Real-time phishing & typosquat detection · PhishTank feed · AI-powered pattern engine
PhishPin provides automated threat intelligence to support your enforcement and brand-protection workflows. Our services reduce analyst workload and accelerate response time across multiple threat vectors.
Automated detection of phishing domains impersonating your brand across the PhishTank feed and extended threat intelligence sources. Our engine uses multi-vector analysis including exact match, typosquatting, homoglyph detection, and subdomain abuse patterns. Contact us - Support@PhishPin.com
Typical impact: Reduces phishing site dwell time by surfacing threats early. Results can be directly used in abuse desk submissions to hosting providers, domain registrars, and national CERTs.
Identify and document instances of brand name abuse used in phishing infrastructure. Covers lookalike domains, brand-keyword-stuffed URLs, and deceptive subdomains crafted to exploit consumer trust in your trademark. Contact us - Support@PhishPin.com
Trademark owners can use PhishPin output as a starting point for UDRP filings or cease-and-desist notices — always in conjunction with qualified legal counsel.
Detect phishing and counterfeit-adjacent URLs that masquerade as legitimate e-commerce platforms, product pages, or payment gateways. Particularly valuable for brands with high consumer-facing digital commerce exposure. Contact us - Support@PhishPin.com
Works best in combination with manual review by your brand protection team. Results are indicative and should be verified before formal escalation.
Surface phishing URLs that mimic social media platforms or leverage social channels as attack vectors. Detect brand impersonation through social-platform-style URL patterns distributed via phishing campaigns.
Social media enforcement requires platform-specific reporting to be actioned. PhishPin provides detection intelligence; enforcement actions must go through official platform channels.
Detect phishing URLs embedded in email scam campaigns targeting your brand. BEC (Business Email Compromise), spoofed sender domains, and credential-phishing landing pages are identified through URL-level pattern analysis.
Email scam enforcement is most effective when PhishPin intelligence is combined with your email gateway logs and SIEM data for full campaign attribution.
PhishPin is a fully automated, single-operator threat intelligence tool. No installation, no agent deployment. Built for brand protection analysts, legal teams, and cybersecurity professionals.
PhishPin is an automated brand threat intelligence platform built to help organisations reduce the manual effort involved in monitoring phishing infrastructure targeting their brands.
Brand protection teams and cybersecurity analysts spend enormous amounts of time manually reviewing phishing URLs to identify threats targeting their organisations. PhishPin was built to automate that initial triage layer — pulling from trusted community feeds, applying intelligent matching, and surfacing only what matters.
We believe threat intelligence should be accessible, fast, and frictionless — no enterprise contracts, no complex deployments. A single PHP file, self-hosted, under your control. Contact us - Support@Phishpin.com
PhishPin ingests the PhishTank community phishing feed — one of the most comprehensive public datasets of verified phishing URLs — and runs it through a multi-layer matching engine designed specifically for brand impersonation detection.
Every URL is analysed for exact brand matches, typosquatting, homoglyph substitution, leet-speak encoding, subdomain abuse, and prefix/suffix manipulation. Results are scored by threat level and checked for live status. Contact us - Support@Phishpin.com
PhishPin processes all data locally in your browser. The PHP proxy fetches the PhishTank feed on your server — no data is transmitted to PhishPin. Brand names you enter and scan results are stored only in your browser's local storage for incremental scan functionality.
You can clear all stored data at any time using the "Clear All Scan History" button in the dashboard. We do not collect, transmit, or store any user data.
Built as a zero-dependency, single-file PHP application. The pattern matching engine runs entirely in the browser via JavaScript. The server-side PHP proxy handles CORS-compliant feed fetching and URL status checking.
Libraries used: PapaParse (CSV parsing), SheetJS (XLSX export). No database required. Deploy anywhere with PHP + cURL support.