---
title: "What is Doxxing and How to Prevent it | DMARC Report"
description: "What is Doxxing and How to Prevent it from DMARC Report explains practical steps for email authentication, domain protection, deliverability, and DMARC."
image: "https://dmarcreport.com/og/blog/what-is-doxxing-and-how-to-prevent-it.png"
canonical: "https://dmarcreport.com/blog/what-is-doxxing-and-how-to-prevent-it/"
---

Quick Answer

What is Doxxing and How to Prevent it What is Doxxing and How to Prevent it /! This file is auto-generated / !function(d,l){"use strict";l.querySelector&&d.addEventListener&&"undefined"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!/\[^a-zA-Z0-9\]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe\[data-secret="'+t.secret+'"\]'),o=l.querySelectorAll('blockquote\[data-secret="'+t.secret+'"\]'),c=new RegExp("^https?:$","i"),i=0;i ' title="Embed Code" class="input-embed input-embed-38239" readonly/> You do not need to be famous, controversial, or wealthy to become a target of doxxing.

Related: [Free DMARC Checker](/tools/dmarc-checker/) ·[How to Create an SPF Record](/tools/spf-record-generator/) ·[SPF Record Format](/blog/spf-format-checker-dos-and-donts-for-email-authentication/) 

Share 

[ ](https://www.linkedin.com/sharing/share-offsite/?url=undefined%2Fblog%2Fwhat-is-doxxing-and-how-to-prevent-it%2F "Share on LinkedIn") [ ](https://twitter.com/intent/tweet?text=What%20is%20Doxxing%20and%20How%20to%20Prevent%20it&url=undefined%2Fblog%2Fwhat-is-doxxing-and-how-to-prevent-it%2F "Share on X/Twitter") [ ](https://www.facebook.com/sharer/sharer.php?u=undefined%2Fblog%2Fwhat-is-doxxing-and-how-to-prevent-it%2F "Share on Facebook") [ ](https://reddit.com/submit?url=undefined%2Fblog%2Fwhat-is-doxxing-and-how-to-prevent-it%2F&title=What%20is%20Doxxing%20and%20How%20to%20Prevent%20it "Share on Reddit") [ ](mailto:?subject=What%20is%20Doxxing%20and%20How%20to%20Prevent%20it&body=Check out this article: undefined%2Fblog%2Fwhat-is-doxxing-and-how-to-prevent-it%2F "Share via Email") 

![What is Doxxing and How to Prevent it](https://media.mailhop.org/dmarcreport/images/2022/04/dmarc-alignment-6379.jpg) 

![What is dmarc 3294 150x150](https://media.mailhop.org/dmarcreport/images/2026/01/what-is-dmarc-3294-150x150.jpg) 

> The most common mistake we see during DMARC setup is jumping straight to p=reject without monitoring first, says Vasile Diaconu, Operations Lead at DuoCircle. Start at p=none, analyze your reports for at least a full quarter - you need to catch monthly, quarterly, and annual email senders that only fire periodically. Then fix any legitimate senders that fail before enforcing. We walk every customer through this sequence.

```
					DMARC Report					

				
```

What is Doxxing and How to Prevent it

```
					<button title="Play" aria-label="Play Episode" aria-pressed="false" class="play-btn">
						
```

Play Episode

```
					</button>
					<button title="Pause" aria-label="Pause Episode" aria-pressed="false" class="pause-btn hide">
						
```

Pause Episode

```
					</button>
				

					<audio preload="none" class="clip clip-38239">
						<source src="https://media.mailhop.org/dmarcreport/images/2026/01/What-is-Doxxing-and-How-to-Prevent-it.mp3">
					</audio>
						

							<button class="player-btn player-btn__volume" title="Mute/Unmute">
								
```

Mute/Unmute Episode

```
							</button>
							<button data-skip="-10" class="player-btn player-btn__rwd" title="Rewind 10 seconds">
								
```

Rewind 10 Seconds

```
							</button>
							<button data-speed="1" class="player-btn player-btn__speed" title="Playback Speed" aria-label="Playback Speed">1x</button>
							<button data-skip="30" class="player-btn player-btn__fwd" title="Fast Forward 30 seconds">
								
```

Fast Forward 30 seconds

```
							</button>
						

							<time class="ssp-timer">00:00</time>
							
```

/

```
							<!-- We need actual duration here from the server -->
							<time class="ssp-duration" datetime="PT0H2M10S">2:10</time>
			

								<nav class="player-panels-nav">
												<button class="subscribe-btn" id="subscribe-btn-38239" title="Subscribe">Subscribe</button>
																		<button class="share-btn" id="share-btn-38239" title="Share">Share</button>
										</nav>

						
```

RSS Feed

```
							<input value="https://dmarcreport.com/feed/podcast/dmarc-report" class="input-rss input-rss-38239" title="RSS Feed URL" readonly />
						

						<button class="copy-rss copy-rss-38239" title="Copy RSS Feed URL" aria-label="Copy RSS Feed URL"></button>
					

						Share						
					

						<a href="https://www.facebook.com/sharer/sharer.php?u=https://dmarcreport.com/blog/podcast/what-is-doxxing-and-how-to-prevent-it/&t=What is Doxxing and How to Prevent it" target="blank" rel="noopener noreferrer" class="share-icon facebook" title="Share on Facebook">
							

						</a>
						<a href="https://twitter.com/intent/tweet?text=https://dmarcreport.com/blog/podcast/what-is-doxxing-and-how-to-prevent-it/&url=What is Doxxing and How to Prevent it" target="blank" rel="noopener noreferrer" class="share-icon twitter" title="Share on Twitter">
							

						</a>
						<a href="https://media.mailhop.org/dmarcreport/images/2026/01/What-is-Doxxing-and-How-to-Prevent-it.mp3" target="blank" rel="noopener noreferrer" class="share-icon download" title="Download" download>
							

						</a>
					

						Link						
					

						<input value="https://dmarcreport.com/blog/podcast/what-is-doxxing-and-how-to-prevent-it/" class="input-link input-link-38239" title="Episode URL" readonly />
					

					<button class="copy-link copy-link-38239" title="Copy Episode URL" aria-label="Copy Episode URL" readonly=""></button>
					

						Embed						

					
```

/\*! This file is auto-generated \*/ ’ title=“Embed Code” class=“input-embed input-embed-38239” readonly/>

```
					<button class="copy-embed copy-embed-38239" title="Copy Embed Code" aria-label="Copy Embed Code"></button>


```

You do not need to be famous, controversial, or wealthy to become a target of doxxing. In many cases, victims are regular people who simply posted something online, joined a debate, or annoyed the wrong person. A single comment, tweet, or review can be enough to trigger someone into digging through your **digital life**.

What makes doxxing especially dangerous is how silent it is. _There is no warning. One day, your information is private; the next, your name, address, phone number, or workplace is shared in online groups you have never heard of._ By the time you realize what is happening, the damage is often already done.

This guide explains what doxxing really means, how attackers collect [personal data](https://ico.org.uk/for-organisations/uk-gdpr-guidance-and-resources/personal-information-what-is-it/what-is-personal-data/what-is-personal-data/), why people do it, and most importantly, how you can **reduce your risk**. Whether you are an individual, a freelancer, or a business owner, understanding doxxing is no longer optional. It is a basic part of staying safe on the internet today.

Doxxing exposes personal data online, and using [DMARC](https://dmarcreport.com/), [DKIM](https://dmarcreport.com/what-is-dkim/), and [SPF](https://dmarcreport.com/what-is-spf/) helps prevent it by securing [email authentication](https://dmarcreport.com/blog/why-email-security-matters-and-how-to-get-it-right/) and blocking [spoofed attacks](https://www.scworld.com/brief/fbi-us-officials-spoofed-in-ongoing-voice-sms-phishing-campaign).

## What is doxxing?

![Dmarc record](https://media.mailhop.org/dmarcreport/images/2026/01/dmarc-record-1029.jpg) 

[Doxxing](https://www.fortinet.com/resources/cyberglossary/doxing), sometimes spelled doxing, is when someone collects your personal information and shares it online without your permission. This information may include your full name, home address, phone number, workplace, email address, or family details. The main goal of doxxing is almost always to cause harm. The word comes from “**dropping docs**,” which means leaking documents about someone. Earlier, it was mostly used by hackers to expose rivals. Today, anyone can be a target, including regular people, not just public figures.

Doxxers usually gather information from social media, **public records**, leaked databases, or through tricks like phishing and [fake profiles](https://en.wikipedia.org/wiki/Fake%5FProfile). Once they get the data, they publish it on forums, social platforms, or messaging groups.

![Dmarc report](https://media.mailhop.org/dmarcreport/images/2026/01/dmarc-report-8370.jpg) 

Doxxing is done with bad intent. It is meant to shame, [threaten](https://www.cbc.ca/news/politics/trump-tariffs-decertify-canadian-planes-9.7067498), harass, or damage someone’s **personal and professional life**. Since the person never gives consent, it becomes a serious violation of privacy and can make victims feel unsafe **both online and offline**.

## How does doxxing happen?

Doxxing usually does not happen in one big step. It happens slowly by collecting small bits of information from many places and then joining them together. Most people share more about themselves online than they realize, and doxxers take advantage of this.

## 1\. Stalking social media

One of the most common methods is stalking social media. _Public posts can reveal a lot, like your city, workplace, daily routine, friends, hobbies, and even your birthday_. A single photo or comment might look harmless, but when combined with other posts, it can expose your real identity.

## 2\. Tracking usernames across platforms

Many people use the same username on Instagram, Twitter, Reddit, [gaming platforms](https://www.perfectiongeeks.com/en-us/blog/gaming-platform-development-company-in-usa), and forums. A doxxer can search that username across sites and build a full picture of your interests, opinions, and **online behavior**.

![What is dmarc](https://media.mailhop.org/dmarcreport/images/2026/01/what-is-dmarc-3209.jpg) 

## 3\. Buying data from data brokers

Doxxers also use data brokers. These companies collect personal information from public records, shopping data, and **online activity**. For a small payment, anyone can buy reports that include phone numbers, addresses, relatives, and past locations.

## 4\. Phishing and social engineering

[Phishing](https://www.infosecurity-magazine.com/news/mobile-phishing-attacks-surge-16/) is another common tactic. Doxxers send [fake emails](https://www.usatoday.com/story/money/columnist/2023/09/21/ai-cyber-scams-security/70920106007/) or messages that appear genuine and trick people into sharing passwords or other personal details. Once they access an account, they can see \*\*private conversations and stored data. ![Gmail dmarc](https://media.mailhop.org/dmarcreport/images/2026/01/gmail-dmarc-9120.jpg)

## 5\. Searching public databases

Many doxxers search public databases. Government records like property ownership, business registrations, and voter lists are often easy to access and can reveal sensitive personal details.

## 6\. Domain registration records

When someone registers a website, their personal details are stored in public [WHOIS databases](https://www.linkedin.com/pulse/whois-databases-garth-bruen) unless \*\*privacy protection is enabled. This can expose names, addresses, and phone numbers to anyone who looks them up.

## Common motivations for attempting doxxing

Doxxing is usually driven by \*\*strong emotions rather than clear thinking. In most cases, people do not do it for any good reason. They do it because they are angry, frustrated, or want to feel powerful. Below are some of the most common reasons behind doxxing.

## Online arguments

Many doxxing incidents start with simple online fights. These can happen on [social media](https://www.bbc.com/news/articles/c1dz0g2ykpeo), gaming platforms, or [discussion forums](https://buddyboss.com/blog/what-is-a-discussion-forum/). When someone feels insulted, embarrassed, or defeated in public, they may resort to doxxing to retaliate. Instead of continuing the debate, they try to scare or silence the other person by exposing their real identity.

![Dmarc analyzer](https://media.mailhop.org/dmarcreport/images/2026/01/dmarc-analyzer-6207.jpg) 

## Political conflicts

Doxxing is also common in **political and social debates**. Journalists, activists, and public figures are frequent targets. In these cases, the goal is often to shut someone up, damage their reputation, or pressure them into changing their views.

## Harassment and power

Some people doxx simply because they enjoy having control over others. They feel powerful when they can make someone afraid or uncomfortable by exposing private details.

## Financial or criminal gain

In many cases, doxxed information is used for identity theft, account hacking, or [scams](https://www.aljazeera.com/news/2025/10/15/us-uk-sanction-huge-southeast-asian-crypto-scam-network). Attackers use personal data to trick victims or steal money, which can lead to serious financial loss.

![Gmail dmarc](https://media.mailhop.org/dmarcreport/images/2026/01/gmail-dmarc-9308.jpg) 

## How to prevent doxxing and protect yourself

Doxxing does not start with hackers breaking into systems. It usually starts with small digital traces that people leave behind without thinking. The best way to \*\*protect yourself and your business is to reduce how much personal information is publicly available and make it harder for attackers to connect the dots.

## 1\. Lock down your social media privacy

Start by reviewing your **social media settings**. Keep personal profiles private and limit who can see your posts, photos, and friend lists. _Avoid sharing location updates, office photos, travel plans, or anything that reveals daily routines._ Even harmless details like pet names, school names, or inside jokes can be used to guess security questions or build your profile.

## 2\. Use different usernames and emails

Never use the same username everywhere. Create separate identities for personal use, [professional platforms](https://fueler.io/blog/best-networking-platforms-for-us-professionals), and **public communities**. This makes it much harder for someone to link all your accounts together. For businesses, use role-based email addresses such as support@ or info@ instead of personal names.

![What is dmarc](https://media.mailhop.org/dmarcreport/images/2026/01/what-is-dmarc-3617.jpg) 

## 3\. Remove data from people search sites

Many data broker websites publish phone numbers, addresses, and family details. Search your name regularly on Google and opt out of these platforms. This process takes time but significantly reduces how easily someone can buy or find your information.

## 4\. Protect your domain and business records

Enable WHOIS privacy when registering domains so your contact details are not publicly visible. For businesses, avoid using personal addresses and phone numbers in \*\*company registrations whenever possible. Use virtual office addresses or business numbers instead.

![Dmarc analyzer](https://media.mailhop.org/dmarcreport/images/2026/01/dmarc-analyzer-3120.jpg) 

## 5\. Be alert to phishing and social engineering

Most doxxing campaigns involve tricking the victim first. Do not click unknown links, download random files, or share personal details on unexpected calls or emails. Use a \*\*password manager \*\*and enable [multi-factor authentication](https://www.crowdstrike.com/en-us/cybersecurity-101/identity-protection/multifactor-authentication-mfa/) for all important accounts.

## 6\. Monitor your digital footprint continuously

Set up Google alerts for your name, brand, and domain. This helps you detect early signs of [data leaks](https://abc3340.com/news/nation-world/report-whistleblower-leaks-personal-data-of-4500-dhs-and-ice-agents-to-doxxing-website-anti-ice-prtotesters) or impersonation. Businesses should also monitor social media and forums for fake profiles and brand misuse. \*\*Doxxing prevention is not about hiding from the internet. It is about controlling what information exists, where it exists, and who can access it. The smaller your **public footprint**, the harder it becomes for anyone to weaponize your identity.

## Topics

[ dkim ](/tags/dkim/)[ DMARC ](/tags/dmarc/)[ SPF ](/tags/spf/) 

![Vishal Lamba](https://media.mailhop.org/dmarcreport/images/team/vishal-lamba.jpg) 

[ Vishal Lamba ](/authors/vishal-lamba/) 

Content Specialist

Content Specialist at DMARC Report. Writes vendor-specific email authentication guides and troubleshooting walkthroughs.

[LinkedIn Profile →](https://www.linkedin.com/in/vishal-lamba/) 

## Take control of your DMARC reports

Turn raw XML into actionable dashboards. Start free - no credit card required.

[Start Free Trial](https://app.dmarcreport.com/) [Check Your DMARC Record](/tools/dmarc-checker/) 

## Related Articles

[  Foundational 8m  10 Critical Learnings From Verizon’s 2021 DBIR - A DMARCReport Perspective  Nov 25, 2025 ](/blog/10-critical-learnings-from-verizons-2021-dbir-a-dmarcreport-perspective/)[  Foundational 12m  10 DNS Blacklist Insights That Improve Email Security And Deliverability Fast  Nov 14, 2025 ](/blog/10-dns-blacklist-insights-to-improve-email-security-and-deliverability/)[  Foundational 12m  10 Email Spoofing Detection Tools That Dramatically Improve Brand Protection  Nov 11, 2025 ](/blog/10-email-spoofing-detection-tools-that-dramatically-improve-brand-protection/)[  Foundational 12m  10 Reasons SPF Filtering Is Critical For Email Security  Nov 19, 2025 ](/blog/10-reasons-spf-filtering-is-critical-for-email-security/)

```json
{"@context":"https://schema.org","@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.wikidata.org/wiki/Q138898167","https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.g2.com/products/dmarc-report/reviews","https://github.com/duocircle","https://www.crunchbase.com/organization/duocircle-llc","https://www.trustradius.com/products/duocircle/reviews"],"aggregateRating":{"@type":"AggregateRating","ratingValue":"4.8","reviewCount":"470","bestRating":"5","worstRating":"1","url":"https://www.g2.com/products/dmarc-report/reviews"},"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://dmarcreport.com/support/"},"knowsAbout":["DMARC","DMARC Reporting","DMARC Aggregate Reports","DMARC Forensic Reports","Sender Policy Framework","DKIM","Email Authentication","Email Security","DNS Management","Email Deliverability"]}
```

```json
{"@context":"https://schema.org","@type":"WebSite","name":"DMARC Report","url":"https://dmarcreport.com","description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","publisher":{"@type":"Organization","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]}}}
```

```json
[{"@context":"https://schema.org","@type":"BlogPosting","headline":"What is Doxxing and How to Prevent it","description":"What is Doxxing and How to Prevent it from DMARC Report explains practical steps for email authentication, domain protection, deliverability, and DMARC.","url":"https://dmarcreport.com/blog/what-is-doxxing-and-how-to-prevent-it/","datePublished":"2026-01-30T12:16:38.000Z","dateModified":"2026-04-16T15:53:43.000Z","dateCreated":"2026-01-30T12:16:38.000Z","author":{"@type":"Person","@id":"https://dmarcreport.com/authors/vishal-lamba/#person","name":"Vishal Lamba","url":"https://dmarcreport.com/authors/vishal-lamba/","jobTitle":"Content Specialist","description":"Vishal Lamba writes DMARC Report's how-to guides and vendor-specific configuration walkthroughs. His work focuses on step-by-step implementation guides for major email platforms (Google Workspace, Microsoft 365, SendGrid, Mimecast, Proofpoint, Brevo, and others), troubleshooting common SPF and DMARC errors, and translating RFC-level specifications into practical deployment procedures for IT administrators.","image":"https://media.mailhop.org/dmarcreport/images/team/vishal-lamba.jpg","knowsAbout":["SPF Vendor Configuration","Email Platform Integrations","SPF Troubleshooting","Technical Documentation","Step-by-Step Guides"],"worksFor":{"@type":"Organization","name":"DMARC Report","url":"https://dmarcreport.com"},"sameAs":["https://www.linkedin.com/in/vishal-lamba/"]},"publisher":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.wikidata.org/wiki/Q138898167","https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.g2.com/products/dmarc-report/reviews","https://github.com/duocircle","https://www.crunchbase.com/organization/duocircle-llc","https://www.trustradius.com/products/duocircle/reviews"],"aggregateRating":{"@type":"AggregateRating","ratingValue":"4.8","reviewCount":"470","bestRating":"5","worstRating":"1","url":"https://www.g2.com/products/dmarc-report/reviews"},"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://dmarcreport.com/support/"},"knowsAbout":["DMARC","DMARC Reporting","DMARC Aggregate Reports","DMARC Forensic Reports","Sender Policy Framework","DKIM","Email Authentication","Email Security","DNS Management","Email Deliverability"]},"mainEntityOfPage":{"@type":"WebPage","@id":"https://dmarcreport.com/blog/what-is-doxxing-and-how-to-prevent-it/"},"articleSection":"foundational","keywords":"dkim, DMARC, SPF","wordCount":1664,"image":{"@type":"ImageObject","url":"https://media.mailhop.org/dmarcreport/images/2022/04/dmarc-alignment-6379.jpg","caption":"What is Doxxing and How to Prevent it","width":900,"height":600},"speakable":{"@type":"SpeakableSpecification","cssSelector":[".answer-block","h1"]}}]
```

```json
{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://dmarcreport.com/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https://dmarcreport.com/blog/"},{"@type":"ListItem","position":3,"name":"Foundational","item":"https://dmarcreport.com/foundational/"},{"@type":"ListItem","position":4,"name":"What is Doxxing and How to Prevent it","item":"https://dmarcreport.com/blog/what-is-doxxing-and-how-to-prevent-it/"}]}
```
