Is This Email a Phishing Attempt?
Paste any suspicious email below and our AI will analyze it for phishing indicators in seconds. Free. No signup required.
Powered by Claude AI • CISSP-Led Analysis • Free Forever
For accurate phishing detection include the full email with headers. Without headers we cannot verify sender authentication, IP reputation, or routing anomalies. Click below for instructions for your email client.
- Open the suspicious email
- Click the three dots menu (⋮) in the top right
- Select "Show original"
- Click "Copy to clipboard"
- Paste everything into the box below
- Open the suspicious email
- Click File → Properties
- Copy everything in the "Internet headers" box
- Then copy the email body separately
- Paste both into the box below
- Open the suspicious email
- Click the three dots menu (...)
- Select "View → View message source"
- Copy all the text
- Paste into the box below
- Open the suspicious email
- Click View → Message → All Headers
- Or press Shift + Command + H
- Copy the full message source
- Paste into the box below
- Open the suspicious email
- Click the three dots menu (...)
- Select "View Raw Message"
- Copy all the text
- Paste into the box below
- Open the suspicious email
- Click View → Message Source
- Or press Ctrl + U
- Copy all the text
- Paste into the box below
Red Flags Detected
Analysis Summary
Recommended Action
Common Phishing Tactics
Understanding how attackers operate is the first line of defense. Here are the three most common techniques used in phishing emails.
Urgency & Fear Tactics
Phishing emails create artificial pressure — "Your account will be suspended in 24 hours," "Immediate action required," or "Unauthorized login detected." Legitimate organizations give you time to respond through official channels.
Spoofed Sender Addresses
Attackers disguise the sender's identity — the display name may say "PayPal Support" but the actual address is paypal-support@totally-fake-domain.com. Always check the full email address, not just the name shown in your inbox.
Malicious Links in Disguise
Links are often disguised using URL shorteners, lookalike domains (arnazon.com instead of amazon.com), or redirects that mask the true destination. Hover over any link before clicking — if the destination looks off, it probably is.
Think your team needs phishing training?
One click is all it takes for a breach. We run hands-on security awareness training that actually sticks — simulated phishing, real-world scenarios, and measurable results.