PhishTank Live
Idle
v3.0

Brand Threat Intelligence Dashboard

Real-time phishing & typosquat detection · PhishTank feed · AI-powered pattern engine

Incremental scan mode active — already-reviewed URLs will be skipped for existing brands.
URLs Scanned
0
from PhishTank feed
Threats Found
0
matches detected
Typosquats
0
pattern variations
Brands Monitored
0
in watchlist
Brand Match Type Threat Status
Threat Intelligence Results 0 records
🔍
No scan results yet
Add brands above and click Run Threat Scan
📦
Scan complete — results ready
0 threats · 0 URLs
⚠ Important Disclaimer Results are sourced from the PhishTank community feed and are provided for informational purposes only. PhishPin does not guarantee the accuracy, completeness, or timeliness of this data. Do not click on any flagged URLs directly — use sandboxed environments only. PhishPin is an automated intelligence-assistance tool and does not replace professional cybersecurity investigation. See footer for full terms.

Enforcement Services

PhishPin provides automated threat intelligence to support your enforcement and brand-protection workflows. Our services reduce analyst workload and accelerate response time across multiple threat vectors.

🎣

Anti-Phishing Enforcement

Automated detection of phishing domains impersonating your brand across the PhishTank feed and extended threat intelligence sources. Our engine uses multi-vector analysis including exact match, typosquatting, homoglyph detection, and subdomain abuse patterns. Contact us - Support@PhishPin.com

  • Real-time PhishTank feed monitoring
  • Pattern-based URL deception analysis
  • Threat level scoring (High / Medium / Low)
  • Active/Down status verification per domain
  • Exportable evidence for ICANN, registrar, and CERT complaints
  • Incremental scanning — no duplicate review overhead
  • Supports bulk brand watchlists for enterprise teams

Typical impact: Reduces phishing site dwell time by surfacing threats early. Results can be directly used in abuse desk submissions to hosting providers, domain registrars, and national CERTs.

Brand & Trademark Abuse Enforcement

Identify and document instances of brand name abuse used in phishing infrastructure. Covers lookalike domains, brand-keyword-stuffed URLs, and deceptive subdomains crafted to exploit consumer trust in your trademark. Contact us - Support@PhishPin.com

  • Lookalike domain identification (visual & phonetic)
  • Leet-speak and homoglyph brand substitution detection
  • Prefix/suffix abuse pattern recognition (e.g. login-brand.com)
  • Evidence package generation for legal action
  • UDRP / URS complaint data preparation support
  • Continuous monitoring across multi-brand portfolios
  • Integration-ready exports (CSV / XLSX) for legal teams

Trademark owners can use PhishPin output as a starting point for UDRP filings or cease-and-desist notices — always in conjunction with qualified legal counsel.

🛒

Marketplace Enforcement

Detect phishing and counterfeit-adjacent URLs that masquerade as legitimate e-commerce platforms, product pages, or payment gateways. Particularly valuable for brands with high consumer-facing digital commerce exposure. Contact us - Support@PhishPin.com

  • E-commerce URL impersonation detection
  • Fake payment gateway & checkout page identification
  • Brand-keyword abuse in marketplace-style URLs
  • Detection of fraudulent product domain patterns
  • Reports structured for platform trust & safety teams
  • Amazon, Flipkart, eBay brand protection workflows
  • Cross-brand portfolio scanning capability

Works best in combination with manual review by your brand protection team. Results are indicative and should be verified before formal escalation.

📱

Social Media Enforcement

Surface phishing URLs that mimic social media platforms or leverage social channels as attack vectors. Detect brand impersonation through social-platform-style URL patterns distributed via phishing campaigns.

  • Social-platform lookalike URL detection
  • Brand impersonation via fake social login pages
  • Credential harvesting page pattern recognition
  • Subdomain brand abuse (brand.attacker.com patterns)
  • Evidence compilation for platform reporting APIs
  • Instagram, LinkedIn, Twitter/X, Facebook abuse patterns
  • Tracking threat URLs distributed via social campaigns

Social media enforcement requires platform-specific reporting to be actioned. PhishPin provides detection intelligence; enforcement actions must go through official platform channels.

📧

Email Scam Enforcement

Detect phishing URLs embedded in email scam campaigns targeting your brand. BEC (Business Email Compromise), spoofed sender domains, and credential-phishing landing pages are identified through URL-level pattern analysis.

  • BEC & email spoofing domain detection
  • Phishing landing page URL identification
  • Credential harvesting page pattern recognition
  • Domain-level threat scoring for email security teams
  • Integration-ready output for DMARC/DKIM enforcement teams
  • Support for CERT, APWG, and anti-spam body reporting
  • Timestamped scan records for incident documentation

Email scam enforcement is most effective when PhishPin intelligence is combined with your email gateway logs and SIEM data for full campaign attribution.

⚙️

How PhishPin Works

PhishPin is a fully automated, single-operator threat intelligence tool. No installation, no agent deployment. Built for brand protection analysts, legal teams, and cybersecurity professionals.

  • Add brand keywords to the watchlist
  • PhishPin fetches the live PhishTank feed server-side
  • Multi-layer matching engine analyses every URL
  • Threats are scored, deduplicated, and status-checked
  • Export results as CSV or XLSX for downstream action
  • Incremental mode skips already-reviewed URLs on repeat scans
  • No data is stored on PhishPin servers — fully client-side processing

About PhishPin

PhishPin is an automated brand threat intelligence platform built to help organisations reduce the manual effort involved in monitoring phishing infrastructure targeting their brands.

60K+
URLs Checked Per Run
6
Detection Vectors
100%
Automated Analysis

Our Mission

Brand protection teams and cybersecurity analysts spend enormous amounts of time manually reviewing phishing URLs to identify threats targeting their organisations. PhishPin was built to automate that initial triage layer — pulling from trusted community feeds, applying intelligent matching, and surfacing only what matters.

We believe threat intelligence should be accessible, fast, and frictionless — no enterprise contracts, no complex deployments. A single PHP file, self-hosted, under your control. Contact us - Support@Phishpin.com

What We Do

PhishPin ingests the PhishTank community phishing feed — one of the most comprehensive public datasets of verified phishing URLs — and runs it through a multi-layer matching engine designed specifically for brand impersonation detection.

Every URL is analysed for exact brand matches, typosquatting, homoglyph substitution, leet-speak encoding, subdomain abuse, and prefix/suffix manipulation. Results are scored by threat level and checked for live status. Contact us - Support@Phishpin.com

Data & Privacy

PhishPin processes all data locally in your browser. The PHP proxy fetches the PhishTank feed on your server — no data is transmitted to PhishPin. Brand names you enter and scan results are stored only in your browser's local storage for incremental scan functionality.

You can clear all stored data at any time using the "Clear All Scan History" button in the dashboard. We do not collect, transmit, or store any user data.

Technology

Built as a zero-dependency, single-file PHP application. The pattern matching engine runs entirely in the browser via JavaScript. The server-side PHP proxy handles CORS-compliant feed fetching and URL status checking.

Libraries used: PapaParse (CSV parsing), SheetJS (XLSX export). No database required. Deploy anywhere with PHP + cURL support.

🔒 A Note on Responsible Use PhishPin is designed as an intelligence-assistance tool. The URLs surfaced in results are sourced from the PhishTank community database of reported phishing pages. While PhishTank employs community verification, PhishPin makes no independent determination of whether any specific URL is malicious. Results should always be reviewed by a qualified security analyst before being used as the basis for takedown requests, legal filings, or other enforcement actions. Automated tools reduce workload — they do not replace human judgment.