How to Check If a Link Is Safe Before You Click
Clicking an unfamiliar link is one of the most common ways people expose themselves to malware, phishing scams, and data theft. The good news: you don't need advanced technical skills to evaluate a link before you open it. What you do need is a clear understanding of what makes a link dangerous — and which tools and habits can help you spot the risk.
Why Links Can Be Dangerous
A URL is just an address. But that address can lead to a site designed to steal your login credentials, silently download malicious software, or impersonate a trusted brand. The threat isn't always obvious. Attackers use techniques like URL shortening, typosquatting (registering domains like "arnazon.com" or "paypa1.com"), and redirect chains to disguise where a link actually goes.
Even links from people you know can be compromised — if their email or social media account has been hacked, malicious links can arrive through seemingly trustworthy sources.
Step 1: Look at the URL Before You Click
The first and most accessible check is simply reading the link. Hover over it on desktop — most browsers show the destination URL in the bottom status bar. On mobile, press and hold to preview the URL without opening it.
Things to look for:
- Domain mismatch — Does the domain match the organization it claims to be from?
paypal-secure-login.comis not PayPal. - Suspicious subdomains —
paypal.malicioussite.comis controlled bymalicioussite.com, not PayPal. - Misspellings — One transposed or substituted character is a classic phishing tactic.
- Unusual TLDs —
.xyz,.top, or.clickdomains are frequently associated with spam, though not exclusively. - HTTP vs HTTPS — A missing padlock (HTTP only) doesn't make a site dangerous on its own, but legitimate sites handling sensitive data always use HTTPS.
Step 2: Expand Shortened URLs
Shortened links — from services like Bit.ly, TinyURL, or t.co — completely obscure the destination. Before clicking, expand them using a URL expander tool.
Free URL expansion tools include:
- CheckShortURL (checkshorturl.com)
- Unshorten.it
- ExpandURL
Paste the shortened link in, and the tool reveals the actual destination before you visit it. This alone eliminates a significant category of risk. 🔍
Step 3: Run the Link Through a Scanner
Several reputable tools scan URLs against databases of known malicious sites, phishing pages, and malware distributors.
| Tool | What It Checks | Free? |
|---|---|---|
| Google Safe Browsing (via VirusTotal) | Malware, phishing, unwanted software | Yes |
| VirusTotal | 70+ antivirus engines + URL scanners | Yes |
| URLVoid | Blacklist reputation across multiple sources | Yes |
| Sucuri SiteCheck | Malware, blacklist status, basic security headers | Yes |
| PhishTank | Crowdsourced phishing URL database | Yes |
VirusTotal is generally the most comprehensive for a one-off check — paste the URL and it runs it against dozens of engines simultaneously. A clean result doesn't guarantee safety (new malicious sites aren't always listed yet), but a flagged result is a reliable warning sign.
Step 4: Check the Domain's Age and Registration
Newly registered domains are disproportionately associated with scams. Legitimate businesses typically have domains that have been active for years. You can look up domain registration information using WHOIS lookup tools — services like whois.domaintools.com or who.is show when a domain was registered and, sometimes, by whom.
A domain registered within the last few weeks that's asking for your payment details is a significant red flag.
Step 5: Use Your Browser's Built-In Protections
Modern browsers include real-time phishing and malware protection that works in the background:
- Google Chrome uses Google Safe Browsing and warns you before opening known dangerous pages
- Mozilla Firefox also uses Safe Browsing and offers optional Enhanced Tracking Protection
- Microsoft Edge includes Microsoft Defender SmartScreen, which checks URLs against a threat database
- Safari uses Google Safe Browsing on iOS and macOS
These don't require any action on your part — they're active by default. But they work reactively (warning you as you navigate) rather than letting you preview a link beforehand.
Step 6: Consider a Security Extension
Browser extensions can add an additional layer of link scanning and reputation checking during normal browsing. Common options include Web of Trust (WOT), Bitdefender TrafficLight, and extensions bundled with antivirus suites. These typically overlay a safety indicator on search results and flag risky links in real time.
The trade-off: extensions require browser permissions, and not all extensions are equally trustworthy themselves. It's worth checking reviews and the publisher's reputation before installing any security add-on. ⚠️
What Variables Change the Risk Profile
No single method covers every scenario. Which approach makes sense depends on several factors:
- Your threat model — Casual browsing carries different risk than handling sensitive business communications or financial accounts
- The source of the link — Unsolicited links in email, SMS, or social DMs carry much higher risk than links you deliberately searched for
- Your device and OS — Mobile browsers offer fewer hover previews; iOS and Android handle URL inspection differently
- Whether you're on a managed network — Corporate and institutional networks often have DNS-level filtering that catches malicious domains before your browser even loads them
- How often you encounter unfamiliar links — High-volume email users or researchers may benefit from more systematic tooling than occasional browsers
A security-conscious professional handling high-value accounts has different needs than someone occasionally clicking links in a family group chat. The methods exist on a spectrum — from a quick hover-and-read to a full multi-tool scan — and matching the level of scrutiny to the situation matters as much as knowing the tools themselves. 🛡️
The practical reality is that no single check is foolproof, and even combining several methods leaves a margin of uncertainty — particularly with brand-new malicious sites that haven't yet been indexed by threat databases. What your own right approach looks like depends on where you encounter links, what you stand to lose if something goes wrong, and how much friction you're willing to accept in your daily browsing.