Frequently Asked Questions
Is it safe to paste my email into this tool?
Yes. Your email content is analyzed entirely in your browser — nothing is sent to our servers or stored. The checks run locally using JavaScript pattern matching and public DNS lookups. We recommend removing any sensitive personal information (passwords, card numbers) before pasting as a general precaution.
Why should I paste the full email source instead of just the body?
Email headers contain critical technical information: authentication results (SPF, DKIM, DMARC pass/fail), the actual sending server IP, routing path, and the true origin of the message. The visible “From” field can say anything — headers reveal the real sender. Full source analysis is significantly more accurate than body-only analysis.
What if the tool says safe but the email still seems suspicious?
Always trust your instincts. Our tool runs pattern-based checks and may miss sophisticated targeted attacks (spear phishing) that don’t use typical red flags. If something feels wrong — unexpected request, unusual sender, link you didn’t expect — verify through a separate channel before taking any action.
Can phishing emails pass SPF and DKIM checks?
Yes, in some cases. Attackers who control their own domain can set up valid SPF and DKIM records for that domain. The key is whether the domain matches the claimed sender — a valid DKIM signature for random-domain.xyz means nothing if the email claims to be from PayPal. Our checker looks at the combination of authentication results and domain matching.
What should I do if I’ve already clicked a link?
Act immediately: change passwords for any accounts accessed after clicking. Enable two-factor authentication. Run a malware scan. If you entered financial information, contact your bank. Report to your IT team if this was a work device. Use our phishing link checker to verify the URL, and our email header analyzer for deeper investigation.
