🔗

URL Safety Checker

Run 20+ security checks on any URL — phishing patterns, typosquatting, malware downloads, redirect tricks, homograph attacks, and more. Free. Instant. No login.

🔒 All analysis runs locally in your browser. No URLs are logged or sent to any server.

20+ Checks We Run

🌐
Domain Analysis: Typosquatting, number substitution (g00gle), hyphen tricks, combo-squatting
🎭
Brand Impersonation: Detects 20+ brands used in fake domains — paypal-secure.com, amazon-verify.net
🔤
Homograph Attacks: Unicode/Cyrillic look-alike chars AND leet-speak (0→o, 1→i, 3→e...)
🔗
Redirect Tricks: Open redirects, @-symbol attacks, double-slash exploits
📦
Malware Downloads: Flags .exe, .zip, .dmg, .bat, .ps1, .msi, .vbs in URL paths
🌍
Suspicious TLDs: .xyz, .tk, .ml, .cf, .ga, .pw, .top, .click and 15 more
📡
Dynamic DNS Abuse: Detects no-ip.org, dyndns.org, ddns.net, duckdns.org
🏠
Free Hosting Phishing: Glitch.me, ngrok.io, pages.dev used for phishing campaigns
🔢
IP Address URLs: Direct IP-based URLs (192.168.x.x) instead of domain names
📏
URL Complexity: Excessive length, deep subdomains, suspicious query params
🔑
Credential Keywords: /login, /verify, /secure, /account, /confirm in paths
📱
Smishing Patterns: Delivery (USPS, FedEx, DHL) and parcel-tracking scam domains
🔓
Protocol Check: HTTP vs HTTPS, non-standard protocols, data: and javascript: URIs
🧬
Punycode Domains: xn-- encoded international domains masking brand names
👁️
Visual Lookalikes: rn→m, cl→d, vv→w character confusion tricks
🔄
Redirect Parameters: ?url=, ?redirect=, ?next=, ?goto= open redirect abuse
🌏
Geo-brand Mismatch: Brand name + foreign ccTLD (google.ru, paypal.cn)
🆓
Free Subdomain Abuse: brand.weebly.com, login-paypal.blogspot.com patterns
URL Shorteners: bit.ly, tinyurl, t.co hiding actual destinations
🔗
URL Shorteners: Shortened URLs hiding actual malicious destinations
⚠️ Heuristic analysis only — may not catch zero-day phishing sites. Always verify with VirusTotal for definitive results.