This document summarizes a project for detecting suspicious emails. The project has modules for login, registration, administration, user functions, and mailing. It uses technologies like JSP, Tomcat, HTML, JavaScript, and Oracle database. The system architecture diagram and data flow diagram are included. The analysis discusses advantages like finding anti-social elements and security, as well as disadvantages like inability to detect suspicious emails or identify offensive users in the existing system. The future scope is to identify suspicious users by keywords in emails and block malicious emails.