● BUILT FOR 1.4 BILLION INDIANS
|
Paste any URL — PhishGuard scans it instantly
Paste anything
WeakKeep typing...
Analyzing...
Scanning...0%
● NEW FEATURE · INTERACTIVE
Phishing Simulation Mode
Train yourself to detect phishing attacks in real scenarios
Challenge 1 / 5
0%
Loading next challenge...
🛡️ CHALLENGE 1
Loading...
🏆
● SIMULATION COMPLETE
You're a Phishing Pro!
0
CORRECT
0
WRONG
0
SCORE
0
MAX STREAK 🔥
Great job detecting phishing attacks!
Back to Home
● URL SCANNER
Scan any URL for threats
Powered by 70+ engines + Groq AI
Paste here
WeakKeep typing...
Analyzing...
Scanning...0%
Back to Home
LEARN BY DOING
How Security Works
Try these hands-on tools to understand real cybersecurity concepts
🟢 BEGINNER — Start here
BEGINNER
Binary Translator
See how computers read everything as 0s and 1s.
0s AND 1s
BEGINNER
Morse Code
The oldest digital communication — dots and dashes with audio.
DOTS & DASHES
BEGINNER
Text Encrypt / Decrypt
Scramble messages so only you can read them.
AES-256 STYLE
🟡 INTERMEDIATE — Level up
INTERMEDIATE
IP & Location Revealer
See what your IP tells the world — city, ISP, VPN status.
LIVE DATA
INTERMEDIATE
Steganography
Hide secret text inside a photo. Spy technique.
HIDE IN IMAGE
INTERMEDIATE
Self-Destruct Message
Message deletes itself after one read. Zero trace.
ONE TIME ONLY
🔴 ADVANCED — Go deep
ADVANCED
OTP / 2FA Simulator
Generate real one-time passwords. See why 30 seconds matters.
REAL CODES
ADVANCED
HTTP vs HTTPS
Why the lock icon matters — animated visual explanation.
LIVE CHECK
ADVANCED
Dark Web Explainer
Reality vs movies — what it actually is with quiz.
MYTH BUSTER
Back to Concepts
LEARN: ENCRYPTION
Text Encrypt / Decrypt
How WhatsApp and banking apps protect your messages
🔐 Encrypt
🔓 Decrypt
Back to Concepts
LEARN: STEGANOGRAPHY
Steganography
Hide secret messages inside images
🖼️ Hide Message
Choose image...
🔍 Reveal Message
Choose image to analyze...
Back to Concepts
LEARN: SELF-DESTRUCT
Self-Destruct Message
One read. Then it's gone forever.
💣 Create
🔓 Read
● ABOUT PHISHGUARD
Scammers hate him.
Meet PhishGuard.
Meet PhishGuard.
PhishGuard is India's first AI-powered cybersecurity platform built for normal people. One paste. Zero threats. We protect 1.4 billion Indians from scams, malware, data breaches and more.
Python Flask
Groq AI
VirusTotal
HaveIBeenPwned
v2.0 Live
● THE BUILDER
● IDEA PARTNER
Pavan Biradar
Idea Partner
The idea guy behind PhishGuard 💡 Collaborated on concepts, strategy and presentation. Without Pavan's vision, PhishGuard wouldn't exist.
● VISION
"New features dropping soon.
Scammers stay worried."
Scammers stay worried."
PhishGuard is becoming something bigger — a real cybersecurity companion for every Indian. 🇮🇳
● FEEDBACK
Tell Us Everything 😄
Bug? Suggestion? Love it? Hate it? We want to know.
How would you rate PhishGuard?
⭐
⭐
⭐
⭐
⭐
Tap a star to rate
Category
General
🐛 Bug Report
💡 Feature Idea
🤖 AI Feedback
Your Name (optional)
Your Message
Back to Concepts
BEGINNER
Binary Translator
How computers read everything as 0s and 1s
STEP 1 — WHAT IS IT?
Computers don't understand English
Your phone, laptop, every computer — they only understand two things: ON and OFF. Like a light switch. We write ON as 1 and OFF as 0. That's binary! Every letter, photo, video — it's all just millions of 0s and 1s underneath.
STEP 2 — HOW IT WORKS
Each letter has a secret number code
The letter A = number 65. Number 65 in binary = 01000001. So when you type A, your computer secretly stores 01000001. Every character uses 8 bits (8 zeros or ones).
A = 01000001
B = 01000010
C = 01000011
... and so on
STEP 3 — TRY IT YOURSELF
Type anything — watch it become binary live!
Your binary will appear here...
STEP 4 — REAL WORLD USE
Binary is literally everywhere
📸
Your photos
Millions of 0s and 1s storing every pixel
🎵
Music files
Sound waves converted to binary data
💬
WhatsApp messages
Your "hi" travels as 01101000 01101001
Back to Concepts
BEGINNER
Morse Code
The oldest digital communication — used before internet existed
STEP 1 — WHAT IS IT?
Beeps that carry messages
Before WhatsApp, before SMS, before even phone calls — people sent secret messages using just beeps. A short beep = dot (·). A long beep = dash (−). Combine them and you get letters. This is how ships sent SOS distress signals!
STEP 2 — HOW IT WORKS
Every letter = unique pattern of dots and dashes
A · −B − · · ·C − · − ·D − · ·E ·S · · ·O − − −SOS = · · · − − − · · ·
STEP 3 — TRY IT YOURSELF
Type text — hear it in Morse!
Morse code will appear here...
STEP 4 — REAL WORLD USE
🚢 Ships used Morse to call for help. The Titanic sent SOS in Morse. Military used it in World War 2. Even today pilots learn Morse for emergency communication. It's also the inspiration for modern binary — dots and dashes became 0s and 1s!
Back to Concepts
INTERMEDIATE
IP & Location Revealer
See what your IP address tells every website about you
STEP 1 — WHAT IS AN IP?
Your phone has a home address on the internet
Just like your house has an address so people can find it — every device on the internet has an IP address. When you open YouTube, Google, Instagram — they ALL see your IP. From your IP they can find your city, your internet provider and even if you're using a VPN!
STEP 2 — YOUR IP RIGHT NOW
This is what every website sees when you visit them 👇
Detecting your IP...
STEP 3 — TRY ANY IP
Look up any IP address in the world
STEP 4 — STAY SAFE
❌ Without VPN
Websites see your real city, ISP and approximate location
✅ With VPN
Websites see a fake IP from another country — your real location is hidden
Back to Concepts
ADVANCED
OTP / 2FA Simulator
How one-time passwords actually protect your accounts
STEP 1 — WHAT IS 2FA?
Two locks are better than one
Imagine your house has 2 locks. Even if a thief steals your key (password), they still can't get in without the second lock (your phone). That's 2FA — Two Factor Authentication. Even if someone knows your password, they can't login without the OTP sent to your phone!
STEP 2 — HOW OTP WORKS
A new code every 30 seconds — forever
The server and your phone use the same secret key + current time to generate the same 6-digit code. They both calculate it independently — no internet needed! After 30 seconds, both generate a new code. A hacker can't reuse an old OTP.
STEP 3 — LIVE OTP SIMULATOR
Watch real OTP codes generate every 30 seconds!
CURRENT OTP CODE
------
Refreshes in 30s
This is exactly how Google Authenticator and bank OTPs work!
STEP 4 — ALWAYS ENABLE 2FA
Enable 2FA on Gmail, Instagram, WhatsApp, your bank — everywhere. Even if your password leaks in a data breach, hackers still can't login without your OTP. It takes 2 minutes to set up and saves you from huge trouble! 🔒
Back to Concepts
ADVANCED
HTTP vs HTTPS
Why the lock icon on websites actually matters for your safety
STEP 1 — WHAT IS THE DIFFERENCE?
HTTP = postcard. HTTPS = sealed envelope.
When you send data over HTTP, it travels like a postcard — anyone between you and the website can read it. HTTPS encrypts everything — like putting it in a sealed envelope. Your passwords, messages, card numbers — all protected!
STEP 2 — VISUAL EXPLANATION
See the difference animated
👤
You
password=abc123
→
🌐
Website
❌ HTTP — Anyone can read your data!
STEP 3 — CHECK ANY WEBSITE
Is this website safe?
STEP 4 — GOLDEN RULE
🔒 Never enter passwords, OTPs or card numbers on a website without HTTPS. Always check for the lock icon in your browser before typing anything sensitive. If it shows "Not Secure" — leave immediately!
Back to Concepts
ADVANCED
Dark Web Explainer
Reality vs what movies show you — the truth about the dark web
STEP 1 — THE 3 LAYERS OF INTERNET
Internet is like an iceberg
🌐 Surface Web (4%)
Google, YouTube, Instagram — things you can find with search engines. This is what most people use.
🔒 Deep Web (90%)
Your Gmail inbox, bank account, Netflix library — private pages that need login. NOT illegal. You use it every day!
🕶️ Dark Web (6%)
Needs special browser (Tor). Anonymous. Used by journalists, activists AND criminals. Not accessible from normal browser.
STEP 2 — MYTH VS REALITY
What movies got wrong
🎬 MOVIE VERSION
Hacker with hoodie opens dark web on any laptop instantly
✅ REALITY
Needs Tor Browser, slow connection, not a single click
🎬 MOVIE VERSION
Dark web = only criminals and hackers
✅ REALITY
Journalists in Iran, activists in China use it to speak freely
🎬 MOVIE VERSION
Your data is definitely on the dark web
✅ REALITY
Only if you were in a data breach — check with PhishGuard Email Scanner!
STEP 3 — QUIZ YOURSELF
Test what you learned!
STEP 4 — STAY SAFE
🛡️ You don't need to go on the dark web. But your data might already be there from old data breaches. Use PhishGuard Email Scanner to check if your email was leaked. Change passwords regularly. Enable 2FA everywhere. That's real protection!