Detect phishing
before it attacks you.
Real-time phishing link analysis powered by machine learning.
Please enter a URL to analyze
LIVE THREAT INTEL
COMMON PHISHING TECHNIQUES
- Email spoofing — Attackers forge sender addresses to appear legitimate.
- Credential harvesting — Fake login pages steal usernames and passwords.
- Lookalike domains — Slight misspellings mimic trusted websites.
- Malicious attachments — Infected files deliver malware or spyware.
- QR-code phishing — Malicious QR codes redirect users to fake sites.
- Shortened URL abuse — Hidden destinations are used to evade detection.
WELL-KNOWN PHISHING ATTACKS
- Google Docs phishing — Fake document invites spread via trusted contacts.
- PayPal credential scams — Cloned PayPal pages captured login details.
- COVID-19 themed phishing — Public fear was exploited using fake updates.
- Facebook login clones — Replica pages harvested user credentials.
- Microsoft 365 phishing — Spoofed security alerts targeted enterprises.
HOW TO STAY SAFE FROM PHISHING
- Verify sender and domain — Always inspect the full email and URL.
- Avoid shortened links — Hidden URLs often lead to malicious pages.
- Do not scan unknown QR codes — QR links can open unsafe websites.
- Enable two-factor authentication — Adds protection if credentials are leaked.
- Check HTTPS and spelling — Secure connections can still be fraudulent.
- Avoid unexpected attachments — Unsolicited files are common malware vectors.