Forward phishing emails, scam messages, or suspicious attachments to us. We analyze, detonate, and notify hosting providers — for free.
submit@blackdome.aiJust forward the email — we do the rest. No signup required.
Three steps. No signup. No cost.
Got a phishing email? Scam message? Suspicious attachment? Forward it to submit@blackdome.ai.
Attachments are extracted and detonated in isolated microVMs. URLs are crawled. IOCs are extracted and classified.
If confirmed malicious, we automatically notify the hosting company with evidence. The site gets taken down.
You file a report. It goes into a queue. Nothing happens for months. The phishing site stays live.
You forward an email. We detonate it in minutes. The hosting provider gets an automated abuse report with evidence. The site comes down.
You delete the email. The phishing campaign continues. Other people fall victim.
You forward the email. The threat is catalogued. The IOCs feed a global intelligence network. Everyone benefits.
Have a suspicious file? Upload it directly. Max 25MB.
Drag and drop or browse
Executables, documents, archives, scripts — all accepted
Yes, always. ThreatDrop is a free community service. Every submission strengthens the global threat intelligence network and helps protect everyone from phishing and malware.
We extract all attachments, URLs, and indicators of compromise (IOCs). Attachments are detonated in an isolated sandbox. If the email is confirmed malicious, we send an automated abuse report to the hosting provider with full evidence.
We never publish individual detonation results publicly. This prevents attackers from using BlackDome as an evasion testing service. Aggregated, anonymized threat data is shared with the community.
No. Just forward the suspicious email to submit@blackdome.ai. No signup, no login, no app to install. It works from any email client on any device.
Government cybercrime portals collect reports but rarely take direct action against phishing infrastructure. BlackDome automatically identifies the hosting provider and sends a structured abuse report with evidence — leading to faster takedowns.
All types. We specialize in executables (.exe, .dll), documents (.pdf, .docx), archives (.zip, .rar, .7z), and scripts (.js, .vbs, .ps1) — but our pipeline handles any file format.
Every submission makes the internet safer. See how the community is fighting back.
View Community Stats