How to Check If a Link Is Safe Before You Click

Clicking an unfamiliar link is one of the most common ways people expose themselves to malware, phishing scams, and data theft. The good news: you don't need advanced technical skills to evaluate a link before you open it. What you do need is a clear understanding of what makes a link dangerous — and which tools and habits can help you spot the risk.

Why Links Can Be Dangerous

A URL is just an address. But that address can lead to a site designed to steal your login credentials, silently download malicious software, or impersonate a trusted brand. The threat isn't always obvious. Attackers use techniques like URL shortening, typosquatting (registering domains like "arnazon.com" or "paypa1.com"), and redirect chains to disguise where a link actually goes.

Even links from people you know can be compromised — if their email or social media account has been hacked, malicious links can arrive through seemingly trustworthy sources.

Step 1: Look at the URL Before You Click

The first and most accessible check is simply reading the link. Hover over it on desktop — most browsers show the destination URL in the bottom status bar. On mobile, press and hold to preview the URL without opening it.

Things to look for:

  • Domain mismatch — Does the domain match the organization it claims to be from? paypal-secure-login.com is not PayPal.
  • Suspicious subdomainspaypal.malicioussite.com is controlled by malicioussite.com, not PayPal.
  • Misspellings — One transposed or substituted character is a classic phishing tactic.
  • Unusual TLDs.xyz, .top, or .click domains are frequently associated with spam, though not exclusively.
  • HTTP vs HTTPS — A missing padlock (HTTP only) doesn't make a site dangerous on its own, but legitimate sites handling sensitive data always use HTTPS.

Step 2: Expand Shortened URLs

Shortened links — from services like Bit.ly, TinyURL, or t.co — completely obscure the destination. Before clicking, expand them using a URL expander tool.

Free URL expansion tools include:

  • CheckShortURL (checkshorturl.com)
  • Unshorten.it
  • ExpandURL

Paste the shortened link in, and the tool reveals the actual destination before you visit it. This alone eliminates a significant category of risk. 🔍

Step 3: Run the Link Through a Scanner

Several reputable tools scan URLs against databases of known malicious sites, phishing pages, and malware distributors.

ToolWhat It ChecksFree?
Google Safe Browsing (via VirusTotal)Malware, phishing, unwanted softwareYes
VirusTotal70+ antivirus engines + URL scannersYes
URLVoidBlacklist reputation across multiple sourcesYes
Sucuri SiteCheckMalware, blacklist status, basic security headersYes
PhishTankCrowdsourced phishing URL databaseYes

VirusTotal is generally the most comprehensive for a one-off check — paste the URL and it runs it against dozens of engines simultaneously. A clean result doesn't guarantee safety (new malicious sites aren't always listed yet), but a flagged result is a reliable warning sign.

Step 4: Check the Domain's Age and Registration

Newly registered domains are disproportionately associated with scams. Legitimate businesses typically have domains that have been active for years. You can look up domain registration information using WHOIS lookup tools — services like whois.domaintools.com or who.is show when a domain was registered and, sometimes, by whom.

A domain registered within the last few weeks that's asking for your payment details is a significant red flag.

Step 5: Use Your Browser's Built-In Protections

Modern browsers include real-time phishing and malware protection that works in the background:

  • Google Chrome uses Google Safe Browsing and warns you before opening known dangerous pages
  • Mozilla Firefox also uses Safe Browsing and offers optional Enhanced Tracking Protection
  • Microsoft Edge includes Microsoft Defender SmartScreen, which checks URLs against a threat database
  • Safari uses Google Safe Browsing on iOS and macOS

These don't require any action on your part — they're active by default. But they work reactively (warning you as you navigate) rather than letting you preview a link beforehand.

Step 6: Consider a Security Extension

Browser extensions can add an additional layer of link scanning and reputation checking during normal browsing. Common options include Web of Trust (WOT), Bitdefender TrafficLight, and extensions bundled with antivirus suites. These typically overlay a safety indicator on search results and flag risky links in real time.

The trade-off: extensions require browser permissions, and not all extensions are equally trustworthy themselves. It's worth checking reviews and the publisher's reputation before installing any security add-on. ⚠️

What Variables Change the Risk Profile

No single method covers every scenario. Which approach makes sense depends on several factors:

  • Your threat model — Casual browsing carries different risk than handling sensitive business communications or financial accounts
  • The source of the link — Unsolicited links in email, SMS, or social DMs carry much higher risk than links you deliberately searched for
  • Your device and OS — Mobile browsers offer fewer hover previews; iOS and Android handle URL inspection differently
  • Whether you're on a managed network — Corporate and institutional networks often have DNS-level filtering that catches malicious domains before your browser even loads them
  • How often you encounter unfamiliar links — High-volume email users or researchers may benefit from more systematic tooling than occasional browsers

A security-conscious professional handling high-value accounts has different needs than someone occasionally clicking links in a family group chat. The methods exist on a spectrum — from a quick hover-and-read to a full multi-tool scan — and matching the level of scrutiny to the situation matters as much as knowing the tools themselves. 🛡️

The practical reality is that no single check is foolproof, and even combining several methods leaves a margin of uncertainty — particularly with brand-new malicious sites that haven't yet been indexed by threat databases. What your own right approach looks like depends on where you encounter links, what you stand to lose if something goes wrong, and how much friction you're willing to accept in your daily browsing.