Skip to content
THREAT ANALYSIS

Email Intelligence Tool FREE

Mesa offers real-time threat analysis with this free tool that can automatically analyze any email, for free! All you need is a .eml file that you would like to analyze and upload it below to get instant results like risk criticality, threat type, reputation analysis, sender history, and more!

Upload Email Here

Just drag and drop any file in .eml format and make sure the file size is under 25 MB.

OR

Get Sample Report

Want a taste what you will be getting? We can send you a sample first!

circle Check icon

Your scan is finished

Email Screenshot

Email Screenshot

Your results

  • circle Check icon circle Check icon circle Check icon circle Check icon Verdict
  • circle Check icon circle Check icon circle Check icon circle Check icon Threat Type
  • circle Check icon circle Check icon circle Check icon circle Check icon Threat Tactic

Summary

circle Check icon Based on the email sent at
circle Check icon To Recipient
circle Check icon From Sender:

Authentication Checks:

SPF Check list icon circle Check icon circle Check icon Pass Fail None Soft Fail
DKIM Check list icon circle Check icon circle Check icon Pass Fail None Soft Fail
DMARC Check list icon circle Check icon circle Check icon Pass Fail None Soft Fail

Verdict: Malicious

Recommended Course of Action:

Content Analysis

This email is contains malware in the PDF attachment and is potentially a phishing attack.

Attachment Analysis:

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse

URL Analysis:

Malicious URL Detected

Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse

Threat Intelligence

Sender IP Reputation 65
Domain Reputation 96

Past emails from Sender IP: 0

Past Emails from Domain: 0

Frequently asked questions

Yes, please make sure that your .eml file contains the attachment when uploading and our threat analysis will give a verdict of the attachment along with your overall email analysis

At this time, there are no restrictions on the number of emails you can analyze. However, to maintain service quality, we may implement throttling if misuse is detected.

Mesa automatically purges all data following real-time analysis. Submitted emails are private and never stored and if you want to save a report, you can send it directly to your email after analysis.

This free intelligence tool is designed to enhance your security processes while maintaining flexibility and user privacy.

Questions? We’re here to help

We love to hear your Feedback.

Enjoy using this free tool?

Sign in to your Office 365 and get unlimited visibility, real-time risk scoring, remediation recommendations—all for free

We take privacy seriously

We are committed to maintaining the highest standards of security and transparency. Therefore, we always ensure the following:

https://mesasecurity.com/wp-content/uploads/2025/02/shield-check-fill.svg

Data Purged Securely

All email data is securely purged following analysis to ensure your privacy.
https://mesasecurity.com/wp-content/uploads/2025/02/admin-fill.svg

Private Scan Processing

Scans submitted to Mesa Security are processed privately and never shared publicly.
https://mesasecurity.com/wp-content/uploads/2025/02/checkbox-indeterminate-fill.svg

Unsubscribe Anytime

Submitting your corporate email adds you to our low-touch mailing list. Unsubscribe anytime.