/v1/checkAnalyze content (URL, SMS, email or phone number) and return a verdict with risk score.
Multi-Layer Detection Engine
Each analysis goes through 6 specialized detection modules for 99%+ accuracy. Average time: < 300ms.
Request
curl -X POST https://api.trustyn.ai/v1/check \
-H "X-API-Key: trustyn_live_xxxxxxxx" \
-H "Content-Type: application/json" \
-d '{
"content": "https://bnp-secure.xyz/login",
"type": "url"
}'Request Body
JSON object with the following fields:
contentstringrequiredThe content to analyze. Can be a URL, SMS, email, or phone number.
typestringContent type. If omitted, the API auto-detects.
"url""sms""email""phone"metadataobjectAdditional metadata to enrich analysis (optional).
Content Types
urlURLs and links. Analyzes domain, SSL, typosquatting, homoglyphs, etc.
Ex: https://suspicious.xyz
smsSMS messages. Detects phishing and scam patterns.
Ex: Your package is waiting...
emailEmail content. Analyzes text, links, patterns.
Ex: Urgent: Verify your account...
phonePhone numbers. Checks community reports.
Ex: +33612345678
Response
{
"id": "chk_7f8a9b2c3d4e5f6g",
"score": 92,
"verdict": "scam",
"confidence": 0.96,
"scam_type": "phishing_bank",
"brand_targeted": "BNP Paribas",
"layers": [
{
"name": "cache",
"risk_score": 0,
"confidence": 0,
"is_threat": false,
"details": "Not in cache",
"execution_time_ms": 2
},
{
"name": "phishing",
"risk_score": 95,
"confidence": 0.98,
"is_threat": true,
"details": "typosquatting, brand_impersonation, suspicious_tld",
"execution_time_ms": 15
},
{
"name": "semantic",
"risk_score": 78,
"confidence": 0.91,
"is_threat": true,
"details": "91% similarity with known banking scam",
"execution_time_ms": 156
},
{
"name": "fraud",
"risk_score": 85,
"confidence": 0.89,
"is_threat": true,
"details": "Financial fraud detected (89%)",
"execution_time_ms": 78
},
{
"name": "community",
"risk_score": 72,
"confidence": 0.85,
"is_threat": true,
"details": "47 reports, trending up",
"execution_time_ms": 23
},
{
"name": "deep_ai",
"risk_score": 0,
"confidence": 0,
"is_threat": false,
"details": "Deep analysis not needed",
"execution_time_ms": 0
}
],
"concordant_signals": 4,
"concordance_boost": true,
"reasons": [
"🚨 Phishing: typosquatting, brand impersonation, suspicious TLD",
"🔍 91% similarity with known banking scam",
"⚠️ Financial fraud detected (89%)",
"👥 47 community reports",
"📊 4 concordant signals (+20% score)"
],
"advice": "Do not click. Fraudulent site impersonating BNP Paribas. Never share your banking credentials.",
"analysis_time_ms": 274,
"cached": false,
"created_at": "2026-01-09T14:30:00.000Z"
}🛡️ Detection Modules
Each analysis uses up to 6 specialized modules. The "layers" field details the result of each module.
cache< 10msTrustyn Cache - Known scams database
phishing< 50msPhishing Detection - Typosquatting, homoglyphs, 200+ protected brands
semantic< 200msSemantic Analysis - Similarity with known scams
fraud< 100msFraud Detection - Multi-category classification
community< 100msCommunity Intelligence - Reports and trends
deep_ai< 500msDeep AI Analysis - Advanced behavioral detection
Response Fields
idstringUnique analysis identifier
scoreinteger (0-100)Overall risk score calculated by Trustyn engine
verdict"safe" | "suspect" | "scam"Final analysis verdict
brand_targetedstring | nullDetected impersonated brand (e.g., "BNP Paribas", "PayPal", "Amazon")
layersarrayDetailed results from each detection module
concordant_signalsintegerNumber of modules that detected a threat (boost if ≥3)
reasonsarrayList of detection reasons
advicestringPersonalized advice for end user
Verdicts
safe
Safe content. No threat detected by modules.
suspect
Suspicious content. Caution recommended.
scam
Confirmed scam. Do not interact.