“Potential spam” (sometimes shown as “Suspected spam”) is a warning label your carrier or phone app adds to an incoming call that might be unwanted or risky. It doesn’t mean the call is definitely harmful, but it’s a signal to be cautious. Many of these calls are simply nuisances like telemarketers or robocalls. However, some may involve attempts to get personal information or trick the recipient. This guide explains what a “Potential spam” call is and what to do if you receive such a call.
Ugnė Zieniūtė
September 26, 2025
“Potential spam” calls are those that look suspicious according to your mobile provider or call app. Providers run spam analytics that weigh many signals and label or filter calls accordingly:
However, false positives still happen. Recycled numbers that previously had a bad reputation and inconsistent call patterns that resemble spam behavior also trigger a false positive.
Both “Potential spam” and “Suspected spam” mean the network/app has assessed the call as likely unwanted, but phrasing varies by ecosystem. For example, Google’s Phone app warns about “Potential spam” callers, while Verizon Call Filter alerts if a number may be a “Suspected spam.” In practice, “potential” and “suspected” indicate the same risk: Proceed carefully, let the call go to voicemail, and verify the caller through official numbers if needed.
“Scam likely” generally signals a higher risk of fraud than “Potential spam.” Carriers typically reserve the strongest labels (and auto-blocking) for campaigns tied to known phone scams and vishing. Regardless of label, the best practice to keep yourself safe is to let unknown calls roll to voicemail and call back via the organization’s official number.
“Potential spam” calls can happen to anyone. Treat the label like a hazard sign. Your goal is to avoid engaging, avoid revealing information, and maintain control of the next move. Follow these tips when you’re faced with such calls:
If you’ve already answered a “Potential spam” call, follow these steps:
Most calls flagged as “Potential spam” are simply unwanted or annoying, like telemarketers or robocalls. Usually, these calls aren’t harmful if you don’t engage. However, if the call is from scammers pretending to be legitimate, interacting with them could lead to risks like losinmoney. Here’s what could happen if you interact with such calls:
Blocking is a two-step mindset. Block and report the number and tighten your global anti-spam settings. Your mobile devices can also provide you with automatic filters that will lessen the probability of spam calls coming in.
Spam calls are a common nuisance, but your iPhone has built-in features to help you stay in control. Let’s take a look at two effective ways to reduce unwanted calls.
Blocking a number is a quick way to stop repeated spam calls from the same source.
For calls from numbers you don’t recognize, you can have them go directly to voicemail.
If you’re planning to stop spam calls on an Android device, keep in mind that menus can differ depending on the type of phone. These steps use Google’s Phone app as a reference.
If a spam call or message comes from a particular number, blocking it is the fastest way to prevent future contact.
Android phones can detect spam calls and warn you before you answer if you choose the right settings.
Ugnė is a content manager focused on cybersecurity topics such as identity theft, online privacy, and fraud prevention. She works to make digital safety easy to understand and act on.
The credit scores provided are based on the VantageScore 3.0® credit score by TransUnion® model. Lenders use a variety of credit scores and may utilize a different scoring model from VantageScore 3.0® credit score to assess your creditworthiness.
You have numerous rights under the FCRA, including the right to dispute inaccurate information in your credit report(s). Consumer reporting agencies are required to investigate and respond to your dispute but are not obligated to change or remove accurate information that is reported in compliance with applicable law. While this plan can provide you assistance in filing a dispute, the FCRA allows you to file a dispute for free with a consumer reporting agency without the assistance of a third party.
No single product can fully prevent identity theft or monitor every single transaction.
Some features may require authentication and a valid Social Security Number to activate. To access credit reports, scores, and/or credit monitoring services (“Credit Monitoring Services”), you must successfully pass your identity authentication with TransUnion®, and your VantageScore 3.0® credit score file must contain sufficient credit history information. If either of these requirements is not met, you will not be able to access our Credit Monitoring Services. It may take a few days for credit monitoring to start after a successful enrollment.
NordProtect's dark web monitoring service scans various sources where users' compromised personal information is suspected of being published or leaked, with new sources added frequently. However, there is no guarantee that NordProtect will locate and monitor every possible site or directory where consumers' compromised personal information is leaked or published. Accordingly, we may not be able to notify you of all your personal information that may have been compromised.
Identity and cyber protection benefits are available to customers residing in the U.S., including U.S. territories and the District of Columbia, with the exception of residents of New York and Washington. Benefits under the Master Policy are issued and covered by HSB Specialty Insurance Company. You can find further details and exclusions in the summary of benefits.
Our identity theft restoration service is part of a comprehensive identity theft recovery package that offers a reimbursement of up to $1 million for identity recovery expenses. To access the support of an identity restoration case manager, you must file a claim with HSB, which NordProtect has partnered with to provide the coverage. HSB is a global specialty insurance company and one of the largest cyber insurance writers in the U.S.