Protect yourself from
Phishing &
Cyber Attacks
Analyse emails, URLs, documents and messages in seconds. Our AI detects threats, identifies social engineering tactics and gives you a clear action plan.
Phishing attempt detected. Message uses artificial urgency and contains credential harvesting indicators.
Three steps.
Immediate results.
No complex setup. No installations. Just paste and analyse.
Paste or upload content
Email text, suspicious URL, screenshot, PDF, .eml file — anything that looks suspicious.
AI analyses in seconds
Gemini examines content using MITRE ATT&CK rules, typosquatting detection, urgency analysis and much more.
Receive the full report
Risk level, severity findings, prioritised recommendations and suggested security tools.
Everything you need
to stay protected
Built by cybersecurity experts, powered by the best AI models available.
Real-time URL analysis
Detection of typosquatting, IDN homographic attacks, suspicious shorteners, chain redirects and credential harvesting patterns. Available on the Pro plan.
Email Analysis
Detects phishing, social engineering, spoofed senders and malicious attachments. Supports .eml and .msg.
Document Analysis
PDF, TXT and images. Analyses content for malicious macros, hidden links and data manipulation.
MITRE ATT&CK Tactics
Each threat is mapped to MITRE ATT&CK framework tactics, providing professional technical context.
Analysis History
Access all your previous analyses, compare threats over time and export detailed reports. Smart cache prevents duplicate analyses.
100% Private
Your data is never used to train models. Secure analysis, no sensitive content retention.
Confidence Score
Each analysis includes a confidence score (0–100%) and individual severity per finding.
Who is
PhishOut AI for?
Individual users
Received a strange email from your bank? A suspicious message? Check before clicking. No technical knowledge required.
Small businesses
Protect your team without a dedicated IT department. Volume analysis with the Pro plan and detailed reports for internal training.
IT Professionals
MITRE ATT&CK mapping, identified IoCs, technical indicators and confidence score. A quick and informed second opinion.
Educators & Trainers
Use real examples in cybersecurity awareness training. Clear and educational results in any language.
Threats the AI
identifies for you
Phishing
Emails, SMS and messages pretending to be legitimate entities to steal credentials.
Social Engineering
Urgency, fear and false authority tactics to manipulate human behaviour.
Malicious URLs
Shortened links, typosquatting, homographic domains and suspicious redirects.
Dangerous Attachments
PDFs with macros, images with hidden code and files with embedded exploits.
Malicious Code
Scripts, snippets and code with suspicious behaviour, backdoors or vulnerabilities.
Smishing
Fraudulent SMS messages imitating banks, postal services and popular digital platforms.
AI Impersonation
AI-generated messages that mimic legitimate communication styles to bypass filters.
Fraud & Scams
Investment schemes, fake prizes, romance fraud and urgent payment requests.
No subscriptions.
Pay for what you use.
Buy analyses once and use them at your own pace. No expiry dates. No automatic renewals.
- Advanced AI model
- Text, files up to 16 MB & URLs
- Analysis history
- PDF export
- Credits never expire
- Advanced AI model
- Text, files up to 16 MB & URLs
- Analysis history
- PDF export
- Credits never expire
- Advanced AI model
- Text, files up to 16 MB & URLs
- Analysis history
- PDF export
- Credits never expire
Frequently asked questions
Yes, absolutely. Content you submit for analysis is processed in real-time and permanently discarded immediately after the report is generated — nothing is stored on our servers. For Pro users with an active credit balance, only the analysis results (not the raw content you submitted) are stored in your encrypted history, exclusively accessible by you.
Every analysis consumes one credit. Free accounts receive 2 credits per day at no cost, which reset at midnight UTC and do not carry over. Pro credits are purchased in packs (15, 50, 100, 200, or 500 analyses) as a one-time payment — they never expire and accumulate across purchases. When your Pro balance reaches zero, your account reverts to the Free tier automatically; purchasing any pack restores Pro access immediately.
No. Purchased credits never expire. They stay in your account until you use them, regardless of how long that takes. Daily free credits (2 per day) do not carry over — unused free credits reset each day.
We support images (JPG, PNG, GIF, WebP), documents (PDF, TXT), and email formats (.eml and Outlook .msg). Free accounts can analyse files up to 4 MB. Pro users (active credit balance) can submit files up to <strong>16 MB</strong>, suitable for denser forensic analysis.
URL analysis is available to Pro users (active credit balance). It performs deep inspection using the VirusTotal and URLScan.io APIs, identifying typosquatting, real-time domain reputation, chain redirects, and credential-harvesting patterns. It also provides a secure remote visual preview so you can inspect the destination without any direct interaction with the link. Each URL analysis consumes one credit.
MITRE ATT&CK is a global knowledge base of adversary tactics and techniques based on real-world observations. PhishOut AI maps each detected threat to its corresponding tactic ID, providing professional-level technical context on the attack vector — useful for IT professionals and security teams.
When your purchased credit balance reaches zero, your account automatically reverts to the Free tier — meaning you keep your 2 daily free credits but lose access to Pro features (URL analysis, analysis history, PDF export, Gemini Pro model, larger file uploads). Your analysis history is preserved and becomes accessible again as soon as you purchase a new credit pack.
The Free plan uses AI Standard model — fast and efficient for everyday screening. Pro users (active credit balance) use Advanced AI model</strong>, our "Forensic Brain" with advanced reasoning capabilities, better at detecting complex social engineering, obfuscated content, and subtle manipulation techniques that standard models miss.
Never. The entire analysis process is 100% automated via enterprise AI APIs. No human reads your submitted content at any point. Your data is not used for model training, and processing is fully isolated per request.
Don't click the next suspicious link without checking first
Join thousands of users who use PhishOut AI to protect themselves every day. Start for free.