3.4 billion phishing emails are sent every day — FBI

Your browser is leaking.
PhishClean stops it.

Catches phishing pages, leaked secrets, and stolen credentials in real time — 100% on your device.

Live on Chrome, Firefox & Edge No account required · No credit card

🔒 secure-bankofamerica.com/login
Email or username
john.doe@gmail.com
Password
|
Sign In

Phishing Page Detected

This page mimics Bank of America but sends your credentials to a different server.

Form action: http://185.43.12.9/collect
Expected domain: bankofamerica.com

PhishClean detects the domain mismatch before you submit

Try these right now — no install, no signup, 100% private

View all 6 free tools →

You're more exposed than you think
🎣

Phishing pages that look identical to the real thing

A pixel-perfect clone of your bank's login, hosted on secure-bankofamerica.com. You type your password. It goes to someone in another country. Chrome Safe Browsing might catch it hours later — if someone reports it first. Most phishing pages only exist for a few hours, which is exactly long enough to harvest credentials and disappear before the blocklist updates.

🔑

Tokens leaking from URLs and storage

JWTs in query strings get logged everywhere — analytics, proxies, browser history, every extension with URL access. One XSS vulnerability on the page and localStorage tokens are gone too.

👻

Auth headers sent to the wrong server

A compromised third-party widget quietly copies your Authorization headers to an external domain. Your session is hijacked. The page looks completely normal. You'd never know unless something was watching the network requests.

🔐

Secrets in client-side code

AWS keys (AKIA...), Stripe live keys, GitHub tokens — hardcoded in JavaScript bundles where any visitor can read them. Bots scrape for these patterns constantly. One leaked key can cost thousands.

🔓

HTTPS silently stripped to HTTP

Coffee shop WiFi. A man-in-the-middle downgrades your connection. You see your bank's real content — unencrypted.

Everything PhishClean watches for

Link Safety Tooltips

Hover any link to see a safety check — green tick, yellow caution, or red alert.

Free
🔒

Password Field Detection

Flags pages with login forms that could be phishing.

Free
🌐

Domain Mismatch

Catches forms that submit credentials to a different domain.

Free
🔎

Secret Leak Scanner

Detects AWS, Stripe, GitHub, Slack, Twilio, SendGrid keys in page source.

Pro
🔐

Private Key Detection

Catches exposed RSA/EC private keys — critical security risk.

Pro
🔓

HTTPS Downgrade Alerts

Warns when you're redirected from HTTPS to HTTP.

Pro
⚠️

HTTP Password Warning

Alerts when password fields appear on unencrypted pages.

Pro
📄

JWT Token Leak Detection

Spots JWT tokens exposed directly in URLs.

Pro
📡

Auth Header Monitoring

Detects Authorization headers sent to third-party domains.

Pro
💻

Hidden Iframe Detection

Finds invisible iframes that could capture credentials.

Pro
👁

Visual Anomaly Heuristics

Detects unusual form structures that don't match typical logins.

Pro
🗃

Token Storage Scanning

Checks localStorage for exposed tokens and secrets.

Pro
🔍

URL Parameter Scanning

Flags sensitive params like token, auth, session in URLs.

Pro
🌐

HTTPS Context Switch

Detects navigation from HTTPS sites to HTTP pages.

Pro
📍

Login Region Analysis

Checks login area layout against typical patterns.

Pro
Three steps. Zero data shared.
1

Install the extension

Get PhishClean from the Chrome Web Store, Firefox Add-ons, or Edge Add-ons, click install, confirm the permissions prompt, and you're done. No account to create, no email to verify, no settings to configure. Pro features activate automatically for 3 days so you can see everything working before you decide. Works on Chrome, Firefox, Edge, and any Chromium-based browser (Brave, Vivaldi, Arc).

2

Every page gets checked — silently

Each time a page loads, PhishClean runs its detection signals right inside your browser. It checks the DOM for exposed API keys, inspects form actions for domain mismatches, looks for hidden iframes, and flags HTTPS-to-HTTP downgrades. All of this happens locally. Nothing leaves your machine.

3

You see a warning only when it matters

No notification spam. If PhishClean finds something — a login page that sends credentials to a different domain, a leaked Stripe key in page source, a suspicious iframe — you get one clear alert explaining what's wrong and what you can do about it.

Simple, fair pricing
Monthly Annual Save 18%
Free
$0 forever
  • Link safety tooltips (8 checks)
  • Password field detection
  • Form domain mismatch alerts
  • Local whitelist management
  • 60+ trusted domains built-in
  • Privacy-first architecture

3-day free trial. No credit card required. No login required.

Security scanning as an API
Free tier — 30 requests/hour

Integrate phishing detection into your app

7 REST endpoints covering URL scanning, password analysis, email phishing detection, header authentication checks, JWT security audits, secret leak scanning, and full page risk scoring.

Free tier: 30 req/hr with no key. Upgrade to Pro ($19/mo), Business ($49/mo), or Enterprise ($700/yr) for up to unlimited requests with API key authentication.

Works with Claude, Gemini, Copilot, and any HTTP client via our MCP server.

# Check a URL for phishing
POST /api/v1/check-link
POST /api/v1/check-password
POST /api/v1/check-email
POST /api/v1/analyze-headers
POST /api/v1/decode-jwt
POST /api/v1/scan-secrets
POST /api/v1/scan-page
# Example
curl -X POST /api/v1/check-link \
-d '{"url":"https://paypal-secure.xyz"}'

7 Endpoints

URL, password, email, headers, JWT, secrets, full page scan

Free Tier, No Key

30 req/hr free. API keys for Pro, Business & Enterprise tiers.

AI-Ready (MCP)

Works with Claude, Gemini CLI, and Microsoft Copilot

How we compare
Feature PhishClean Pro Chrome Safe Browsing Norton Safe Web McAfee WebAdvisor
Phishing page detection Yes Yes Yes Yes
Form domain mismatch Yes No No No
API key / secret scanning Yes No No No
Private key detection Yes No No No
JWT token leak detection Yes No No No
Auth header monitoring Yes No No No
HTTPS downgrade alerts Yes Partial No No
localStorage scanning Yes No No No
100% local / private Yes Sends URLs to Google Cloud-based Cloud-based
Detection signals 15 Blocklist Reputation Reputation
Price $5/mo Free $50-100/yr $30-80/yr
Zero data leaves your browser. Ever.

Stays on your device

  • All page analysis and scoring
  • Phishing detection heuristics
  • Secret and API key scanning
  • URL and token scanning
  • Whitelist and preferences
  • Alert history

Touches our server

  • Anonymous install_id (UUID)
  • License status check (trial/paid)
  • Extension version number
  • Nothing else. Ever.
Common questions
Does PhishClean see my passwords or browsing history?

No — and it can't, by design. Every detection signal runs inside your browser tab. Your passwords, URLs, and page content never leave your machine. The only thing our server ever receives is a random install ID (a UUID we generate at install time) and whether your license is active. We couldn't snoop on your browsing even if we wanted to.

What does the Secret Leak Scanner detect?

It reads through the page's source looking for hardcoded credentials — things like AWS access keys (they start with AKIA), live Stripe keys (sk_live_), GitHub personal access tokens, Slack webhooks, Twilio and SendGrid keys, and RSA/PEM private keys. We filter out test keys and common documentation examples so you're not buried in false positives. More detail on the Secret Leak Scanner page.

What happens after the 3-day trial?

The core protection — link safety tooltips, password field detection, and form domain mismatch alerts — stays free forever. The Pro signals (secret scanning, JWT detection, HTTPS downgrade alerts, iframe analysis, auth header monitoring) lock after the trial unless you subscribe. You won't lose any settings or whitelist data either way.

Do I need a credit card or account to start the trial?

Nope. Install the extension, and Pro is active immediately. No credit card, no login, no email. It just works.

Does it slow down my browser?

We haven't seen it. PhishClean runs its checks once when a page finishes loading — it's a quick pass through the DOM, not a persistent background process. There are no network requests involved in detection (everything is local), so there's nothing to add latency. On a typical page it finishes in low single-digit milliseconds.

Will it trigger alerts on Google, Amazon, or my bank?

No. We maintain a built-in list of 60+ trusted domains — Google, GitHub, Amazon, Microsoft, major banks, payment processors, identity providers — and those skip detection entirely. You can also add your own domains to the whitelist if you use internal tools or staging environments that you trust.

Which browsers does it support?

PhishClean is available on the Chrome Web Store, Firefox Add-ons, and Edge Add-ons. Any Chromium-based browser — Brave, Vivaldi, Arc — can also install it from the Chrome Web Store.

Can I get a refund?

PhishClean is a freemium product — you can use the free tier indefinitely before deciding to upgrade, and the 3-day Pro trial doesn't require a credit card. Because you get to try everything before paying, all sales are final. If something isn't working right, reach out to support@phishclean.com and we'll help.

Get in touch

Need help?

Have a question about PhishClean, need support, or want to report a bug? We'd love to hear from you.

You can also reach us directly at support@phishclean.com