Scam Checker

Free Scam Checker: Check Links, Emails, Texts & Websites

Not sure whether to trust that text, email, or website? Paste the content below and our tool will analyse it for common fraud patterns. We check for phishing tactics, malicious URLs, impersonation attempts, and urgency-based manipulation.

Analysis happens in your browser. We do not store what you paste. Results are instant.

Scam Checker

Paste content, upload an image, or drop a file to check for scam signals.

Privacy guarantee: Your content is analysed locally and never transmitted to our servers.
This tool provides guidance. Always verify requests through official channels when in doubt.

What is a scam checker, and when should I use one?

A scam checker is a tool that scans a message, email, link, or website for the patterns scammers actually use — urgency, impersonation of trusted brands, lookalike domains, requests for OTPs or gift cards, and dozens of other tells. Instead of guessing, you get a clear risk rating with the specific red flags called out.

Use this scam checker whenever a message lands in your inbox or DMs and your gut says "wait — is this real?" It takes seconds and your content is never sent to our servers.

Common situations this tool handles

  • "I got a scam message — is this a scam?"Paste it into the checker above, or use the dedicated SMS and WhatsApp scam checker for messaging-app scams.
  • "Someone asked me for my OTP / verification code"That's almost always fraud. Run the message through the SMS/WhatsApp checker and never share codes with anyone.
  • "I clicked a suspicious link — what now?"Open the have I been scammed damage-control checklist — it walks you through the first hour after a phishing click.
  • "Is this website legit, or is it a fake?"Use the link / URL scam checker — it flags lookalike domains, new registrations, and known phishing patterns.
  • "Has anyone else been targeted by this?"Search the community scam report database for the phone number, URL, or email address.
  • "Is this email a phishing attempt?"Paste the email body into the email phishing checker — fake invoices and credential-theft attempts follow predictable templates.

Step-by-Step: How to Use This Scam Detection Tool

Using the checker is simple. Copy the suspicious content — whether it is a text message, the body of an email, or a URL someone sent you — and paste it into the input box above. Analysis begins automatically.

Within seconds, you will receive a risk rating (Low, Medium, or High) along with specific red flags we detected. Each flag is explained in plain language so you understand exactly why something appears suspicious.

No automated tool is perfect. If you remain uncertain after checking, contact the supposed sender through official channels. For example, if someone claims to be your bank, call the number on your card — not the number in the suspicious message.

Fraud Patterns and Warning Signs This Tool Detects

Urgency and Threat Language

Scammers create panic to prevent clear thinking:

  • • "Act immediately or lose access to your account"
  • • "Your package will be returned if you do not pay now"
  • • Threats of arrest, lawsuits, or account termination
  • • Artificial deadlines ("respond within 24 hours")

Unusual Payment and Information Requests

Legitimate organisations do not operate this way:

  • • Requests for passwords, PINs, or security codes
  • • Payment via gift cards, cryptocurrency, or wire transfer
  • • Asking you to read back a verification code
  • • Requests to download software for "security"

Brand and Authority Impersonation

Fraudsters exploit trust in known organisations:

  • • Banks and financial services (Chase, HSBC, PayPal)
  • • Delivery companies (DHL, FedEx, UPS, postal services)
  • • Government agencies (tax authorities, immigration)
  • • Technology companies (Microsoft, Apple, Amazon)

Suspicious URL Structures

Malicious links often have telltale patterns:

  • • Misspelled domains (e.g., paypa1.com, arnazon.com)
  • • Real brand in subdomain (paypal.scam-domain.com)
  • • URL shorteners hiding the actual destination
  • • Unusual top-level domains for known brands

Already Clicked or Responded?

Not sure if it already happened?

If you are thinking "I clicked a scam link" or "I gave my details to a scammer", do not panic. We have a dedicated tool to help you assess the damage and take control.

Immediate steps if you already acted:

  • Entered credentials on a fake site? Change that password immediately on the real website. Enable two-factor authentication if available. Use a unique password for each account.
  • Provided payment card details? Contact your bank or card issuer immediately. Request a new card number. Monitor statements for unauthorised charges.
  • Sent money to a scammer? Contact your bank or payment service immediately. File a report with local law enforcement. Report the scam to consumer protection agencies.
  • Gave remote access to your device? Disconnect from the internet. Run a full antivirus scan. Change all passwords from a different device. Consider professional malware removal.

Reporting scams helps protect others. Consider reporting to your local consumer protection agency and the platform where you received the scam.

What to Do After Checking Your Suspicious Content

  1. 1
    Review the risk assessment above. If the result shows Medium or High risk, treat the message as potentially fraudulent. Do not click links, call numbers, or reply to the sender.
  2. 2
    Verify through official channels. If the message claims to be from a company or organisation, contact them directly using contact information from their official website — never from the suspicious message itself.
  3. 3
    Avoid clicking embedded links. Instead of clicking, type the official website address directly into your browser. Scammers rely on you automattically clicking without examining the destination.
  4. 4
    Block and report the sender. Most messaging platforms allow you to report scam messages. This helps protect other users from the same campaign.
  5. 5
    Learn more about specific scam types. Read our comprehensive guides on identifying phishing, impersonation, and online fraud to recognise future threats.

Pattern Detection

We analyze thousands of scam reports to identify common keywords, phrasing, and technical tricks used by fraudsters.

Privacy First

Your data is analyzed securely. We don't store your personal messages, emails, or the URLs you check.

Instant Results

Get an immediate risk assessment. No sign-ups, no waiting, and no technical jargon. Just clear advice.

url5/21/2026
ghiseul.lat/ro
phone5/21/2026
htt****msd
url5/21/2026
https://www.mechaniitid.site/rs13000-...

"It's scam site Don't Trust her It Hacks your all Accounts "

url5/21/2026
https://rs13000-eid-al-adha-cash-tran...
url5/21/2026
https://usepost123.cfd/x3/_ra/in/1/in...
url5/20/2026
https://maps.google.no/url?q=https%3A...

"recieved in an email"

Frequently Asked Questions