Passer au contenu principal

Phishing Link Checker

Analyze suspicious links to detect phishing: typosquatting, trap domains, hidden redirects. Risk score 0-100.

Examples (suspicious): http://paypa1.com/login https://google.com.evil-site.ru/sig… https://bit.ly/3xF9kLm https://secure-bank-login.verify-ac… http://192.168.1.1/admin
100% local analysis — no link is sent to a server.

Analysis history

No analyses yet.

How to recognize a phishing link?

Phishing is an attack technique that tricks victims via fake links mimicking legitimate sites (banks, social networks, online services). Recognizing warning signs in a suspicious URL is essential for protection.

Main warning signals

Typosquatting replaces letters with visual lookalikes (paypa1.com instead of paypal.com). Subdomain spoofing uses a legitimate domain as a subdomain of a malicious one (google.com.evil.ru). Suspicious TLD domains (.tk, .xyz, .ru) combined with financial keywords are common. Very long URLs with many parameters try to hide the real destination.

Shortened links and redirects

URL shorteners (bit.ly, tinyurl, t.co) hide the real destination — they are not inherently malicious but require extra vigilance when used in unsolicited emails. URLs with redirect parameters (?redirect=, ?url=, ?goto=) can be used to bypass security filters.

Frequently asked questions

Our checker uses 100% client-side heuristic analysis (JavaScript in your browser). It analyzes URL structure, domain name, subdomains, TLDs, parameters and URL ... Our checker uses 100% client-side heuristic analysis (JavaScript in your browser). It analyzes URL structure, domain name, subdomains, TLDs, parameters and URL text content to detect patterns characteristic of phishing. No network request is made — the link is never visited. Analysis is instant and fully preserves your privacy.

Typosquatting (or URL hijacking) consists of registering domain names very similar to known brands, by changing a letter or using visually similar numbers. Exam... Typosquatting (or URL hijacking) consists of registering domain names very similar to known brands, by changing a letter or using visually similar numbers. Examples: paypa1.com (1 instead of l), goggle.com, amazon-fr.com, micosoft.com. Attackers then create a perfect copy of the real site to collect your credentials. Our analyzer compares the domain against a database of 50+ target brands.

No. Our heuristic analysis detects known phishing patterns, but it is not infallible. A sophisticated attacker may use a compromised legitimate domain or truste... No. Our heuristic analysis detects known phishing patterns, but it is not infallible. A sophisticated attacker may use a compromised legitimate domain or trusted infrastructure to host their attack. The analyzed signals are risk indicators, not certainties. When in doubt, never enter your credentials on a site received via unsolicited email or SMS, even if the score is low.

1) Do not click the link. 2) Do not enter any personal information (password, card number). 3) If the link claims to come from a known company, contact that com... 1) Do not click the link. 2) Do not enter any personal information (password, card number). 3) If the link claims to come from a known company, contact that company directly via their official website (type the URL manually). 4) Report the link to Anti-Phishing Working Group ([email protected]) or your national cybersecurity agency. 5) If you already entered data, change your passwords immediately.

Subdomain spoofing exploits the natural reading of URLs. In "google.com.login.malicious.ru", our eye is drawn to "google.com" but the real (registered) domain i... Subdomain spoofing exploits the natural reading of URLs. In "google.com.login.malicious.ru", our eye is drawn to "google.com" but the real (registered) domain is "malicious.ru". The rule: the real domain is always the last two segments before the first slash (/). To analyze quickly: read the URL from right to left starting from the first slash and identify the last two segments after the dot — that is the real domain.
Lien copié !