Regex, domains, and homoglyphs in one place
Track exact domains, partial matches, regex patterns, and Unicode lookalikes without juggling separate tools. CatchPhi.sh automatically generates risky variants and keeps them up to date.
CatchPhi.sh keeps eyes on the global CT log firehose so you don’t have to. Define domains, regex patterns, and homoglyph rules, then deliver alerts by webhook or inbox—no infrastructure, no brittle scripts.
12M+
Certificates reviewed per day
60s
Average webhook lead time
login-brand-secure.com
Matched regex /brand.*login/ · Issued 12 minutes ago
support-bränd-payments.io
Detected via homoglyph variant · WHOIS country: NL
app-brand-helpdesk.cloud
Edit distance match ≤2 · Risk score: elevated
Why teams choose CatchPhi.sh
Built for security engineers, founders, and researchers who want actionable visibility, not another dashboard to babysit.
Track exact domains, partial matches, regex patterns, and Unicode lookalikes without juggling separate tools. CatchPhi.sh automatically generates risky variants and keeps them up to date.
Send daily recaps to email for leadership, real-time webhooks to automation, or both. Pipe matches into Slack, SIEM, or your own scoring pipeline in minutes.
No infrastructure or software to maintain and keep running. Just ship a list of patterns and get actionable intel before phishing kits go live. Restrict alerts to new domains to limit noise.
How it works
From first pattern to first alert, the entire setup takes less than the time it takes to provision a server.
Step 1
Add domains, keywords, regex patterns, and typo variants that map to your brand or clients. Toggle homoglyph detection and edit distance thresholds per rule.
Step 2
Choose real-time webhooks for automation or daily email recaps for easy review. Every payload includes enrichment data so you can triage in seconds.
Step 3
CatchPhi.sh flags suspicious certificates minutes after issuance, giving you time to takedown or warn customers before campaigns ramp up.
Pricing
Try CatchPhi.sh free for 14 days. Upgrade when you are ready to automate takedowns and alerts.
Starter
Hobbyists, indie hackers, and small startups.
Growth
SMEs and security-conscious companies.
Team
Security teams and agencies.
Pro
MSSPs and agencies needing higher capacity.
Loved by lean teams
“We replaced a pile of bash scripts with CatchPhi.sh. Our webhook feed drives a Slack bot that lets engineers flag phishing domains before marketing even sees them.”
Security engineers
Seed-stage SaaS company
“Regex + homoglyph matching means we can pivot on brand clusters and see campaigns unfold in real time without maintaining CertStream infrastructure.”
Threat researchers
Independent research lab
“We onboard new clients in under an hour and resell CatchPhi.sh monitoring as part of our phishing resilience package.”
MSSP teams
Boutique security agency
FAQ
Need something else? Email contact@catchphi.sh and we’ll help you get started.
We rely on our own Certificate Transparency scanning, indexing and searching service and normalize certificate data so you only see leaf certificates relevant to your rules. No need to run your own ingestion stack.
Real-time webhooks fire within minutes of CT log publication. Daily recaps summarize everything that matched in the last 24 hours so leadership can review without noise.
Yes. Every rule supports Unicode homoglyph detection and configurable edit distance. CatchPhi.sh generates risky variants and checks them alongside your literal domain or regex patterns.
Webhook payloads and emails include WHOIS snapshots, DNS answers, and AI-backed risk scores when available so you can quickly prioritize takedowns.
Webhook delivery is the primary integration path today. CSV and REST exports are on the roadmap—reach out if you need early access.
Join developers, security engineers, and researchers using CatchPhi.sh to keep an eye on the CT firehose.