Drag & drop an .eml file here
or click to browse
By using this Email Analysis Tool, you acknowledge and agree to the following:
1. Purpose: This tool analyzes email files (.eml) for security threats including phishing, spoofing, malware, and spam indicators. Results are provided for informational purposes only and do not constitute professional security advice.
2. Data Processing: Email content you submit is processed on our secure infrastructure. Files are temporarily cached for up to 1 hour for analysis purposes and are not permanently stored. If you request an AI-powered summary, the analysis data (not the original email) is sent to a third-party AI service for processing.
3. Email Collection: Your email address may be requested to continue using the tool after the free analysis limit, to generate an AI summary, or to receive a PDF report. When provided, your email address will be stored as a lead along with analysis metadata (sender, subject, threat score). Your email address may be verified for validity using a third-party email verification service.
4. No Guarantee: While we strive for accuracy, no automated analysis tool can detect all threats. Always exercise caution with suspicious emails regardless of the analysis results.
5. Privacy: We do not share your submitted email content with third parties. Stored lead data is subject to automatic deletion based on our data retention policy.
6. Acceptable Use: This tool is intended for legitimate security analysis. Do not submit emails containing illegal content or use results for malicious purposes.
7. Liability: We are not liable for any damages arising from reliance on the analysis results provided by this tool.