The Six-Tier Security Scan

Enterprise-grade analysis. 60-second verdicts.

2 Simple Steps

Step 1: Forward the Suspicious Email

When you receive an email that looks suspicious, forward it to:

[enable JavaScript to see email]

Tip: Forward the email with headers intact. The best method is to forward as an attachment rather than using regular forward. This preserves the technical information we need for deeper analysis.

See our 60-Second Setup Guide for step-by-step instructions for your email client.

Step 2: Get Your Verdict in 60 Seconds

Within 60 seconds, you'll receive an email with your verdict. The subject line clearly identifies the result:

Example: [enable JavaScript to see tag] Invoice #12345 Due Today

Invitation Only:

Phish Check is currently available by invitation only. If you have access, simply forward suspicious emails as attachments to get your verdict.

Want access? Contact [enable JavaScript to see email] to request an invitation.

SAFE

The email appears legitimate. You can proceed normally.

SUSPICIOUS

The email has some red flags. Verify the sender before taking action.

PHISHING

This is almost certainly a phishing attempt. Delete it immediately.

SPAM

Junk mail or mass marketing. Delete it.

FORGED

The sender information is fake. Do not trust this email.

Each verdict includes a plain-English explanation of what we found and specific recommended actions.

Behind the Scenes

While you wait just 60 seconds, your email goes through six layers of enterprise-grade analysis:

Tier 1: Email Authentication

"Verifying the sender's digital passport"

Validates SPF, DKIM, and DMARC records to confirm the email originated from authorized servers. Forged emails are flagged immediately before consuming analysis resources.

Technical: Checks authentication headers against DNS records to detect spoofing attempts.

Tier 2: Sender Reputation

"Investigating the sender's history"

Analyzes domain age, IP reputation, and sending history. New domains, recently registered for attacks, and IPs with poor deliverability records raise red flags.

Technical: Cross-references domain WHOIS data, IP blacklists, and historical sending patterns.

Tier 3: AI Content Analysis

"Detecting manipulation tactics"

Our AI examines email content for social engineering patterns, urgency triggers, authority exploitation, and psychological manipulation techniques used in phishing attacks.

Technical: Claude AI analyzes language patterns, emotional triggers, and deceptive framing.

Tier 4: Link & Domain Analysis

"Exposing deceptive domains and malicious links"

Extracts all URLs and domains, follows redirects, and inspects destinations. Includes typosquatting detection to catch impersonation domains like paypa1.com, micros0ft-support.com, or amaz0n-security.com. Automatically skips unsubscribe/opt-out links to avoid confirming your email address to spammers.

Technical: Levenshtein distance, homoglyph detection, character substitution analysis, browser automation to follow links safely, and unsubscribe link filtering.

Tier 5: Threat Intelligence

"Cross-referencing 74+ security databases"

Checks extracted URLs and domains against PhishTank, URLhaus, and 74+ other threat intelligence feeds to identify known malicious infrastructure.

Technical: Real-time API lookups against community-reported phishing sites and malware distribution networks.

Tier 6: Verdict Synthesis

"Combining all signals for your final answer"

All analysis results are synthesized into a clear verdict: SAFE, SUSPICIOUS, or PHISHING. Includes confidence level and detailed reasoning for every decision.

Technical: Weighted aggregation of all tier results with explainable AI reasoning.

What We Check For

Every email undergoes 15+ specialized security checks

Authentication & Identity

  • SPF record validation
  • DKIM signature verification
  • DMARC policy compliance
  • Header forgery detection
  • Return-path mismatch detection

Domain & Link Security

  • Typosquatting detection (brand impersonation)
  • Homoglyph character detection (Cyrillic, etc.)
  • Character substitution (0 for o, 1 for l)
  • Domain age and WHOIS analysis
  • Redirect chain following
  • Unsubscribe link protection (safe analysis)

Content Analysis

  • Urgency and fear tactics detection
  • Authority exploitation patterns
  • Social engineering indicators
  • Credential harvesting language
  • Business Email Compromise (BEC) patterns

Threat Intelligence

  • PhishTank database lookup
  • URLhaus malware database
  • IP and domain blacklists
  • Known malicious infrastructure
  • 74+ threat intelligence feeds

Protected brands: PayPal, Microsoft, Amazon, Google, Apple, Netflix, Meta, Chase, Bank of America, Wells Fargo, Citibank, Capital One, American Express, USPS, FedEx, UPS, DHL, IRS, Dropbox, DocuSign, Adobe, LinkedIn, and more.

What You Can Check

The 60-Second Verdict System works with any email you receive:

  • Emails claiming to be from your bank or financial institutions
  • Package delivery notifications
  • Password reset requests
  • Invoices or payment requests
  • Emails from vendors or partners you're unsure about
  • "Urgent" requests from executives or coworkers
  • Prize or lottery notifications
  • Tech support alerts

Tips for Best Results

Do:

  • Forward as attachment when possible (preserves headers for better analysis)
  • Forward the email as soon as you're suspicious — don't click anything first
  • Check from any email client — Gmail, Outlook, Apple Mail, etc.

Don't:

  • Click links in the suspicious email before forwarding
  • Download attachments before forwarding
  • Reply to the suspicious email
  • Copy and paste the email text (we lose important header information)

What's Included

The 60-Second Verdict System provides comprehensive email analysis.

  • Six-Tier Security Scan
  • Plain-English Verdicts
  • 24/7 Protection
  • No software to install

Note: Currently available by invitation only.

Want Access to Phish Check?

Currently available by invitation only.

Questions? Contact us at [enable JavaScript to see email]