, a marketing automation tool from a previous campaign, or a legacy application that still sends transactional email. Without WHOIS enrichment, these show up as anonymous IP addresses. With enrichment, they are immediately identifiable.
Unauthorized senders and spoofing
IPs from anonymous hosting providers, residential ISPs, or foreign data centers that have no business sending email as your domain are a red flag. Enrichment helps distinguish:
- Hosting provider IPs (DigitalOcean, Vultr, Hetzner) — often malicious bots or compromised servers
- VPN/proxy exit nodes — spoofing attempts using anonymization infrastructure
- Residential ISP IPs — infected home computers in botnets trying to send spam as your domain
- Geographically unexpected IPs — traffic from regions where you have no legitimate operations
Forwarding infrastructure
Universities, corporate email gateways, and mailing list servers that re-deliver messages have their own IP ranges. Enrichment helps you identify MIT.EDU or LISTSERV.ACME.COM as the source of forwarding-related SPF failures, rather than treating them as potential threats.
DMARC IP Enrichment in Practice
Building your sender inventory
The first step in any DMARC project is building a complete inventory of authorized sending sources. IP enrichment automates this:
- Analyze 2–4 weeks of DMARC reports to capture all sending sources
- Enrich each unique source IP with WHOIS organization data
- Group records by organization name (all Google IPs, all SendGrid IPs, etc.)
- Mark each group as authorized, unauthorized, or unknown
- For unauthorized/unknown groups, investigate and either authorize or block
Prioritizing authentication fixes
Not all DMARC failures are equally important. A record showing 50,000 DMARC failures from a Salesforce Marketing Cloud IP range is a higher priority fix than 10 failures from an obscure IP. Enriched data lets you sort by volume and organization to identify the highest-impact fixes first.
| Organization | Failed messages | Issue | Fix |
|---|---|---|---|
| Salesforce.com Inc. | 48,210 | DKIM not configured | Add custom DKIM domain in Salesforce |
| Twilio SendGrid | 12,450 | SPF alignment failure | Add Return-Path domain alignment |
| DigitalOcean LLC | 380 | Unauthorized sender | Move to p=reject to block |
| Residential ISP | 45 | Spoofing attempt | Already blocked at p=reject |
The ASN Shortcut
Autonomous System Numbers (ASNs) are a useful shortcut for grouping IPs. Rather than enriching each IP individually, DMARC Labs groups records by ASN and looks up the ASN owner once — dramatically reducing the number of WHOIS queries needed for large reports.
Major email providers have well-known ASNs:
- AS15169 — Google LLC (Gmail, Google Workspace)
- AS8075 — Microsoft Corporation (Outlook.com, Office 365)
- AS16509 — Amazon.com, Inc. (AWS, Amazon SES)
- AS11377 — Twilio SendGrid
- AS26801 — Mailchimp (Rocketscience Group LLC)
- AS14061 — DigitalOcean LLC
Suspicious IP Classification
Beyond basic WHOIS enrichment, DMARC Labs flags IPs as suspicious when they meet certain criteria:
- 100% DMARC failure rate with meaningful volume — no legitimate sender has zero passing messages
- IP ranges belonging to anonymous hosting providers with no plausible email sending use case
- Residential IP blocks (ISP consumer address space) — legitimate bulk email is never sent from residential IPs
- IP blocks with recent abuse reports in threat intelligence databases
IP enrichment does not catch every threat. A sophisticated attacker using legitimate cloud provider IPs for spoofing looks identical to a legitimate SaaS sender — until you notice the 100% DMARC failure rate. Context always matters.
IP Enrichment and GDPR
IP addresses can be personal data under GDPR when they are associated with identified or identifiable individuals. In the context of DMARC reports:
- IPs from large commercial email providers are corporate infrastructure — not personal data
- IPs from residential ISPs could theoretically identify an individual — but in the context of DMARC reports, these are almost always attack traffic or compromised devices
When DMARC Labs performs IP enrichment, WHOIS queries are made for the IP addresses in your report. The IPs are sent to a WHOIS API. If GDPR compliance is a concern, use a DMARC analyzer that processes reports locally and limits external data sharing to non-PII IP lookups — exactly what DMARC Labs does.