Tracking Pixel Detector
Marketing emails almost always embed a 1×1 invisible pixel. The moment you open the email, that image loads — and the sender's server is silently notified that you opened it.
This page parses the HTML entirely inside your browser. Nothing is uploaded.
We never send your HTML anywhere. Everything is parsed inside your browser.
No tracking pixels found
But that does not mean the email is safe. Tracking parameters in links, CSS tricks, or images hosted on shared CDNs may still report when you open it.
Detected tracking pixels
Suspicious images (unknown service, but tiny / hidden)
CSS background-image trackers
Note: detection does not mean the sender is malicious. Most are legitimate ESPs. The point is that opening the email silently reports back to them.
How it works
- Use "View source" in your email client and paste the raw HTML into the textarea.
-
The browser's
DOMParserparses the HTML and extracts every<img>tag. -
Each image's hostname is matched against a list of known email service providers
(Mailchimp, HubSpot, SendGrid, etc.). Images that are 1×1 or hidden via
display:noneare also flagged as suspects. -
url()inside<style>tags is also checked. We never actually fetch any of those URLs.
Note: tracking pixels are legal and used by nearly every marketing email. The simplest defense is to disable automatic image loading in your email client (Apple Mail Privacy Protection, Gmail's image proxy, etc.).