Skip to main content
TrustRadius
Phish Report

Phish Report

Overview

What is Phish Report?

Phish Report, developed by Phish Report Ltd, is a brand protection service designed to assist organizations in detecting, disrupting, and deterring consumer phishing attacks. According to the vendor, Phish Report offers various features that can benefit businesses of all sizes. These features include:...

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Email Spam Filter Software

Be the first one in your network to review Phish Report, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

Sorry, this product's description is unavailable

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

Alternatives Pricing

What is MX Layer?

MX Layer is an enterprise security company based in the United States, focusing on providing cloud-based solutions for email security, business continuity, data loss prevention and email archiving services. MX Layer aims to ensure that their comprehensive email security platform protects company's…

What is Paubox Email Suite?

Paubox, headquarted in San Francisco, offers their HIPAA compliant encrypted email service, the Paubox Email Suite, which features Encrypted Email, Inbound Security with ExecProtect, and Email DLP under one subscription.

Return to navigation

Product Details

What is Phish Report?

Phish Report, developed by Phish Report Ltd, is a brand protection service designed to assist organizations in detecting, disrupting, and deterring consumer phishing attacks. According to the vendor, Phish Report offers various features that can benefit businesses of all sizes. These features include:

Automated phishing site analysis: Phish Report automatically analyzes phishing sites, identifies the best ways to report them, and speeds up the takedown process. It goes beyond WHOIS lookups and utilizes a verified abuse contact database to determine the true hosting provider. Phish Report captures evidence screenshots using a real Chrome browser and can detect and bypass anti-analysis techniques.

Collaborate on cases with your team: The Phish Report case timeline tracks every report sent by the team and the response from the hosting provider, ensuring efficient collaboration. It helps avoid duplicating effort, enables follow-up with unresponsive hosting providers, and allows users to understand the timeline of an attack.

Classify known phishing kits and discover new variants: Phish Report's open-source language enables users to create detections for phishing kits impersonating their brand. It scans millions of domains daily, checking each against signatures of phishing kits to identify matches. Real-time alerts are triggered as soon as a new site matches signatures for a specific brand.

Website monitoring and takedown: Phish Report ingests millions of URLs daily from threat intelligence feeds, scanning for abuse. Real-time feeds of new URLs allow users to detect phishing sites within minutes of their creation. It checks every registered domain name for brand impersonation and can identify malicious sites attempting to hide on compromised hosts.

Analyse a phishing site: Users can analyze a phishing site by entering its URL and selecting specific conditions like country and user agent. Phish Report provides automated analysis and captures evidence screenshots using a real Chrome browser. It also identifies known threat actors, anti-analysis techniques, and specific phishing kits in use on a page.

Indicator Of Kit: Phish Report offers open-source detection rules for phishing site techniques, kits, and threat actors. These simple detection rules, based on Sigma language, come with descriptions, tags, and links to related resources. Users can use these rules to identify fingerprints of known threat actors, discover anti-analysis techniques, and classify specific phishing kits.

Look up the hosting providers for any website: Phish Report uses a combination of WHOIS data, RDAP, and a curated list of shared hosting providers to identify website hosting providers. WHOIS data provides details about domain ownership and registration, RDAP offers a standardized format for accessing registration data, and the curated list enhances the identification process.

Phishing detection doesn't have to be a black box: Phish Report scans millions of sites daily, looking for abuse and impersonation of brands. Simple signatures are used to scan each site, alerting users if any match their brand's impersonation. Real-time URL feeds and accurate detection signatures ensure high-confidence alerts.

Phish Report Features

  • Supported: Reporting/Analytics
  • Supported: Spam Blocker
  • Supported: Spam Detection

Phish Report Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWeb-Based
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation