Upload 4 files
Browse files- .gitattributes +2 -35
- phishing_app.py +154 -0
- phishing_gui.py +75 -0
- phishing_log.csv +134 -0
.gitattributes
CHANGED
|
@@ -1,35 +1,2 @@
|
|
| 1 |
-
|
| 2 |
-
|
| 3 |
-
*.bin filter=lfs diff=lfs merge=lfs -text
|
| 4 |
-
*.bz2 filter=lfs diff=lfs merge=lfs -text
|
| 5 |
-
*.ckpt filter=lfs diff=lfs merge=lfs -text
|
| 6 |
-
*.ftz filter=lfs diff=lfs merge=lfs -text
|
| 7 |
-
*.gz filter=lfs diff=lfs merge=lfs -text
|
| 8 |
-
*.h5 filter=lfs diff=lfs merge=lfs -text
|
| 9 |
-
*.joblib filter=lfs diff=lfs merge=lfs -text
|
| 10 |
-
*.lfs.* filter=lfs diff=lfs merge=lfs -text
|
| 11 |
-
*.mlmodel filter=lfs diff=lfs merge=lfs -text
|
| 12 |
-
*.model filter=lfs diff=lfs merge=lfs -text
|
| 13 |
-
*.msgpack filter=lfs diff=lfs merge=lfs -text
|
| 14 |
-
*.npy filter=lfs diff=lfs merge=lfs -text
|
| 15 |
-
*.npz filter=lfs diff=lfs merge=lfs -text
|
| 16 |
-
*.onnx filter=lfs diff=lfs merge=lfs -text
|
| 17 |
-
*.ot filter=lfs diff=lfs merge=lfs -text
|
| 18 |
-
*.parquet filter=lfs diff=lfs merge=lfs -text
|
| 19 |
-
*.pb filter=lfs diff=lfs merge=lfs -text
|
| 20 |
-
*.pickle filter=lfs diff=lfs merge=lfs -text
|
| 21 |
-
*.pkl filter=lfs diff=lfs merge=lfs -text
|
| 22 |
-
*.pt filter=lfs diff=lfs merge=lfs -text
|
| 23 |
-
*.pth filter=lfs diff=lfs merge=lfs -text
|
| 24 |
-
*.rar filter=lfs diff=lfs merge=lfs -text
|
| 25 |
-
*.safetensors filter=lfs diff=lfs merge=lfs -text
|
| 26 |
-
saved_model/**/* filter=lfs diff=lfs merge=lfs -text
|
| 27 |
-
*.tar.* filter=lfs diff=lfs merge=lfs -text
|
| 28 |
-
*.tar filter=lfs diff=lfs merge=lfs -text
|
| 29 |
-
*.tflite filter=lfs diff=lfs merge=lfs -text
|
| 30 |
-
*.tgz filter=lfs diff=lfs merge=lfs -text
|
| 31 |
-
*.wasm filter=lfs diff=lfs merge=lfs -text
|
| 32 |
-
*.xz filter=lfs diff=lfs merge=lfs -text
|
| 33 |
-
*.zip filter=lfs diff=lfs merge=lfs -text
|
| 34 |
-
*.zst filter=lfs diff=lfs merge=lfs -text
|
| 35 |
-
*tfevents* filter=lfs diff=lfs merge=lfs -text
|
|
|
|
| 1 |
+
# Auto detect text files and perform LF normalization
|
| 2 |
+
* text=auto
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
phishing_app.py
ADDED
|
@@ -0,0 +1,154 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
import gradio as gr
|
| 2 |
+
import re
|
| 3 |
+
from urllib.parse import urlparse
|
| 4 |
+
import csv
|
| 5 |
+
from transformers import AutoTokenizer, AutoModelForSequenceClassification, pipeline
|
| 6 |
+
import torch
|
| 7 |
+
#URL model
|
| 8 |
+
url_tokenizer = AutoTokenizer.from_pretrained("najla45/phishing_detection_fine_tuned_bert")
|
| 9 |
+
url_model = AutoModelForSequenceClassification.from_pretrained("najla45/phishing_detection_fine_tuned_bert")
|
| 10 |
+
url_classifier = pipeline("text-classification", model=url_model, tokenizer=url_tokenizer)
|
| 11 |
+
|
| 12 |
+
#email model
|
| 13 |
+
email_tokenizer = AutoTokenizer.from_pretrained("cybersectony/phishing-email-detection-distilbert_v2.4.1")
|
| 14 |
+
email_model = AutoModelForSequenceClassification.from_pretrained("cybersectony/phishing-email-detection-distilbert_v2.4.1")
|
| 15 |
+
|
| 16 |
+
#logic for checking the state of url
|
| 17 |
+
def is_phishing_url(url):
|
| 18 |
+
suspicious_keywords = ['secure', 'account', 'update', 'free', 'login', 'verify', 'banking']
|
| 19 |
+
domain = urlparse(url).netloc
|
| 20 |
+
path = urlparse(url).path
|
| 21 |
+
|
| 22 |
+
score = 0
|
| 23 |
+
if re.match(r'https?://\d{1,3}(\.\d{1,3}){3}', url):
|
| 24 |
+
score += 2
|
| 25 |
+
if '-' in domain:
|
| 26 |
+
score += 1
|
| 27 |
+
if not url.startswith("https://"):
|
| 28 |
+
score += 3
|
| 29 |
+
if any(keyword in url.lower() for keyword in suspicious_keywords):
|
| 30 |
+
score += 2
|
| 31 |
+
if len(url) > 75:
|
| 32 |
+
score += 1
|
| 33 |
+
if '@' in url:
|
| 34 |
+
score += 2
|
| 35 |
+
|
| 36 |
+
return score
|
| 37 |
+
|
| 38 |
+
#logic checking for phishing email
|
| 39 |
+
def predict_email(email_text):
|
| 40 |
+
inputs = email_tokenizer(email_text, return_tensors="pt", truncation=True, max_length=512)
|
| 41 |
+
with torch.no_grad():
|
| 42 |
+
outputs = email_model(**inputs)
|
| 43 |
+
probs = torch.nn.functional.softmax(outputs.logits, dim=-1)[0].tolist()
|
| 44 |
+
|
| 45 |
+
labels = {
|
| 46 |
+
"legitimate_email": probs[0],
|
| 47 |
+
"phishing_url": probs[1],
|
| 48 |
+
"legitimate_url": probs[2],
|
| 49 |
+
"phishing_url_alt": probs[3]
|
| 50 |
+
}
|
| 51 |
+
|
| 52 |
+
max_label, max_score = max(labels.items(), key=lambda x: x[1])
|
| 53 |
+
return max_label, max_score, labels
|
| 54 |
+
|
| 55 |
+
|
| 56 |
+
#LOGGING ALL DATA TO CSV FILE
|
| 57 |
+
import os
|
| 58 |
+
LOG_FILE = os.path.join(os.path.dirname(__file__), "phishing_log.csv")
|
| 59 |
+
def log_to_csv(url, rule_score, bert_label, bert_score, final_decision):
|
| 60 |
+
try:
|
| 61 |
+
file_exists = os.path.isfile(LOG_FILE)
|
| 62 |
+
with open(LOG_FILE, "a", newline='') as f:
|
| 63 |
+
writer = csv.writer(f)
|
| 64 |
+
if not file_exists:
|
| 65 |
+
writer.writerow(["Input", "Rule Score", "BERT Label", "Confidence", "Final Decision"])
|
| 66 |
+
writer.writerow([url, rule_score, bert_label, f"{bert_score:.2f}", final_decision])
|
| 67 |
+
except Exception as e:
|
| 68 |
+
print(f"Error writing to CSV: {e}")
|
| 69 |
+
|
| 70 |
+
|
| 71 |
+
#Combining URL and email checking logic
|
| 72 |
+
def combined_phishing_detector(url, input_type, log=True):
|
| 73 |
+
if input_type == "URL":
|
| 74 |
+
rule_score = is_phishing_url(url)
|
| 75 |
+
rule_result = "Phishing" if rule_score >= 3 else "Safe"
|
| 76 |
+
|
| 77 |
+
bert_result = url_classifier(url)[0]
|
| 78 |
+
label_map = {"LABEL_0": "safe", "LABEL_1": "phishing"}
|
| 79 |
+
bert_label = label_map.get(bert_result["label"].upper(), "unknown")
|
| 80 |
+
bert_score = bert_result["score"]
|
| 81 |
+
|
| 82 |
+
final_decision = "Phishing" if rule_result == "Phishing" and bert_label == "phishing" and bert_score > 0.75 else "Safe"
|
| 83 |
+
|
| 84 |
+
elif input_type == "Email/Message":
|
| 85 |
+
bert_label, bert_score, bert_probs = predict_email(url)
|
| 86 |
+
rule_score = "N/A"
|
| 87 |
+
rule_result = "Not Applicable"
|
| 88 |
+
final_decision = "Phishing" if bert_label.startswith("phishing") and bert_score > 0.7 else "Safe"
|
| 89 |
+
|
| 90 |
+
# ✅ This part was missing in your message
|
| 91 |
+
if log:
|
| 92 |
+
log_to_csv(url, rule_score, bert_label, bert_score, final_decision)
|
| 93 |
+
|
| 94 |
+
return url, rule_score, bert_label, bert_score, final_decision
|
| 95 |
+
|
| 96 |
+
|
| 97 |
+
|
| 98 |
+
def run_detector(text, input_type):
|
| 99 |
+
url,rule_score, bert_label, bert_score,final_decision = combined_phishing_detector(text, input_type,log=True)
|
| 100 |
+
|
| 101 |
+
# Add emoji based on result
|
| 102 |
+
if final_decision.lower() == "phishing":
|
| 103 |
+
emoji = "🚨" # warning
|
| 104 |
+
elif final_decision.lower() == "safe":
|
| 105 |
+
emoji = "✅" # check mark
|
| 106 |
+
else:
|
| 107 |
+
emoji = "❓"
|
| 108 |
+
|
| 109 |
+
message = (
|
| 110 |
+
f"{emoji} Result: {final_decision}\n"
|
| 111 |
+
f"📊 Rule Score: {rule_score}\n"
|
| 112 |
+
f"🤖 BERT Label: {bert_label}\n"
|
| 113 |
+
f"🔍 Confidence: {bert_score:.2f}"
|
| 114 |
+
)
|
| 115 |
+
return message,LOG_FILE
|
| 116 |
+
|
| 117 |
+
#---GUI-----
|
| 118 |
+
gr.HTML("""
|
| 119 |
+
<link href="https://fonts.googleapis.com/css2?family=Poppins:wght@400;500;600;700&display=swap" rel="stylesheet">
|
| 120 |
+
<h1 style='text-align:center; color:white; font-family: "Poppins", sans-serif;'>🔐 Phishing URL & Email Detector (BERT + Rules) 🔐</h1>
|
| 121 |
+
""")
|
| 122 |
+
|
| 123 |
+
with gr.Blocks(css="""
|
| 124 |
+
.gradio-container {
|
| 125 |
+
background-image: url('https://c8.alamy.com/comp/M79X4X/cyber-security-buzzwords-phishing-alert-with-blue-numbers-in-background-M79X4X.jpg');
|
| 126 |
+
background-size: cover;
|
| 127 |
+
background-position: center;
|
| 128 |
+
background-repeat: no-repeat;
|
| 129 |
+
font-family: 'Poppins', sans-serif;
|
| 130 |
+
color: white;
|
| 131 |
+
}
|
| 132 |
+
input, textarea, button, label, .gr-box, .gr-button, .gr-textbox, .gr-radio, .gr-file {
|
| 133 |
+
font-family: 'Poppins', sans-serif !important;
|
| 134 |
+
color: white;
|
| 135 |
+
}
|
| 136 |
+
""") as demo:
|
| 137 |
+
|
| 138 |
+
gr.HTML("<h1 style='text-align:center; color:white;'>🔐 Phishing URL & Email Detector (BERT + Rules) 🔐</h1>")
|
| 139 |
+
|
| 140 |
+
with gr.Row():
|
| 141 |
+
input_text = gr.Textbox(label="Enter URL or Email", lines=5)
|
| 142 |
+
input_type = gr.Radio(["URL", "Email/Message"], label="Input Type")
|
| 143 |
+
|
| 144 |
+
result_output = gr.Textbox(label="Detection Result", lines=4, interactive=False)
|
| 145 |
+
log_file_output = gr.File(label="Download Log File")
|
| 146 |
+
|
| 147 |
+
detect_button = gr.Button("Detect")
|
| 148 |
+
|
| 149 |
+
detect_button.click(fn=run_detector, inputs=[input_text, input_type], outputs=[result_output, log_file_output])
|
| 150 |
+
|
| 151 |
+
|
| 152 |
+
demo.launch(share=True)
|
| 153 |
+
|
| 154 |
+
|
phishing_gui.py
ADDED
|
@@ -0,0 +1,75 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
import streamlit as st
|
| 2 |
+
import re
|
| 3 |
+
from urllib.parse import urlparse
|
| 4 |
+
import csv
|
| 5 |
+
from transformers import AutoTokenizer, AutoModelForSequenceClassification, pipeline
|
| 6 |
+
|
| 7 |
+
# Load model once at startup
|
| 8 |
+
model_name = "najla45/phishing_detection_fine_tuned_bert"
|
| 9 |
+
tokenizer = AutoTokenizer.from_pretrained(model_name)
|
| 10 |
+
model = AutoModelForSequenceClassification.from_pretrained(model_name)
|
| 11 |
+
bert_classifier = pipeline("text-classification", model=model, tokenizer=tokenizer)
|
| 12 |
+
|
| 13 |
+
def is_phishing_url(url):
|
| 14 |
+
suspicious_keywords = ['secure', 'account', 'update', 'free', 'login', 'verify', 'banking']
|
| 15 |
+
domain = urlparse(url).netloc
|
| 16 |
+
path = urlparse(url).path
|
| 17 |
+
|
| 18 |
+
score = 0
|
| 19 |
+
if re.match(r'https?://\d{1,3}(\.\d{1,3}){3}', url):
|
| 20 |
+
score += 2
|
| 21 |
+
if '-' in domain:
|
| 22 |
+
score += 1
|
| 23 |
+
if not url.startswith("https://"):
|
| 24 |
+
score += 3
|
| 25 |
+
if any(keyword in url.lower() for keyword in suspicious_keywords):
|
| 26 |
+
score += 2
|
| 27 |
+
if len(url) > 75:
|
| 28 |
+
score += 1
|
| 29 |
+
if '@' in url:
|
| 30 |
+
score += 2
|
| 31 |
+
|
| 32 |
+
return score
|
| 33 |
+
|
| 34 |
+
def log_to_csv(input_text, rule_score, bert_label, bert_score, final_decision):
|
| 35 |
+
with open("phishing_log.csv", "a", newline='') as f:
|
| 36 |
+
writer = csv.writer(f)
|
| 37 |
+
writer.writerow([input_text, rule_score, bert_label, f"{bert_score:.2f}", final_decision])
|
| 38 |
+
|
| 39 |
+
def combined_phishing_detector(url):
|
| 40 |
+
rule_score = 0
|
| 41 |
+
if url.startswith("http"):
|
| 42 |
+
rule_score = is_phishing_url(url)
|
| 43 |
+
rule_result = "Phishing" if rule_score >= 3 else "Safe"
|
| 44 |
+
else:
|
| 45 |
+
rule_result = "Not Applicable"
|
| 46 |
+
|
| 47 |
+
bert_result = bert_classifier(url)[0]
|
| 48 |
+
label_map = {"LABEL_0": "safe", "LABEL_1": "phishing"}
|
| 49 |
+
bert_label = label_map.get(bert_result["label"].upper(), "unknown")
|
| 50 |
+
bert_score = bert_result["score"]
|
| 51 |
+
|
| 52 |
+
if rule_result == "Phishing" and (bert_label == "phishing" and bert_score > 0.75):
|
| 53 |
+
final_decision = "Phishing"
|
| 54 |
+
else:
|
| 55 |
+
final_decision = "Safe"
|
| 56 |
+
|
| 57 |
+
log_to_csv(url, rule_score, bert_label, bert_score, final_decision)
|
| 58 |
+
return final_decision
|
| 59 |
+
|
| 60 |
+
# ---------------- STREAMLIT UI ----------------
|
| 61 |
+
|
| 62 |
+
st.set_page_config(page_title="Phishing Detector", page_icon="🔍")
|
| 63 |
+
st.title("🔐 Phishing URL & Message Detector")
|
| 64 |
+
|
| 65 |
+
user_input = st.text_area("Paste a URL or email message below:")
|
| 66 |
+
|
| 67 |
+
if st.button("Check"):
|
| 68 |
+
if user_input.strip():
|
| 69 |
+
result = combined_phishing_detector(user_input.strip())
|
| 70 |
+
if result == "Phishing":
|
| 71 |
+
st.error(f"🚨 Detected as: {result}")
|
| 72 |
+
else:
|
| 73 |
+
st.success(f"✅ Detected as: {result}")
|
| 74 |
+
else:
|
| 75 |
+
st.warning("⚠️ Please enter a valid URL or message.")
|
phishing_log.csv
ADDED
|
@@ -0,0 +1,134 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
https://www.paypal.com/signin,0,phishing,0.99,Safe
|
| 2 |
+
"python -u ""c:\Users\Vanshika\OneDrive\Desktop\phishing_ai_project\urlchecking.py""",0,phishing,0.97,Safe
|
| 3 |
+
http:www.paypal.com,3,phishing,0.99,Phishing
|
| 4 |
+
"python -u ""c:\Users\Vanshika\OneDrive\Desktop\phishing_ai_project\urlchecking.py""",0,phishing,0.97,Safe
|
| 5 |
+
"python -u ""c:\Users\Vanshika\OneDrive\Desktop\phishing_ai_project\urlchecking.py""",0,phishing,0.97,Safe
|
| 6 |
+
https://www.yahoo.com,0,phishing,0.99,Safe
|
| 7 |
+
https://www.google.com,0,phishing,0.99,Safe
|
| 8 |
+
http://abc.com,3,phishing,0.99,Phishing
|
| 9 |
+
https://hazs.com,0,phishing,0.99,Safe
|
| 10 |
+
http://hazs.com,3,phishing,0.99,Phishing
|
| 11 |
+
http://int.xyz,3,phishing,0.99,Phishing
|
| 12 |
+
http://int.in,3,phishing,0.99,Phishing
|
| 13 |
+
https://int.hjhj,0,phishing,0.99,Safe
|
| 14 |
+
http://int.hjhj,3,phishing,0.99,Phishing
|
| 15 |
+
www.abc.com,0,phishing,0.99,Safe
|
| 16 |
+
http://abc.com,3,phishing,0.99,Phishing
|
| 17 |
+
[email protected],N/A,phishing,0.99,Phishing
|
| 18 |
+
https://www.google.com,N/A,phishing,0.99,Safe
|
| 19 |
+
https://yahoo.com,0,phishing,0.99,Safe
|
| 20 |
+
"From: [email protected]
|
| 21 |
+
To: [email protected]
|
| 22 |
+
|
| 23 |
+
Dear Customer,
|
| 24 |
+
|
| 25 |
+
We have noticed some unusual activity on your bank account. As a security measure, your account has been temporarily suspended.
|
| 26 |
+
|
| 27 |
+
To restore access, please verify your identity immediately by clicking the link below:
|
| 28 |
+
|
| 29 |
+
Verify Account Now
|
| 30 |
+
|
| 31 |
+
Failure to verify within 24 hours will result in permanent account suspension.
|
| 32 |
+
|
| 33 |
+
Thank you for your prompt attention to this matter.
|
| 34 |
+
|
| 35 |
+
Sincerely,
|
| 36 |
+
Secure Bank Support Team",N/A,phishing,0.98,Phishing
|
| 37 |
+
"Subject: Your July Account Statement is Ready
|
| 38 |
+
|
| 39 |
+
From: [email protected]
|
| 40 |
+
To: [email protected]
|
| 41 |
+
|
| 42 |
+
Dear Vanshika,
|
| 43 |
+
|
| 44 |
+
Your monthly account statement for July 2025 is now available.
|
| 45 |
+
|
| 46 |
+
To view or download your statement securely, please log in to your NetBanking account using the official HDFC Bank website:
|
| 47 |
+
https://netbanking.hdfcbank.com
|
| 48 |
+
|
| 49 |
+
If you have any questions, feel free to contact our support team at [email protected] or call 1800-202-6161.
|
| 50 |
+
|
| 51 |
+
Thank you for banking with us.
|
| 52 |
+
Warm regards,
|
| 53 |
+
HDFC Bank Customer Care Team",N/A,phishing,0.98,Phishing
|
| 54 |
+
"Subject: Your July Account Statement is Ready
|
| 55 |
+
|
| 56 |
+
From: [email protected]
|
| 57 |
+
To: [email protected]
|
| 58 |
+
|
| 59 |
+
Dear Vanshika,
|
| 60 |
+
|
| 61 |
+
Your monthly account statement for July 2025 is now available.
|
| 62 |
+
|
| 63 |
+
To view or download your statement securely, please log in to your NetBanking account using the official HDFC Bank website:
|
| 64 |
+
https://netbanking.hdfcbank.com
|
| 65 |
+
|
| 66 |
+
If you have any questions, feel free to contact our support team at [email protected] or call 1800-202-6161.
|
| 67 |
+
|
| 68 |
+
Thank you for banking with us.
|
| 69 |
+
Warm regards,
|
| 70 |
+
HDFC Bank Customer Care Team",N/A,phishing,0.98,Phishing
|
| 71 |
+
[email protected],N/A,phishing,0.99,Phishing
|
| 72 |
+
https://google.com,0,phishing,0.99,Safe
|
| 73 |
+
http://abc.com,3,phishing,0.99,Phishing
|
| 74 |
+
"Subject: Urgent: Account Verification Required
|
| 75 |
+
|
| 76 |
+
From: [email protected]
|
| 77 |
+
To: [email protected]
|
| 78 |
+
|
| 79 |
+
Dear Customer,
|
| 80 |
+
|
| 81 |
+
We have noticed some unusual activity on your bank account. As a security measure, your account has been temporarily suspended.
|
| 82 |
+
|
| 83 |
+
To restore access, please verify your identity immediately by clicking the link below:
|
| 84 |
+
|
| 85 |
+
Verify Account Now
|
| 86 |
+
|
| 87 |
+
Failure to verify within 24 hours will result in permanent account suspension.
|
| 88 |
+
|
| 89 |
+
Thank you for your prompt attention to this matter.
|
| 90 |
+
|
| 91 |
+
Sincerely,
|
| 92 |
+
Secure Bank Support Team",N/A,phishing,0.96,Phishing
|
| 93 |
+
"Dear Vanshika,
|
| 94 |
+
|
| 95 |
+
Your monthly account statement for July 2025 is now available.
|
| 96 |
+
|
| 97 |
+
To view or download your statement securely, please log in to your NetBanking account using the official HDFC Bank website:
|
| 98 |
+
|
| 99 |
+
https://netbanking.hdfcbank.com
|
| 100 |
+
|
| 101 |
+
If you have any questions, feel free to contact our support team at [email protected] or call 1800-202-6161.
|
| 102 |
+
|
| 103 |
+
Thank you for banking with us.
|
| 104 |
+
Warm regards,
|
| 105 |
+
HDFC Bank Customer Care Team",N/A,phishing,0.99,Phishing
|
| 106 |
+
https:\\google.com,3,phishing,0.98,Phishing
|
| 107 |
+
https://google.com,0,phishing,0.99,Safe
|
| 108 |
+
https://artbyprab.com,0,phishing,0.99,Safe
|
| 109 |
+
https://amazon.ca,0,phishing,0.99,Safe
|
| 110 |
+
https://fponadala.com,0,phishing,0.99,Safe
|
| 111 |
+
https://fponadala.xyz,0,phishing,0.99,Safe
|
| 112 |
+
https://yahoo.com,0,phishing,0.99,Safe
|
| 113 |
+
https://yahoo.com,0,phishing,0.99,Safe
|
| 114 |
+
https://yahoo.com,0,phishing,0.99,Safe
|
| 115 |
+
https://yahoo.com,0,phishing,0.99,Safe
|
| 116 |
+
https://yahoo.com,0,phishing,0.99,Safe
|
| 117 |
+
https://yahoo.com,0,phishing,0.99,Safe
|
| 118 |
+
https://yahoo.com,0,phishing,0.99,Safe
|
| 119 |
+
https://google.com,0,phishing,0.99,Safe
|
| 120 |
+
https://google.com,0,phishing,0.99,Safe
|
| 121 |
+
https://google.com,0,phishing,0.99,Safe
|
| 122 |
+
https://google.com,0,phishing,0.99,Safe
|
| 123 |
+
https://google.com,0,phishing,0.99,Safe
|
| 124 |
+
https://google.com,0,phishing,0.99,Safe
|
| 125 |
+
https://google.com,0,phishing,0.99,Safe
|
| 126 |
+
http://abc.com,3,phishing,0.99,Phishing
|
| 127 |
+
[email protected],N/A,phishing_url,0.85,Phishing
|
| 128 |
+
[email protected],N/A,legitimate_url,0.99,Safe
|
| 129 |
+
http://127.0.0.1:7860/,5,phishing,0.99,Phishing
|
| 130 |
+
https://google.com,0,phishing,0.99,Safe
|
| 131 |
+
http:cghf.in,3,phishing,0.99,Phishing
|
| 132 |
+
https:google.com,3,phishing,0.99,Phishing
|
| 133 |
+
https://google.com,0,phishing,0.99,Safe
|
| 134 |
+
https://www.udemy.com/course/the-complete-android-kotlin-app-development-a-z-bootcamp/?couponCode=EDC84F1A93ABF128EBA3,1,phishing,0.99,Safe
|