Free URL Checker

Powered by Phish Guard API — scan any link for phishing, malware, and unsafe redirects. Backed by the same threat intelligence engine used by security teams. No signup required.

11 phishing detected in the last 24h 100 URLs scanned in the last 24h

Recent URL Scans by the Community

Live results from the Phish Guard engine — one entry per domain, most recent first.

Domain Verdict Age
ottshow.net Warning 0s ago View Report →
friona.ru Legitimate 0s ago View Report →
lolplay.ca Legitimate 1s ago View Report →
imal.info Legitimate 2s ago View Report →
flamingopark.com Legitimate 2s ago View Report →
tirlu.com Legitimate 2s ago View Report →
iscev.org Legitimate 2s ago View Report →
www.sketchup.com Legitimate 3s ago View Report →
washingtonappraisal.com Legitimate 3s ago View Report →
bon.plan.sexe.com Legitimate 4s ago View Report →
strongapp.me Legitimate 5s ago View Report →
n0x2kg.cyou Warning 6s ago View Report →
krig.nu Legitimate 6s ago View Report →
gwmadison.com Legitimate 6s ago View Report →
b1799.xyz Warning 6s ago View Report →
mr.miho.mietmaschinen.de Legitimate 6s ago View Report →
daegu.ac.kr Legitimate 9s ago View Report →
dt.secureconv.com Legitimate 9s ago View Report →
islandurgentcare.com Legitimate 9s ago View Report →
avtomagnitoly.kz Legitimate 10s ago View Report →
Illustration Search

What is URL Checker?

A URL Checker is a security tool that analyzes any link and determines whether it is safe, suspicious, or malicious — before you click it.

  • A Pre-Click Defense Layer

    A URL Checker is a free web tool: you paste any link into the input field and the scanner analyzes it before you visit the site. It evaluates the domain registration, SSL certificate, redirect chain, blacklist status, and IP reputation — returning a verdict (LEGITIMATE, WARNING, PHISHING, MALWARE, or SPAM) in under 2 seconds. Unlike antivirus software, which acts after a file lands on your device, a URL Checker lets you verify a link without ever opening it.

  • What It Analyzes Behind the Scenes

    When you submit a URL, the Phish Guard engine performs a WHOIS lookup to check domain age (newly registered domains are a primary phishing signal), validates the SSL certificate issuer, follows every redirect hop to identify the true final destination, cross-references the domain and IP against global threat intelligence feeds, and records the HTTP response content hash. All signals are combined into a single structured verdict.

  • Who Uses a URL Checker — and Why

    Individuals use it to verify suspicious links received via email, SMS, or social media before clicking. Security teams integrate it via the Phish Guard API to triage phishing reports at scale inside SIEM platforms and ticketing systems. Gmail and Outlook users run it directly from their inbox. A URL Checker is the first tool to reach for whenever you are uncertain about a link — before any other action.

How to Spot a Phishing Link: Common Warning Signs

Be cautious before clicking any link that shows one or more of these warning signs.

Shortened URLs

Links using bit.ly, tinyurl, or similar services hide the real destination. Always expand them before clicking.

Random Characters or Misspellings

Legitimate companies use clean, readable URLs. Random strings or typos in a domain name are common phishing tactics.

Brand Impersonation

Attackers register domains like paypa1.com or amazon-secure.net to trick users into trusting a fake site.

HTTP Instead of HTTPS

A missing SSL certificate means the connection is not encrypted. Avoid entering any data on HTTP-only pages.

Urgency or Pressure Language

Phrases like 'act now', 'verify immediately', or 'your account will be closed' are classic phishing manipulation techniques.

Pro Tips for Safe Browsing

Stay one step ahead of phishing, scams, and online threats with these expert cybersecurity tips to protect your data and browse safely.

01

Don't Click Blindly — Always hover over links to preview the real destination before opening any site.

02

Add a Second Layer of Protection — Enable 2FA (two-factor authentication) on all your accounts to strengthen security.

03

Avoid Suspicious Downloads — Never install files or software from untrusted or unknown sources.

04

Be Wary of Shortened Links — Short links (e.g., bit.ly) can hide phishing or malware sites. Use an expander tool first.

05

Pause Before You Click — Urgent or emotional messages are often signs of phishing. Take a moment to verify before acting.

URL Checker vs Antivirus

They serve different purposes — and you need both.

Feature URL Checker Antivirus
Detect phishing links Yes No
Analyze URLs before you click Yes No
Block malicious navigation Yes Partial
Detect installed malware No Yes
Works without installation Yes No
Real-time link scanning Yes Partial

Best practice: use a URL Checker to verify links before clicking, and keep your antivirus active to protect your device.

What the Scanner Actually Checks

Each URL submitted to the Phish Guard engine is evaluated across seven independent signal categories before a verdict is returned. Here is exactly what is checked — and why each signal matters.

Domain Age (WHOIS)

High risk: < 7 days

Phishing domains are registered hours before a campaign launches and abandoned within days. A domain under 7 days old with no prior history is a primary phishing indicator.

SSL Certificate

Risk: free CA + new domain

Legitimate organizations use commercial SSL from recognized issuers. Free CA certificates (Let's Encrypt) combined with a newly registered domain is a common phishing pattern.

Redirect Chain

Risk: > 2 hops to final URL

Phishing links route through clean intermediate domains — CDNs, URL shorteners, or compromised sites — to evade blacklists. Every hop is followed and the final destination is classified.

Blacklist Status

Risk: listed in any feed

The domain and IP are cross-referenced against global threat intelligence feeds. A single positive match triggers a PHISHING or MALWARE verdict regardless of other signals.

IP Geolocation

Risk: mismatch with registrant

A US-registered company hosting on IPs located in high-risk regions with no business presence is a structural anomaly. Server location is returned in every scan response.

DNS Records

Risk: bulletproof name servers

Name servers associated with hosting providers that ignore abuse reports (bulletproof hosters) are a reliable infrastructure signal for malicious campaigns.

HTTP Response

SHA-256 hash + response code

The HTTP response code, content SHA-256 hash, and page extension are recorded. Known-malicious content hashes match regardless of domain rotation — a technique used to catch fast-flux phishing kits.

Results are returned synchronously in under 2 seconds. The full structured response — including WHOIS records, redirect chain, IP geolocation, and classification — is available via the Phish Guard API.

Frequently Asked Questions (FAQ)

This free tool is powered by Phish Guard API. Need to scan URLs programmatically in your own app or security workflow?

Explore Phish Guard API →