CheckPhish AI

CheckPhish uses deep learning, computer vision, and NLP to mimic how a person would look at, understand, and draw a verdict on a suspicious website

Integration with LogicHub

Connecting with CheckPhish AI

To connect to CheckPhish AI following details are required:

  • Label: Connection name.
  • Reference Values: Define variables here to templatize integration connections and actions. For example, you can use https://www.{{hostname}}.com where, hostname is a variable defined in this input. For more information on how to add data, see 'Add Data' Input Type for Integrations.
  • API Token: Token required for authentication with CheckPhish AI APIS.

Actions with CheckPhish AI

Submit URL for Scan

Use this action to submit the URL for the scan.

Inputs to this Action

  • Connection: Choose a connection that you have created.
  • Jinja Template URL: Jinja-templated text containing URL. e.g. {{url_column}}.

Output of Action
An object containing the following fields:

{
   "jobID":"fcd10412-4ea2-4fe0-9e6b-2c5380d1d3c0",
   "timestamp":1627994223039,
   "error":null,
   "has_error":false
}

Check Scan Status

Use this action to check the scan status.

Inputs to this Action

  • Connection: Choose a connection that you have created.
  • Jinja Template Job ID: Jinja-templated text containing Job ID. e.g. {{job_id_column}}.
    *Insights: Please select insights. (Default value is True).

Output of Action
An object containing the following fields:

{
   "screenshot_path":"https://bst-prod-screenshots.s3-us-west-2.amazonaws.com/20210803/7636050a132a770ebb1407a64f7476617a185b442a19cb82915474ff977ff1a9.png",
   "url":"http://https/",
   "disposition":"clean",
   "insights":"https://checkphish.ai/insights/url/1627972283169/7636050a132a770ebb1407a64f7476617a185b442a19cb82915474ff977ff1a9",
   "job_id":"b3f39327-9fc9-436f-a6e9-62bff35881e7",
   "brand":"unknown",
   "has_error":false,
   "error":null,
   "resolved":false,
   "status":"DONE",
   "url_sha256":"7636050a132a770ebb1407a64f7476617a185b442a19cb82915474ff977ff1a9"
}

Did this page help you?