Example Report
Every reported email produces a structured analysis returned to the user who reported it and optionally copied to the security team. The report below is a real example of Sentinel output.
The report below reflects actual Ephemeral Sentinel output format. Sender details and content are from a real phishing email submitted for analysis.
Ephemeral Sentinel has classified this message as malicious with a risk score of 55/100. Authentication results: SPF not present, DKIM passed. The sender's domain has no SPF record — there is no published list of servers authorised to send mail for this domain.
Key Risk Signals
Risk Interpretation
This message describes fabricated billing charges and directs the recipient to call a phone number. This is a callback phishing attack: the charges do not exist, and calling the number connects the recipient to a fraudster who will attempt to extract financial details or remote system access. Do not call any number in this message.
Recommended Action
Do not call any phone number, click any link, or reply to this message. The charges described are fabricated. This is a callback phishing attack — anyone who calls will be connected to a fraudster attempting to obtain payment details, banking credentials, or remote access to your computer. Delete this message and report it to your security team.
| SPF | NONE | 0121fd.buzz |
| DKIM | PASS | google.com |
| DMARC | UNKNOWN | 0121fd.buzz |
None
TXT_STRINGS_PHISH (medium) — Phishing language strings detected — fake billing, order, or subscription content. Matched keyword: 'NORTON LIFELOCK – BILLING'
Reading the Report
Every Sentinel report contains the same structured sections.
Ready to learn more?
Review the architecture for technical details, or explore the pages tailored to your context.
Ephemeral Sentinel is available for pilot deployments with MSPs and organizations that want to improve phishing reporting workflows.
Discuss a Pilot