Brand Checker

Verify 'Official' company emails before you act.

Scammers impersonate trusted global brands like Apple, Google, and Amazon to steal your credit card details and login credentials. They use 'Lookalike Domains' that are designed to look identical to real corporate addresses at a quick glance.

Security Insight

Brand impersonation accounts for over 50% of all phishing attacks. Scammers rely on your existing trust in these companies to make you lower your guard when you see a 'Security Alert' or 'Account Statement'.

Identifies Lookalike Domains
Spots 'Urgent Security' lures
Protects your primary logins

How to spot a Fake Company Email

Large corporations have strict email security (SPF, DKIM, DMARC) and consistent communication styles. Watch out for these red flags in any brand-themed message.

The 'Lookalike' Sender Domain

The email looks like it's from @amazon.com but is actually from @amazon-support.net or @amozon.com (note the 'o').

Threats of 'Account Suspension'

Claiming your subscription has been canceled or your account locked to force you to click a link and 'verify' your details.

Links to unrelated websites

The 'Sign In' button in a 'Microsoft' email leads to a random URL like 'portal-login-secure-392.web.app'.

Requests for 'Update Payment'

Claiming a recent payment failed and asking you to enter your credit card details directly on a page linked in the email.

What IsThisSpam checks before you trust a sender

Quick verdicts are useful, but the real value is understanding why something looks safe, uncertain, or risky.

Non-standard Email Headers

Real company emails are sent through dedicated servers. Check the 'Reply-To' address—if it's different from the sender, it's a scam.

Generic 'Dear User' greetings

Companies you have an account with will almost always address you by your real name as it appears on your profile.

Formatting & Image Quality

Look for blurry logos, inconsistent fonts, or the use of old 'Facebook' branding instead of the modern 'Meta' corporate identity.

Unusual attachments (.html, .htm)

A 'Statement' or 'Invoice' attached as an HTML file is a technique used to bypass email filters and host a local phishing form.

Related guides

Use the checker for the fast answer, then read the deeper guidance for recurring scam patterns.

Fake HR Email Checker

Learn about internal company impersonation and payroll scams.
Read the guide

Email Header Analyzer

Deep dive into the technical details of an email to prove its origin.
Read the guide

FAQ

These are the questions people usually ask right before they click, reply, or pay.

Got a screenshot or attachment? Our AI can analyse it.

Free scan first, deeper analysis when you need it

Check the sender before you trust the message.

Start with a fast scan, then move to SuperScan when the message involves money, account access, or sensitive documents.