Phish Radar - Phishing & Domain Security Intelligence
Pricing
$50.00 / 1,000 phishing detection scans
Phish Radar - Phishing & Domain Security Intelligence
AI-powered phishing detection, domain trust scoring, and brand impersonation monitoring. Analyzes URLs for typosquatting, homoglyph attacks, suspicious DNS patterns, and SSL anomalies. Zero external API dependencies — uses pure DNS/TLS protocols.
Pricing
$50.00 / 1,000 phishing detection scans
Rating
0.0
(0)
Developer
daehwan kim
Actor stats
0
Bookmarked
2
Total users
1
Monthly active users
3 days ago
Last modified
Categories
Share
Phish Radar - Phishing Detection & Brand Monitoring MCP Server
Real-time phishing detection and brand monitoring system for AI agents. Analyzes URLs and domains for phishing indicators, typosquatting, homoglyphs, and lookalike domains.
Features
1. Phishing Detection (phishing_detect)
Comprehensive URL/domain analysis with:
- Typosquatting detection - Identifies domains similar to known brands (Levenshtein distance)
- Homoglyph detection - Catches visually similar character substitutions (0/O, 1/l/I, etc.)
- Domain age analysis - Detects recently registered suspicious domains
- SSL certificate inspection - Flags free certificates (Let's Encrypt) when combined with brand similarity
- DNS records - Checks for MX, SPF, DKIM, DMARC records
- Hosting location - Identifies suspicious geography patterns
Score: 0-100 phishing confidence
- PHISHING (70+): Block immediately
- SUSPICIOUS (40-69): Review recommended
- SAFE (<40): Low risk
2. Domain Trust Score (domain_trust)
Evaluates domain trustworthiness (0-100) based on:
- Email infrastructure (MX, SPF, DKIM, DMARC) - 25 points
- SSL certificate type (EV > OV > DV) - 20 points
- TLD reputation - 20 points
- Nameserver reputation - 15 points
- DNS records - 5 points
Levels:
- HIGHLY_TRUSTED (80+): Enterprise-grade domain
- TRUSTED (60-79): Legitimate domain
- NEUTRAL (40-59): Unproven domain
- SUSPICIOUS (20-39): Warning signs present
- UNTRUSTED (<20): High-risk domain
3. Brand Monitor (brand_monitor)
Detects lookalike domains targeting your brand:
- Typosquats - Single character swaps/deletions (paypa1.com vs paypal.com)
- Homoglyphs - Visually confusing substitutions
- Keyword additions - Security-related additions (paypal-secure.com)
- TLD variations - Same domain on different extensions (paypal.xyz)
Returns high-risk domains that actually exist with full risk assessment.
Usage
Example 1: Check a Suspicious URL
{"toolName": "phishing_detect","input": {"url": "https://paypa1-secure.com/login"}}
Response:
{"url": "https://paypa1-secure.com/login","domain": "paypa1-secure.com","verdict": "PHISHING","confidence": 0.97,"phishing_score": 94,"signals": {"typosquat_of": "paypal.com","typosquat_distance": 1,"homoglyph_detected": true,"homoglyph_count": 1,"domain_age_days": 3,"ssl_issuer": "Let's Encrypt","ssl_free_cert": true,"has_mx_records": false,"suspicious_tld": false,"dns_a_records": ["185.234.xx.xx"],"hosting_country": "RU"},"action": "BLOCK","details": "High-confidence phishing domain detected (score: 94). Domain is a typosquat of paypal.com (distance: 1). Contains 1 homoglyph character substitution. Uses free SSL certificate (Let's Encrypt) - commonly abused. No MX records configured - not set up for legitimate email."}
Example 2: Check Domain Trust
{"toolName": "domain_trust","input": {"domain": "stripe.com"}}
Response:
{"domain": "stripe.com","trust_score": 92,"trust_level": "HIGHLY_TRUSTED","factors": {"domain_age_days": null,"has_mx": true,"has_spf": true,"has_dkim": true,"has_dmarc": true,"ssl_type": "EV","ssl_issuer": "DigiCert","has_ssl": true,"tld_risk": "LOW","nameservers": ["ns1.stripe.com", "ns2.stripe.com"],"a_records_count": 4}}
Example 3: Monitor Brand Lookalikes
{"toolName": "brand_monitor","input": {"brand_domain": "stripe.com","limit": 10}}
Response:
{"brand": "stripe.com","brand_name": "stripe","lookalikes_found": 8,"domains": [{"domain": "str1pe.com","exists": true,"risk": "HIGH","type": "homoglyph","tld_risk": "LOW"},{"domain": "stripe-secure.com","exists": true,"risk": "HIGH","type": "keyword_addition","tld_risk": "LOW"},{"domain": "stripee.com","exists": true,"risk": "MEDIUM","type": "insertion","tld_risk": "LOW"}],"analysis_time_ms": 2847}
Implementation Details
No External API Dependencies
- DNS Queries: Native Node.js
dns/promisesmodule - SSL Certificates: Node.js
tlsmodule for direct connections - WHOIS: Direct TCP port 43 protocol (future enhancement)
- GeoIP: Simplified IP-to-country mapping (for production, integrate MaxMind)
Known Brands Database
Includes 80+ major brands across:
- Financial Services (PayPal, Stripe, Square, etc.)
- Tech Companies (Apple, Google, Microsoft, etc.)
- Cryptocurrency (Coinbase, Kraken, Binance, etc.)
- Cloud Providers (AWS, Azure, Google Cloud, etc.)
- E-commerce (Amazon, eBay, Shopify, etc.)
Easily extensible in src/data/known_brands.js.
Suspicious TLDs
Monitors 40+ high-risk TLDs commonly used in phishing:
- Cheap registration TLDs:
.xyz,.top,.click,.bid - Free TLDs:
.tk,.ml,.ga,.cf - Cryptocurrency scams:
.btc,.eth,.crypto - Sanctioned regions:
.ru,.ir,.kp
Phishing Score Calculation
High-Risk Signals (Add Points)
- Typosquat distance 1: +35 points
- Typosquat distance 2: +25 points
- Homoglyph detected: +20 points
- Suspicious TLD: +15 points
- Free SSL + typosquat: +15 points
- No MX + typosquat: +10 points
- Hosting in RU + typosquat: +10 points
Low-Risk Signals (Subtract Points)
- Has MX records: -5 points
- Trusted CA cert: -5 points
Final Score Clamped: 0-100
Confidence Levels
- 70+ (PHISHING): 0.70-0.99 confidence → BLOCK
- 40-69 (SUSPICIOUS): 0.50-0.95 confidence → REVIEW
- <40 (SAFE): 0.95+ confidence → ALLOW
Pricing
- $0.05 per tool call (per domain/URL analyzed)
- Bulk monitoring: $0.05 × number of domains checked
Example: Monitoring 100 brand lookalikes = $5.00 per execution
Implementation Notes
Security Considerations
- No WHOIS PII collection: Personal information (owner names, emails) excluded per GDPR
- No certificate validation bypass: Uses system trust stores
- Rate limiting: Implement externally to avoid DNS query floods
- Timeout protection: 5-second SSL connection timeout
Performance
- Parallel DNS queries for speed
- Batch processing for large domain lists (10 concurrent)
- Caching at application level (not in Actor)
Future Enhancements
- WHOIS Integration: For domain registration date analysis
- GeoIP Database: MaxMind for accurate IP location
- SSL Certificate History: Certificate Transparency logs
- Reputation Scoring: Integration with Phishing/Malware databases
- Machine Learning: Pattern recognition for new phishing techniques
API Signature
All tools follow MCP standard with JSON input/output.
Tool Request Format
{"toolName": "phishing_detect|domain_trust|brand_monitor","input": {// tool-specific inputs}}
Error Response
{"error": "Error description","tool": "tool_name"}
Testing
# Local testingnpm installnode src/main.js# With Apify SDK (when deployed)apify call phish-radar --input input.json
Maintenance
- Update
known_brands.jsquarterly with emerging platforms - Monitor
suspicious_tlds.jsfor new high-abuse extensions - Review phishing signal weights annually based on threat patterns
Support
For brand additions or TLD updates, modify:
- Brand list:
src/data/known_brands.js - TLD list:
src/data/suspicious_tlds.js
Version: 1.0 Node.js: 18+ License: Private (ntriq)