temp mail
-
free email
Provides temporary and free email addresses through a simple interface with automatic or manual username creation. The generated addresses have no predefined expiration and remain active until the user deletes them manually. You can create and delete email accounts in real time. Messages are automatically deleted every 7 days.
-
access to messages
Users can access messages through the authentication page using the email and password set at the first use of the mailbox, or directly without authentication as long as the browser session remains valid. Messages are temporary and are automatically deleted from the server after 7 days, unless deleted manually before.
-
simple and compact interface
The service can be used via web interfaces from desktop PCs, smartphones, or tablets with a compact and easily navigable dashboard, providing the main features for each received message.
-
search among messages
The web interface allows filtering messages by subject, enabling you to quickly find specific emails within the temporary inbox.
-
shield report per message:
Each message can be analyzed to detect trackers (invisible pixels), suspicious links, and authentication information in the headers (SPF, DKIM, SMTP path) to increase user security.
-
single message export
Messages are temporary and last 7 days. For this reason, each message can be downloaded in two formats: HTML (only text and HTML content of the body) or EML (including original headers and attachments).
-
full export .zip
You can export the entire temporary email inbox in a compressed .zip archive containing all messages and related attachments in EML format.
-
attachment reading
Message attachments can be downloaded individually, preserving the original format of the received file.
-
protected access
If the browser session expires, direct access to messages is no longer available, but access to the mailbox is guaranteed by authentication via temporary email and password. Message retrieval is protected by token-based authentication, generated when each email is created.
-
change password
The password of the temporary email account can be updated through the change password function, accessible only from the authenticated web interface. Lost passwords cannot be recovered.
url scan
-
Free URL scan
Submit any URL to get a detailed analysis. The system queues your request and examines it with dozens of scanning engines and blocklisting services, providing you with a complete security report.
-
Multi-engine scan
Each resource (file, URL, IP, domain) submitted is analyzed by a large aggregate of antivirus engines and website scanners. The final report consolidates the verdicts of each engine, offering an overview that reduces false positives and negatives.
-
Simple and compact interface
The interface is designed to be intuitive. It uses responsive and colorful technologies to provide a clear and simple experience on desktop and mobile devices.
-
Blacklist check
When submitting a URL or domain, it is checked against a wide range of domain and URL blacklists maintained by various security companies. The report shows which and how many services have flagged the resource as malicious or suspicious.
-
Constant updates
Analyses are performed with the latest antivirus signatures and blacklists. Antivirus engines are updated continuously.
-
Information on how to protect yourself
The analysis is not limited to a 'clean' or 'malicious' verdict. It provides a set of metadata, such as file hashes, WHOIS data, DNS records, and the specific names of detected threats (e.g., trojan). This information is crucial to understand the nature of a threat and implement effective countermeasures.
domain check
-
Free domain or IP scan
You can submit a domain or IP address to get the latest available analysis report. The service is free but subject to limitations, with a maximum number of requests per minute, to ensure fair use of the platform.
-
Threat analysis
The report contains an aggregated analysis from dozens of security engines. For each engine, a <strong>category</strong> (e.g., 'malicious', 'suspicious', 'harmless'), the <strong>detection method</strong> (e.g., 'blacklist'), and the <strong>type</strong> of identified threat (e.g., 'phishing', 'malware', 'spam') are specified.
-
Multi-vendor scan
Its strength is its ability to simultaneously query a vast and diverse ecosystem of security partners (vendors). This multi-vendor approach reduces false negatives and offers an overview of the reputation of a domain or IP, based on the consensus of the security community.
-
Domain information
In addition to security analysis, the report is enriched with essential contextual data. You can access <strong>WHOIS</strong> data for domain registration information, historical and current <strong>DNS records</strong> (such as A, MX, CNAME), and <strong>SSL/TLS certificate</strong> details, useful for further investigations.
-
Simple and compact interface
L'interfaccia è progettata secondo i principi fondamentali per l'accessibilità da desktop, smartphone e tablet offrendo una consultazione dei risultati chiara e strutturata.
-
Blacklist check
A significant part of the queried vendors consists of blacklist services specialized in tracking domains and IPs associated with spam, phishing, or other malicious activities. The report immediately highlights if the analyzed resource is present in one or more of these blacklists.
-
Constant updates
The effectiveness of the analysis is ensured by the continuous updating of both the vendors' scanning engines and their signatures and blacklists. Each report includes precise timestamps indicating the date of the last analysis, ensuring that the results reflect the most recent threat information.
-
Information on how to protect yourself
By identifying a resource as malicious and providing its category, basic information is shown on how to intervene. This information allows users to implement protective measures.
file scan
-
Free file scan
Allows you to submit files for a complete antivirus analysis at no cost. This service is accessible to anyone from smartphones, tablets, or PCs, but has usage limits, such as a maximum number of requests per minute.
-
multi-type scan
Scanning of different file types is supported (e.g., .doc, .docx, .sh, .exe, .html, .xls, .odt, etc.) for identifying possible threats and checking their reputation.
-
Scan with over 70 antivirus engines
Each submitted item is analyzed by a vast set of over 70 scanning engines and security tools from different companies. This approach exponentially increases the likelihood of detecting threats, even the most recent or evasive ones.
-
Scan report
At the end of each analysis, it returns a detailed report divided into tabs and identified by an icon. This report contains crucial information for threat assessment.
-
Simple and compact interface
The interface is easy to use on both mobile devices such as smartphones, tablets, or desktop thanks to its responsive graphic structure.
-
Constant updates
The platform is continuously updated. Antivirus engine signatures and URL/domain blacklists are updated in real time as soon as security vendors release new definitions, ensuring analyses are always based on the latest information.
-
Information on how to protect yourself
The report provided is generated by Google Gemini 1.5 Flash's artificial intelligence and represents the first proactive defense against threats detected in the completed scan. By identifying a threat, you gain the information you need to take action with the insights only you can provide.