The Phishing Email Detector AI Agent is a sophisticated tool designed to help users identify and analyze potential phishing attempts in received emails. With this comprehensive solution, users can quickly determine if an email poses a security threat through multi-layered analysis
The Phishing Email Detector AI Agent is a sophisticated tool designed to help users identify and analyze potential phishing attempts in received emails. With this comprehensive solution, users can quickly determine if an email poses a security threat through multi-layered analysis. Key functionalities include:
This project is built using the BeeAI Framework, a powerful TypeScript framework designed for building production-ready multi-agent systems. The BeeAI Framework provides
The Phishing Email Detector leverages BeeAI's agent architecture to create a specialized security agent with advanced analysis capabilities, combining multiple tools and AI models for comprehensive phishing detection.
gpt-4o
(most accurate) or gpt-4o-mini
(faster) models.1{ 2 "email": "security@bank-secure.com", 3 "subject": "Your Account Requires Immediate Verification", 4 "content": "Dear Customer, We have detected unusual activity on your account. Please click the link below to verify your identity and secure your account: https://secure-verification.com/verify?id=12345", 5 "headers": "From: security@bank-secure.com
Return-Path: <different@suspicious.com>
Authentication-Results: spf=fail; dkim=fail", 6 "modelName": "gpt-4o", 7 "emailsToAlert": ["your-email@example.com"] 8}
The repository includes example files to help you understand the expected input format and see how the detector differentiates between phishing and legitimate emails:
These examples can be used as templates for testing the detector or understanding the format requirements.
The current pricing model is under development. Please check Apify platform updates for the latest information about usage costs and pricing specifics.
gpt-4o
or gpt-4o-mini
(required)1{ 2 "rawResponse": "Based on the comprehensive analysis of the email's headers, sender reputation, content, and URLs, here's the detailed assessment:
1. **Classification:** Phishing
2. **Risk Score:** 9.0
3. **Risk Level:** Critical
4. **Detailed Reasons for the Classification:**
- **Header Authentication:** The SPF and DKIM checks have failed, indicating potential spoofing. The mismatched 'From' and 'Return-Path' headers suggest the email may be deceitful.
- **Sender Reputation:** The sender email 'janedoe@gmail.com' is a common personal email domain not aligned with the supposed sender 'security@bank-secure.com'. This mismatch is typical in phishing schemes.
- **Content Analysis:** The email uses urgency with phrases like "unusual activity" and "immediate verification" to coax quick, uninformed action. The impersonal greeting ("Dear Customer") and suspicious link further hint at phishing.
- **URL Safety:** The domain "secure-verification.com" is generic and not affiliated with any known brand, which is suspicious and aligns with phishing tactics aimed at credential harvesting.
5. **Recommendations for the User:**
- Do not click on any links or download attachments from this email.
- Verify the legitimacy by directly contacting the supposed sender (bank) using official contact details obtained independently (e.g., from a known website or bank statement).
- Report the email to your email provider as phishing to help prevent future attacks.
- Consider setting up additional security measures, like multi-factor authentication, for your email and bank accounts.
This email exhibits several red flags for phishing and should be treated with extreme caution.", 3 "classification": "Phishing", 4 "riskScore": 9.5, 5 "riskLevel": "Critical", 6 "reasons": [ 7 "The email headers show failed SPF and DKIM checks, indicating potential spoofing.", 8 "The 'From' address does not match the 'Return-Path', suggesting email spoofing.", 9 "The sender email 'janedoe@gmail.com' does not align with the 'From' address, indicating a mismatch.", 10 "The email content uses urgency and pressure tactics, common in phishing attempts.", 11 "The URL 'https://secure-verification.com/verify?id=12345' is suspicious due to its generic domain and lack of association with a known entity.", 12 "The email lacks personalization and uses generic greetings, typical of phishing emails.", 13 "The sender's reputation is critical due to the mismatch and the nature of the email content." 14 ], 15 "recommendations": [ 16 "Do not click on any links or download attachments from this email.", 17 "Verify the legitimacy of the email by contacting the supposed sender through official channels.", 18 "Report the email to your email provider as phishing.", 19 "Ensure your email security settings are up to date to filter out similar threats.", 20 "Educate yourself on recognizing phishing attempts to avoid future risks." 21 ], 22 "senderAnalysis": { 23 "reputation_score": 9, 24 "known_malicious": false, 25 "risk_level": "critical" 26 }, 27 "urlAnalysis": { 28 "suspicious_count": 0, 29 "highest_risk_score": 0 30 }, 31 "headerAnalysis": { 32 "authentication_score": -10, 33 "is_suspicious": true 34 }, 35 "contentAnalysis": { 36 "sentiment": "neutral", 37 "urgency_level": 0, 38 "suspicious_phrases": [] 39 }, 40 "input": { 41 "email": "janedoe@gmail.com", 42 "subject": "Your Account Requires Immediate Verification", 43 "content": "Dear Customer, We have detected unusual activity on your account. Please click the link below to verify your identity and secure your account: https://secure-verification.com/verify?id=12345", 44 "headers": "From: security@bank-secure.com
Return-Path: <different@suspicious.com>
Authentication-Results: spf=fail; dkim=fail", 45 "modelName": "gpt-4o" 46 } 47}
The Phishing Email Detector AI Agent can be integrated into your existing security infrastructure in several ways:
The actor's cost is based on Apify platform usage (memory allocation) and OpenAI token consumption. The following events and prices apply:
1{ 2 "actor-start-gb": { 3 "eventTitle": "Actor start per 1 GB", 4 "eventDescription": "Flat fee for starting an Actor run for each 1 GB of memory.", 5 "eventPriceUsd": 0.005 6 }, 7 "openai-100-tokens-gpt-4o": { 8 "eventTitle": "Price per 100 OpenAI tokens for gpt-4o", 9 "eventDescription": "Flat fee for each 100 gpt-4o tokens used.", 10 "eventPriceUsd": 0.001 11 }, 12 "openai-100-tokens-gpt-4o-mini": { 13 "eventTitle": "Price per 100 OpenAI tokens for gpt-4o-mini", 14 "eventDescription": "Flat fee for each 100 gpt-4o-mini tokens used.", 15 "eventPriceUsd": 0.00025 16 } 17}
Disclaimer: This tool is intended for identifying potential phishing attempts through comprehensive analysis. While it provides detailed insights, always follow your organization's security protocols and consult with IT security experts for suspicious cases.
Yes, if you're scraping publicly available data for personal or internal use. Always review Websute's Terms of Service before large-scale use or redistribution.
No. This is a no-code tool — just enter a job title, location, and run the scraper directly from your dashboard or Apify actor page.
It extracts job titles, companies, salaries (if available), descriptions, locations, and post dates. You can export all of it to Excel or JSON.
Yes, you can scrape multiple pages and refine by job title, location, keyword, or more depending on the input settings you use.
You can use the Try Now button on this page to go to the scraper. You’ll be guided to input a search term and get structured results. No setup needed!