Logo

MonoCalc

/

Email Obfuscator

Encode/Decode

About This Tool

📧 Email Obfuscator – Stop Spam Bots from Harvesting Your Address

Every email address you publish in plain HTML is a potential target. Automated spam bots continuously crawl websites looking for the @ symbol pattern and harvest millions of addresses per day. The Email Obfuscator converts your address into one of several disguised formats so bots cannot extract it, while real visitors and browsers still see it correctly.

🔍 Why Email Obfuscation Matters

A raw address like [email protected] in your HTML source is trivially scraped. Obfuscation does not make the address invisible to humans — it makes the source code representation unrecognisable to bots that scan for literal email patterns. This simple defensive layer can dramatically reduce the volume of unwanted automated messages your address receives.

⚙️ Supported Obfuscation Methods

MethodHow It WorksSpam SafetyJS Needed?
HTML Entities (Decimal)Every character → &#NNN;MediumNo
HTML Entities (Hex)Every character → &#xHH;MediumNo
ROT13Caesar cipher, shift 13LowNo
ROT-N + JSCustom shift + JS decoderMediumYes
JS charCodeAtUnicode code-point array, assembled at runtimeHighYes
Base64 + atob()Base64-encode; decode with atob()HighYes
CSS Direction (RTL)Reversed string + direction:rtl CSSMediumNo
Zero-Width InjectionU+200B inserted between every characterMediumNo

🧪 Method Deep-Dives

HTML Entity Encoding

The simplest no-JS approach. Each character in your address is replaced with its HTML numeric entity. For example, a becomes a (decimal) or a (hex). Browsers decode these automatically and render the address correctly; most basic scrapers that search for @ in source code will miss it because the @ sign becomes @.

JavaScript charCodeAt Array

Each character is stored as its Unicode code point in a JavaScript array: [104,101,108,108,111,64,…]. A small inline script assembles the string with String.fromCharCode() at page-load time. Because the literal email string never appears in HTML source, sophisticated scrapers that evaluate simple JS patterns still fail to extract it.

Base64 + atob()

The address is Base64-encoded (e.g., aGVsbG9AZXhhbXBsZS5jb20=) and a short script calls atob() to decode it in the browser. This technique is compact and highly effective — the email is not recognisable in source at all.

CSS Direction Trick

The email string is reversed and wrapped in a <span> with direction:rtl; unicode-bidi:bidi-override. Browsers display the reversed text right-to-left, which makes it appear correctly to human readers. Scrapers reading left-to-right get a nonsense string.

Zero-Width Character Injection

Unicode U+200B (zero-width space) is inserted between every character. These characters are invisible to human readers but break the [^\s@]+@[^\s@]+ regex that most scrapers use. Note: some email clients may strip these characters, so test mailto links before deploying.

🚀 How to Use This Tool

  1. Enter your email address in the input field.
  2. Choose an obfuscation method from the dropdown.
  3. Optionally add a custom display label (e.g., "Contact Us") and toggle the mailto link wrapper.
  4. Copy the generated code snippet.
  5. Paste it directly into your HTML where the email should appear.

📊 Choosing the Right Method

  • Maximum protection, JS is fine → Use JS charCodeAt or Base64 + atob().
  • No JavaScript, high compatibility → Use HTML Entities (Decimal or Hex).
  • Visual uniqueness / artistic sites → Try the CSS Direction trick.
  • Layered defence → Combine HTML entities in the href attribute with a JS-rendered display text.

⚠️ Important Limitations

JS methods require JS enabledNo method is 100% scraper-proofZero-width may break some mailto linksAll processing is client-side only

Obfuscation is a deterrent, not a guarantee. Advanced headless-browser scrapers can execute JavaScript and may defeat even the highest-rated methods. For mission-critical contact addresses consider also using a contact form, CAPTCHA-protected endpoint, or a separate obfuscated alias that forwards to your real inbox.

Frequently Asked Questions

Is the Email Obfuscator free?

Yes, Email Obfuscator is totally free :)

Can I use the Email Obfuscator offline?

Yes, you can install the webapp as PWA.

Is it safe to use Email Obfuscator?

Yes, any data related to Email Obfuscator only stored in your browser (if storage required). You can simply clear browser cache to clear all the stored data. We do not store any data on server.

What is email obfuscation and why do I need it?

Email obfuscation disguises your email address in page source code so automated spam bots cannot harvest it, while the address still appears correctly to human visitors in a browser. Without obfuscation, any email address visible in HTML is a target for scrapers that collect addresses for spam campaigns.

How does this Email Obfuscator tool work?

You enter an email address and select an obfuscation method. The tool converts the address into the chosen encoding format — such as HTML entities, JavaScript charCode arrays, Base64 decode snippets, CSS RTL tricks, or zero-width character injection — and gives you ready-to-paste output code.

Which obfuscation method offers the best spam protection?

JavaScript-based methods (charCodeAt array and Base64+atob) offer the highest protection (High rating) because the email is never present as a literal string in HTML. HTML entity encoding provides Medium-High protection. CSS direction tricks and zero-width injection are Medium. ROT13 alone (without JS) is Low since it is widely recognized.

Will the obfuscated email still work as a clickable mailto link?

When you enable the 'Wrap in mailto link' option, the tool wraps the obfuscated output in an <a href='mailto:'> tag. For JavaScript-based methods, the link is assembled dynamically at runtime so browsers can still open the mail client. For static methods (HTML entities, CSS trick), the mailto href contains the obfuscated address which most browsers decode automatically.

Does the tool send my email address to any server?

No. All obfuscation processing happens entirely in your browser using client-side JavaScript. Your email address is never sent to any server.

Are there any limitations to email obfuscation?

Obfuscation is not perfect security — sufficiently sophisticated scrapers can reverse common techniques. JavaScript-based methods fail when the visitor has JavaScript disabled. Zero-width character injection may break mailto links in some email clients. Obfuscation works best as a deterrent layer, not an absolute guarantee.