Preview everything
View your email before it gets to your computer - now you can see what email is waiting for you so you can deal to it effectively.
Software
© 2025 Firetrust Limited. All rights reserved.
Products
MailWasher
Pro
Effective and easy to use Anti-spam.
Hideaway
VPN
World's fastest (Seriously!) and most flexible VPN.
MailWasher
Server
Increase productivity and protect against spam and viruses.
Support
MailWasher
Pro
Effective and easy to use Anti-spam.
Hideaway
VPN
World's fastest (Seriously!) and most flexible VPN.
MailWasher
Server
Increase productivity and protect against spam and viruses.
Feel secure with over 10 million other users blocking spam with MailWasher.
Attachment Filtering
A spam filter feature that scans email attachments for malicious content, such as viruses or ransomware,
blocking or quarantining emails with suspicious files.
Authentication Protocols
Standards like SPF, DKIM, and DMARC that verify the legitimacy of an email’s sender. These help
spam filters detect forged emails and protect against phishing and spoofing.
Backscatter
Unwanted bounce-back emails generated when a spammer forges a sender’s address, causing delivery
failure notifications to be sent to an innocent third party.
Bayesian Filtering
A statistical technique that classifies emails as spam or ham based on the probability of certain
words or phrases appearing. It adapts over time using user feedback and training data.
Blacklist
A database of email addresses, domains, or IP addresses known to send spam. Spam filters use blacklists
to block or flag messages from untrusted sources.
Business Email Compromise (BEC)
A type of email scam where attackers impersonate executives or trusted contacts to trick employees
into transferring money or sharing sensitive data.
Clickjacking
A malicious technique where users are tricked into clicking on hidden or disguised links in an
email, often leading to phishing sites or malware downloads. Spam filters may flag emails with
suspicious link structures.
DKIM (DomainKeys Identified Mail)
An email authentication method that uses cryptographic signatures to verify that an email was sent
from an authorized domain and hasn’t been altered in transit.
DMARC (Domain-based Message Authentication, Reporting, and Conformance)
A policy that builds on SPF and DKIM to specify how unauthenticated emails should be handled (e.g.,
rejected or quarantined). It helps protect against email spoofing.
Email Bombing
A form of email attack where a large volume of emails is sent to overwhelm a recipient’s inbox,
often as a denial-of-service tactic. Spam filters may detect and throttle such floods.
Email Spoofing
The act of forging an email’s sender address to appear as if it comes from a trusted source. Spoofed
emails are often used in phishing or spam campaigns.
False Negative
When a spam or malicious email is incorrectly classified as legitimate and delivered to the inbox,
indicating a spam filter’s failure to detect it.
False Positive
When a legitimate email (ham) is mistakenly flagged as spam and moved to the spam folder or blocked,
often due to overly aggressive filtering rules.
Grey Mail
Emails that are neither clearly spam nor ham, such as newsletters or promotional emails that users
may have subscribed to but no longer want. Grey mail often clogs inboxes and challenges spam filters.
Greylisting
A filtering technique that temporarily rejects emails from unknown senders, requiring the sender’s
server to retry delivery. Legitimate servers typically retry, while spam servers often do not.
Ham
Legitimate, non-spam emails that users want to receive. Spam filters aim to correctly identify
ham to avoid false positives.
Header Analysis
The process of examining an email’s metadata (e.g., sender, recipient, routing information) to
detect signs of spam, spoofing, or malicious intent.
Heuristic Filtering
A method that uses predefined rules or patterns (e.g., suspicious keywords, formatting, or links)
to identify spam. It’s fast but less adaptive than machine learning or Bayesian methods.
Image-based Spam
Spam emails that embed text in images to evade text-based spam filters. Advanced filters use optical
character recognition (OCR) to detect such content.
Machine Learning
A technique in modern spam filters where algorithms analyze large datasets of emails to identify
patterns of spam, phishing, or ham, improving accuracy over time.
Malware
Malicious software (e.g., viruses, ransomware) delivered via email attachments or links. Spam filters
scan for known malware signatures or suspicious behavior.
Phishing
A type of email scam designed to trick users into revealing sensitive information (e.g., passwords,
credit card details) by posing as a trustworthy entity, such as a bank or company.
Quarantine
A secure area where suspicious emails are held for review before being delivered, deleted, or flagged.
Quarantine helps prevent false positives while protecting users.
Ransomware
A type of malware delivered via email that encrypts a user’s files and demands payment for decryption.
Spam filters prioritize detecting ransomware payloads.
Reputation Filtering
A method that evaluates the trustworthiness of an email sender based on their IP address, domain,
or past behavior. Low-reputation senders are more likely to be flagged as spam.
Sender Policy Framework (SPF)
An email authentication protocol that checks if an email was sent from an authorized server for
the domain, helping to detect forged sender addresses.
Smishing
A phishing variant where attackers use SMS or email-to-text messages to trick users into clicking
malicious links or sharing personal information.
Snowshoe Spam
A spamming technique where attackers spread their emails across many IP addresses or domains to
avoid detection and blacklisting. Filters counter this by analyzing patterns across multiple sources.
Social Engineering
Manipulative tactics used in email scams to exploit human psychology, such as creating urgency
or impersonating authority figures to elicit actions like clicking links or sharing data.
Spam
Unwanted or unsolicited emails, often sent in bulk, promoting products, scams, or malicious content.
Spam filters aim to block or divert these to the spam folder.
Spam Score
A numerical value assigned to an email based on its likelihood of being spam, calculated using
factors like content, sender reputation, and metadata. Filters act based on predefined thresholds.
Spam Trap
An email address created to lure spammers, not used for legitimate communication. Emails sent to
spam traps are automatically flagged, helping to identify and blacklist spammers.
Spear Phishing
A targeted phishing attack aimed at specific individuals or organizations, often using personalized
information to increase credibility and success rates.
Trigger Words
Words or phrases (e.g., “free,” “win,” “urgent”) commonly associated with spam. Filters flag emails
with excessive trigger words, though this can lead to false positives if not balanced.
Two-Factor Authentication (2FA)
A security measure requiring two forms of verification (e.g., password and a code sent to a phone)
to access an email account, reducing the risk of unauthorized access from phishing attacks.
URL Obfuscation
A technique used in spam or phishing emails to disguise malicious links by encoding, shortening,
or embedding them in misleading text. Filters analyze URLs to detect obfuscation.
Vulnerabilities
Weaknesses in email systems (e.g., outdated software, weak passwords) that spammers or hackers
exploit to send spam, phishing emails, or malware.
Whitelist
A list of trusted email addresses, domains, or IP addresses whose emails are always allowed through
the spam filter, preventing false positives for known senders.
Zero-Day Exploit
A cyberattack that targets a previously unknown vulnerability in an email client or server, often
bypassing spam filters until the vulnerability is patched.
With MailWasher Pro, it's powerful, but easy enough for anyone to use to relieve them of
unwanted spam and scams.
MailWasher Pro uses a simple, automatic way to block spam, phishing, and malicious emails before they ever reach
your inbox. Unlike traditional cybersecurity software that reacts after the damage is done, MailWasher Pro
stops threats before they even reach your PC.
The advantage of being able to check your AOL email or any other email on the server before
they get to your PC is you can view all aspects of an email such as who it's really from,
hidden links, attachments and many other things about the email.
This helps you to make an informed choice about an email so you don't accidentally click on it,
or allow it on to your PC.
MailWasher is quick to setup and you can see all your emails in one place, whether is Gmail,
Outlook.com, Yahoo, AOL or any other email account. You can check unlimited emails accounts
with MailWasher Pro.
While MailWasher Spam Tools help you identify spam and good emails quickly, you can also quickly
train MailWasher to help it identify good and spam emails and then it will do all the work for
you.
Check out the easy way to get rid of spam and viruses. Save time by only getting the email you want!
Advanced spam detection technology and tools do all the hard work for you by automatically marking spam emails. From simple friend’s lists, blacklists and learning filters to advanced custom filters, MailWasher has you covered.
When you add people to the Friends List, you can be sure they’ll always get through.
Anyone on your blacklist will get marked for delete. You can customize it to catch all sorts of email address variations
Your emails can be checked against the FirstAlert! database of spam, a huge dataset of new spam from spam honeypots.
Create your own filters to catch spam, or label good mail. A huge range of options to filter emails how you want.
Use public blacklists to catch even more spam and make it easy for you to avoid spam.
Train MailWasher so it recognizes good email from spam email.
Catch spam and emails which use profanity.
When all the spam tools are used together they give a spam rating and mark the email as spam or good.
Most sites will tell you that they offer fast and real support but unfortunately their
promises fall short of this goal.
How do we offer the best customer support? Because we have full-time staff whose jobs are purely
to help you get the best from MailWasher Pro.
Under normal circumstances, we answer all email from registered users within 24 hours, every
single day of the week including public holidays!
There’s nothing worse than spam coming to your mobile device, so take control with MailWasher
and banish that spam while on the go.
It’s dead easy to use and very fast. Download the version for your Android phone/tablet, iPhone,
iPad and sync your email accounts, friend’s lists and blacklists from MailWasher Pro to your mobile
device.
Rid your life of spam and unwanted email now.
49.95 USD
69.41 USD
87.62 USD
149.95 USD
If at any stage within 30 days of your purchase you don't want to keep product name, just email as at [email protected] and ask for a refund.
MailWasher works with every email program, since all email programs support POP3 or IMAP. eg. Microsoft Outlook, Microsoft Mail, OeM Client, Windows Live Mail, Thunderbird, GMail, Hotmail, AOL, Postbox, Outlook.com, Yahoo and so on.
MailWasher logs in to your email accounts at your internet provider and downloads a copy
of the email allowing you to read all your email on the server. Your email actually
stays on the server at your internet provider, but MailWasher lets you inspect and
interact with your email.
MailWasher uses its built in spam tools to best
determine what is spam and what is good email. You’ll get great results if you initially
train MailWasher to learn which of your email is good and which is spam. You can easily
mark email for deletion, report spam to authorities, bounce spam back to senders and
train MailWasher to better recognize spam and good email. Then, simply pressing the
‘Wash Mail’ button will remove spam and unwanted email from the server so you can
download the remaining good email to your email program.
Using MailWasher is
easy, but you should always check your email with MailWasher first, because once it’s
been downloaded to your email program, MailWasher can’t interact with it.
MailWasher comes built in with great spam tools which lets you customize how spam and good email is handled, but you’ll get fantastic results when you train Mailwasher. All you need to do to train MailWasher is to click the ‘Thumbs up’ or ‘Thumbs down’ icons in the Classify column when MailWasher gets it wrong or doesn’t evaluate it as good or spam. After doing this to about 10-20 emails, MailWasher will do it all for you from then on.
You’ll find these in the What’s New page.
You can rescue it from the recycle bin. Just click on the Recycle Bin tab, find your email and press the ‘Restore’ button and it will appear back in your inbox.
English, German, French, Spanish, Polish, Dutch, Hungarian, Bulgarian, Ukranian, Swedish, Russian, Czech, Norwegian, Armenian, Croatian, Danish, Japanese, Portuguese, Italian, Chinese (Traditional and Simplified) and Pirate! Help translate MailWasher.
Take a look at the Quick Start Guide, or watch Helpful Videos on how to do specific things in MailWasher. We’ve compiled a list of 24 Quick Tips and Tricks, plus Advanced Features if you want to know more about custom filters and translating MailWasher.
Each license allows you to use MailWasher on 3 of your computers.
US$49.95 which covers support, ongoing updates, real-time spam blocking and the mobile version. You can try MailWasher fully featured for free for 30 days. You also get a 30 day, no risk, no questions asked money back guarantee.
Windows 7, 8, 10, 11 with .NET 4. 1GB of RAM, 64Mb of disk space recommended, and an Internet connection.
Check out the Support Page, or send our friendly support team an email with your question.
Unlike the Pro version, limited to one email account, no recycle
bin, limited email preview, no mobile sync
Over 10 million people
use MailWasher as their spam blocker to stop spam - get your 30 day free trial. Stop spam,
unwanted email and other junk with the award winning MailWasher.
MailWasher Server stops spam while offering a polished, well-integrated web
interface & built-in quarantine management facilities.
It is simple for administrators to set up and manage and easy for users to use on a day-to-day basis. Supports all Windows and Linux mail servers and operating systems.
HideAway reinvents and improves the VPN by adding flexible rules, faster speeds and an ‘Always on’ capability, while at the same time giving users a secure connection, privacy and simultaneous access to your favorite sites around the world.