LogoLogo
Get Demo
  • 💫NEXT-GENERATION PRODUCT
    • Introduction
    • Getting Started
      • 1. Invite System Users
      • 2. Add Target Users
        • Add Users via CSV
        • Add users via SCIM
          • SCIM Setup in Azure AD
          • SCIM Setup in Okta
          • SCIM Setup in Onelogin
          • SCIM Setup in Jumpcloud
        • Add users via LDAP
        • Add Users via API
      • 3. Email Deliverability
        • Microsoft 365
          • M365: Direct Email Creation
          • M365: Whitelisting
        • Google Workspace
          • Google: Direct Email Creation
          • Google: Whitelisting
        • Exchange 2013 and 2016
      • 4. Track Opened Emails
      • 5. Allow Phishing URLs
        • Whitelist for Office 365
        • Whitelist for Google Workspace
        • Whitelist for Exchange 2013/2016
        • Whitelist in Security Solutions
      • 6. Setup Phishing Reporter
        • Step 1. Download Phishing Reporter
        • Step 2. Deploy Phishing Reporter
          • How to Deploy Add-In in Microsoft 365
          • How to Deploy Add-In in Exchange Admin Center
          • How to Deploy Add-In in Google Workspace
          • How to Deploy Add-In in Outlook
            • Troubleshooting Phishing Reporter Add-In on Outlook Desktop
      • 7. Incident Responder Setup
        • Step 1. Integrate Threat Intel Partners
        • Step 2. Mail Configurations
          • Microsoft 365
          • Google Workspace (Gsuite)
          • Exchange (EWS)
    • Platform
      • Dashboard
        • Dashboard Widgets
        • Incident Responder Widgets
        • Threat Sharing Widgets
        • Phishing Simulator Widgets
      • Threat Intelligence
      • Email Threat Simulator
        • Start Scan
        • View Scan Report
        • Create Trusted Account on Exchange
        • Start Scan on O365 Email Account
        • Start Scan on Google Workspace Email Account
      • Threat Sharing
        • Communities
        • Incidents
      • Phishing Simulator
        • Manage Phishing Scenarios
          • Phishing Scenarios
          • Email Templates
          • Landing Pages
        • Phishing Campaign Manager
        • Phishing Campaign Reports
        • Settings
          • DNS Services and Domains
          • Exclude IP Address
      • Callback Simulator
        • Manage Callback Scenarios
          • Callback Scenarios
          • Callback Email Templates
          • Callback Templates
        • Callback Campaign Manager
        • Callback Campaign Reports
        • Settings
          • Callback Phone Numbers
      • Vishing Simulator
        • Vishing Templates
        • Vishing Campaign Manager
        • Vishing Campaign Reports
      • Smishing Simulator
        • Manage Smishing Scenarios
          • Smishing Scenarios
          • Text Message Templates
          • Landing Page Templates
        • Smishing Campaign Manager
        • Smishing Campaign Reports
        • Settings
          • Manage DNS and Domains
          • Exclude IP Addresses
      • Quishing Simulator
        • Manage Quishing Scenarios
          • Quishing Scenarios
          • Quishing Templates
          • Quishing Landing Page Templates
        • Quishing Campaign Manager
        • Quishing Campaign Reports
        • Settings
          • DNS and Domains
          • Excluding IP Address
      • Awareness Educator
        • Training Library
        • Enrollments
        • Certificates
        • Training Reports
        • Training Completion Queries
      • Incident Responder
        • Incident Responder Dashboard
        • Investigations
        • Integrations
        • Playbook
        • Mail Configurations
          • Microsoft 365
          • Exchange
          • Google Workspace
        • Cross Company Integration
      • Phishing Reporter
        • Phishing Reporter Customization
        • Phishing Reporter Deployment
          • How to Deploy the Add-in in Microsoft 365
          • Phishing Reporter Page View Failure Due to Deprecated Exchange Online Tokens
          • Microsoft Ribbon Phishing Reporter
          • Microsoft Page View Phishing Reporter
          • How to Deploy the Add-in in Exchange Admin Center
          • How to Deploy the Add-in in Google Workspace
          • Phishing Reporter Announcement Email Template
        • Diagnostic Tool
        • Integrating Microsoft Phishing Reporting Button with Keepnet
        • Integrating Microsoft Defender with Keepnet Phishing Reporter
        • Troubleshooting Phishing Reporter on Outlook Desktop
      • Reports
        • Advanced Reports
        • Executive Reports
        • Scheduled Reports
        • Gamification Report
      • Company
        • Target Users
        • Companies
          • Company Groups
        • Company Settings
          • Privacy
            • Account Privacy
            • Data Privacy
          • AI Ally Settings
          • SMTP Settings
          • Direct Email Creation
            • Direct Email Creation for Google Workspace
            • Direct Email Creation for Microsoft 365
          • Notification Templates
          • Google User Provisioning
          • REST API
          • White Labeling
          • Proxy Settings
          • SAML Settings
            • How to Configure SAML on ADFS
            • How to Configure SAML on Google Workspace
            • How to Configure SAML on Azure AD
            • How to Configure SAML on CyberArk
            • How to Configure SAML on Okta
          • SCIM Settings
            • Getting Started with SCIM
            • Azure AD SCIM Integration
            • Okta SCIM Integration
            • Onelogin SCIM Integration
            • Jumpcloud SCIM Integration
          • SIEM Integrations
            • Splunk Integration
            • Syslog Integration
          • LDAP
          • Allowed Domains
        • System Users
          • People
          • Roles
        • Audit Log
        • Job Log
      • Free Phishing Email Analysis Service
    • Miscellaneous
      • Whitelisting
        • How to Whitelist an IP Address in Office 365
        • How to Whitelist an IP Address in Exchange 2013 and 2016
        • How to Whitelist an IP Address in Google Workspace
        • How to Whitelist in Mimecast
        • Whitelisting in Other Security Solutions
        • Whitelisting the Pictures on Microsoft Outlook Apps
        • Keepnet Tools Whitelisting Guidelines
        • Understanding Email Delivery Errors
        • Tracking Email Opens in Phishing Simulations
      • User Profile
      • Multi-Factor Authentication (MFA) Settings
      • On-Premise Requirement Checker
      • Platform Requirements
        • Portal UI Requirements
        • Phishing Reporter Requirements
        • Diagnostic Tool Requirements
      • Maintenance Tool
      • Understanding the Preferred Language Setting
  • 📚RESOURCES
    • Platform Security
    • Volume & Performance
    • Customer Help Desk
    • Product Update/Maintenance
    • Research Methodology
    • Release Notes
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
      • 2020
  • ⚖️Legal Hub
    • For Customers
      • Customer Terms of Service
      • Product Specific Terms
      • Jurisdiction Specific Terms
      • Data Processing Agreement
      • Regional Data Hosting Policy
      • Product and Services Catalog
      • Acceptable Use Policy
      • Keepnet Security Program
      • Microsoft CoPilot Usage Policy
    • For Everyone
      • Website
        • Terms of Use
        • Privacy Policy
        • Cookie Policy
      • Free Phishing Email Analysis
        • Terms of Service
        • Privacy Policy
      • Transparency Report
Powered by GitBook

Copyright © Keepnet Labs LTD. All rights reserved.

On this page
  • How to Use Free Phishing Email Analysis Service
  • How to Understand Free Phishing Email Analysis Report
  • FAQs
  • Q: What files can I upload?
  • Q: Is there a limit on how many emails I can check?
  • Q: Can I share the report?
  • Q: What about privacy?

Was this helpful?

Export as PDF
  1. NEXT-GENERATION PRODUCT
  2. Platform

Free Phishing Email Analysis Service

PreviousJob LogNextMiscellaneous

Last updated 1 year ago

Was this helpful?

Email communication is part of our daily life and it’s very important. Cybercriminals know this and steal your data via emails by sending messages that mimic an organization and make you believe that the email is legitimate. They make you to click on a phishing link to steal your credentials or download malware onto your computer.

In our daily email communications, we receive hundreds of emails, and some of these could be phishing attempts. Identifying a suspicious email as phishing requires a high level of technical cybersecurity knowledge and at least 3 hours (according to Gartner) to analyze.

Because of this challenging process, Keepnet has developed the Free Phishing Email Analysis Service that analyzes uploaded emails 168 times within 2 minutes with more than 20 email analysis services, including the URLs, Attachments, Sender SMTP IP, and Headers. This service quickly analyzes your uploaded email and then provides you with a detailed, comprehensive analysis report, so you can see if your email is phishing or not.

Secure your inbox with just a few clicks.

How to Use Free Phishing Email Analysis Service

Please follow these steps to learn how to use the free phishing email analysis tool.

  1. Go to address.

  2. Download your email to your computer as .eml or .msg.

    1. For Gmail users, please open your email, click on three-dot icon on the top right hand-side, click Download Message.

    2. For Outlook users, please open your email, click on File tab and then click Save As, select Type as Outlook Message Format (*.msg), click Save.

  3. Upload your email to the service.

  4. Enter your business email address to receive a full email analysis report.

  5. Click the Analyze button to analyze your email and get your detailed report in minutes.

To understand the details of each menu or any information on your detailed report, please go to the following section.

How to Understand Free Phishing Email Analysis Report

Please see the details of your email analysis report and understand each menu and information effectively.

  • Details: Find specifics like To, From, Subject, Sender IP, URL Count, Geolocation, and a Sender IP Blacklist Check.

  • Header: Analyze the Relay Information, Found Headers, and Received Header information.

  • Email Preview: Preview your original email.

  • URLs: Check the analyzed links to see if they are safe or flagged as phishing.

  • Attachments: Examine analyzed attachments to see if they are safe or flagged as malicious.

  • Share Your Report: If you wish, click the SHARE button to send the report results to up to 5 email addresses or copy the link to share it via the copied link.

  • Scan Another Email: To analyze a new email, click the Scan Another button at the top of the page.

FAQs

Q: What files can I upload?

A: You can upload .eml or .msg files up to 10 MB.

Q: Is there a limit on how many emails I can check?

A: No limit. Feel free to check as many emails as you need.

Q: Can I share the report?

A: Yes, you can share the report results with up to 5 email addresses directly from the tool or copy the link to share it as you prefer

Q: What about privacy?

A: The specifics about data handling and privacy can be checked .

💫
https://keepnetlabs.com/free-phishing-email-analysis
here