Check the account directly
Open the service from a bookmark or typed address, not the email.
Threats are commonly used to pull people into fake login pages.
Score a suspicious email from non-secret signals only: sender mismatch, urgency, links, attachments, sensitive requests, grammar, and context. No email body, passwords, links, codes, or private details needed.
Phishing risk
66/100
Suspicious. The score rises as social engineering signals stack up.
Risk
66/100
Suspicious
High signals
0
18+ point checks
Secret fields
0
No private input
Copy or export the category-only checklist. It intentionally contains no email body, links, sender address, passwords, codes, payment details, or account identifiers.
Phishing email risk checklist Privacy note: This checklist never needs the email body, sender address, links, attachments, passwords, 2FA codes, payment details, or private account data. Risk level: 66/100 (Suspicious) Sender mismatch: Not sure Urgency: Account threat Links and domains: Not sure Attachment: No attachment Payment or password request: Verify personal details Grammar and tone: Slightly off Context: Unexpected but possible Scored checklist: 1. [+16] Urgency: Check the account directly - Open the service from a bookmark or typed address, not the email. 2. [+12] Sender mismatch: Pause until the sender is verified - Ask the sender through another channel whether they sent it. 3. [+12] Links and domains: Do not click to investigate - Use safe preview tools or ask the sender through another channel. 4. [+12] Payment or password request: Do not send private details by email - Use the official service or a known support number instead. 5. [+8] Context: Confirm why it arrived - Check the official account, order, ticket, or invoice system. 6. [+6] Grammar and tone: Compare with a real message - Look at an older trusted email from the same sender or service. 7. [+0] Attachment: No attachment risk found - Continue with the other checks. Recommended next steps: - Pause before acting. Verify the message from a trusted channel outside the email. - Open full sender details and compare the domain against a trusted source. - Do not click email links. Type the known website address or use a bookmark. Related Passlock tools: - Breach response checklist: https://passlock.to/tools/breach-response-checklist - 2FA recovery checklist: https://passlock.to/tools/two-factor-recovery-checklist - Password policy generator: https://passlock.to/tools/password-policy-generator - Secure note template: https://passlock.to/tools/secure-note-template - Passkey readiness checklist: https://passlock.to/tools/passkey-readiness-checklist Generated locally by https://passlock.to/tools/phishing-email-checklist
Open the service from a bookmark or typed address, not the email.
Threats are commonly used to pull people into fake login pages.
Ask the sender through another channel whether they sent it.
Uncertainty should slow down any sensitive action.
Use safe preview tools or ask the sender through another channel.
Clicking can expose you to fake pages or malicious downloads.
Use the official service or a known support number instead.
Identity details can be used for takeover or fraud.
Check the official account, order, ticket, or invoice system.
Unexpected messages need an independent source of truth.
Look at an older trusted email from the same sender or service.
Small inconsistencies are useful context when paired with other signs.
Continue with the other checks.
No attachment removes one malware delivery path.
No. Use only broad categories. Do not paste email bodies, sender addresses, links, passwords, 2FA codes, payment details, or account identifiers.
Risk rises when sender mismatch, urgency, lookalike links, unexpected attachments, money requests, password requests, and odd context stack together.
Stop using the message, switch to a trusted device, change exposed passwords, review sessions, and use the breach response checklist.
Passlock for Mac · $14 lifetime
The browser is fine for one-off checks. The app keeps your passwords, passkeys, and notes locked behind your Mac — offline by default, no cloud account, no subscription.
Vault
All items
Bank · login
support@bank.com
iCloud
you@icloud.com
GitHub
@you
Email · personal
you@kitze.io