TLDR: You can use Browserling (that I and my team built) to check if a URL is safe or not. We run browsers in the cloud in virtual machines and you get a remote connection to a browser. This way, you can open any bad URLs without the risk of infecting your device as everything runs in this this remote browser.

Introduction

As the world has become digitally interconnected, the importance of being able to discern between safe and unsafe URLs has never been more relevant. Unsafe URLs can lead to malware infections, phishing attempts, and breaches of personal data. In this article, I'll tell you everything I know about how to distinguish between safe and unsafe URLs and how to use Browserling to spot and avoid these digital landmines.

Understanding the URL structure

Before delving into the signs of an unsafe URL, it's crucial to know the basic parts of a URL. A URL can be broken into seven parts: protocol scheme, subdomain, domain, top level domain (TLD), path, query string, and anchor. Let's look at each part.

Protocol Scheme

This is the initial part of a web address that determines the communication protocol or a program that will be used to open it.

Examples: http, https, ftp, or mailto.

In the URL https://www.google.com, it's https, which is secure version of the HTTP protocol used for online communication, ensuring data is encrypted and transmitted safely between a user's device and a website.

Domain Name

The main part of a web address. It's a human-readable address that uniquely identifies a website or online resource.

Examples: google.com, yahoo.com, and digg.com.

In the URL https://www.google.com, it's google.com

Subdomain

This is the optional part before a domain name.

Examples: www, blog, or shop.

In the URL https://www.google.com, it's www, which is a commonly used prefix in web addresses, denoting "World Wide Web", and it serves as a standard subdomain for almost all websites.

Top-Level Domain (TLD)

The ending segment of a web address, indicating the domain's type, category or country of origin.

Examples: .com, .org, .net, .it, or .onion.

In the URL https://www.google.com, it's .com

Path

A specific page on a website.

Examples: /blog, /account, or /resources/free/downloads.

In the URL https://www.google.com/blog, it's /blog, which leads users to the blog section or another page of a website.

Query String

This part starts with a question mark ? and allows sending parameters to a page, and it's often in the format of key=value pairs.

Examples: ?id=123 or ?search=python&sort=date.

In the URL https://www.google.com/search?q=puppies, it's ?q=puppies, which loads the search query for puppies.

Anchor

An anchor is used to direct you to a specific section of a page.

Examples: #footer or #tools.

In the URL https://www.google.com/blog#top-posts, it's #top-posts, which scrolls the webpage to the top posts section of the blog.

Full URL Example

https://www.google.com/blog/post?id=123#tools
  • Scheme: https
  • Subdomain: www
  • Domain Name: google.com
  • Top-Level Domain (TLD): .com
  • Path: /blog/post
  • Query String: ?id=123
  • Anchor: #tools

Spotting Unsafe URLs

Here are 15 signs that can help you identify and avoid unsafe URLs.

1. Mismatched URLs

You can hover over a link to see where it leads to. If the hover link doesn't match the URL or the title in the text, be cautious.

Example of a ligature used in place of a letter

The text says "Bank of America" but hover is "bankofarnerica.com" (the letters "rn" are combined together to create a ligature that looks like letter "m").

Example of a number used as a letter

The text says "PayPal" but it hovers as "paypa1.com" (digit "1" is used in place of the letter el - "l").

2. Misspelled Domains

Typos or slight variations of popular domain names can lead to malicious websites.

Example of misspelled Amazon

You search for a book and click on a link that seems to lead to amazon.com, but a closer look reveals it says amazom.com (last letter is "m" and not "n").

Example of misspelled Facebook

You try logging into facebook.com but find yourself at facebokk.com instead (instead of "book", it says "bokk").

3. Unicode characters in URLs

URLs that contain fake Unicode characters pose a great danger.

Example of a homoglyph attack

While searching for a Samsung phone update, you find a link to ѕаmѕung.соm. It turns out this address is fake as it replaces standard characters with visually similar Unicode characters (called homoglyphs).

Example of a Punycode deception

You're searching for a security product and visit security.com but after visiting, your browser shows xn--scurity-w4a.com in the address bar. The real address was sécurity.com and the browser converted it to an international domain name (IDN) encoding called Punycode.

4. Unusual Top-Level Domain

Uncommon TLDs that don't align with the site's supposed purpose.

Example of a government website at a .kim domain

Searching for a government service, you stumble upon GovernmentAgency.kim, which doesn't feel official.

Example of a clothing brand's website at a .horse domain

You're looking for an Italian clothing brand's site but land on ItalianBrand.horse, which seems inconsistent with their product line.

5. Excessive Redirects

URLs that send you through multiple sites rapidly.

Example of a fake online deal

You're hoping to snag an online deal at greatoffer90.com, but you find yourself being bounced between multiple unrelated websites.

Example of a fake movie website

You're trying to watch a movie on freemoviesnow.com but the page keeps shifting and redirecting, never settling on the content you wanted.

6. URL Shorteners

Services that conceal the end destination of a link.

Example of a bit.ly link

A friend sends you a bit.ly link (such as bit.ly/XXXXX and you can't determine its destination.

Example of a tinyurl.com link

An email offers a great discount, but the link is a shortened tinyurl.com/XXXXX, hiding its true endpoint.

7. Generic Greetings

Emails or messages that come with vague salutations instead of personalized greetings.

Example of an impersonal account update email

An email asks you to update your account details for security reasons with a link reading accountupdate.com and an impersonal greeting of Dear valued member (instead of your name).

Example of a lucky visitor popup

A notification pops up, claiming you're a lucky visitor and you've won a prize and urging you to visit surprisewin.com with the salutation Hello user (instead of your name).

8. Unsolicited Invitations

Unexpected URLs from known and unknown senders can be suspicious.

Example of an invitation to an unknown photo site

An email from an unknown sender urging you to see an amazing photo at checkoutthisphoto.com.

Example of an invitation to view a PDF file

You receive a message saying a colleague has shared a PDF document on seemyresume.net, but you weren't expecting any such thing.

9. Too-Good-To-Be-True Offers

Promising deals or prizes that seem too generous.

Example of a link to huge winnings

An ad claims you can win a million dollars instantly, directing you to win-1million-now.com.

Example of an unexpected prize

You receive an email promising a free top-end smartphone for every form that you fill at freesmartphones.com.

10. Alarmist Messages

Sites that induce panic to make you act quickly.

Example of a popup asking you to act quickly

A pop-up warns of suspicious activity on your account and insists you visit urgent-account-alert.com to resolve it or else your account will be suspended.

Example of an alert telling your PC has been infected with a virus

An alert pops up saying your PC has been infected with a virus and asks you to fix your PC by visiting instant-pcfixer.com.

11. Grammar and Spelling Errors

Mistakes in the URL and link text can indicate deceit.

Example of a login page with a typo

You're trying to access a login page and you find the link reads officiall-login.com, with a duplicate letter "el".

Example of a grammar and spelling error in text surrounding the link

You receive an email from an online payment service but it says Varifay, your acount to login, with terrible grammar and spelling errors.

12. Inconsistent Branding

The website's design or URL structure doesn't match the known branding of a reputed entity.

Example of a broken logo on Google's login page

You click on a Google login page, but something feels off. The page URL google-securelogin.com and the logo is broken.

Example of a fake Apple support page

Seeking Apple support, the site you land on has a web address applesupports.org, which is nicely made, but doesn't align with Apple's official domains.

13. No Contact Information

Absence of genuine contact details on a website.

Example of a fake product support site

Having an issue with a product, you try reaching out via contactsupportnow.com, but the site has just one page and lacks any genuine contact details.

Example of a page with no contact details

Needing customer care, customercareinfo.net appears to offer support but has no phone number or physical address listed.

14. Unexpected Software Downloads

URLs that initiate unsolicited software or file downloads.

Example of an unexpected download

Hoping to listen to some new music tracks, you click on freemusicdownloader.com, only for it to start downloading an unexpected executable file.

Example of a download without your consent

A friend suggests a cool new app, but getthisappnow.com initiates an unsolicited software download without your consent.

15. Lack of HTTPS

A missing secure protocol can indicate the site isn't encrypted, which can lead to personal data and credit card exposure.

Example of an unsafe banking website

A banking website that doesn't use https: http://yourbanklogin.com. Here instead of https it uses http protocol.

Example of an unsafe payment portal

A secure payments portal that doesn't use HTTPS: http://secure-paymentportal.com. Here, again, it uses unsecure http protocol instead of secure https protocol.

How Browserling Can Help You Spot Unsafe URLs

While I dove deep into 15 key signs that can help you identify potentially malicious URLs, it's essential to understand that the digital landscape of unsafe URLs is vast and ever-evolving. In many respects, I've just skimmed the surface of the complex world of cybersecurity threats related to URLs. Fortunately, my service Browserling stands as a bulwark against these diverse threats and offers a secure layer of protection.

What Is Browserling?

Browserling is a web-based service that offers real-time remote access to sandboxed browsers that allow users to run browsers from different operating systems directly in their own browser. As the browsers are sandboxed, the browsing sessions are isolated, making it especially useful for testing potentially unsafe URLs without risking one's own system or data.

Interactive Testing

Browserling isn't just a passive tool. It offers a live and interactive browsing experience that can help security professionals recognize unusual site behaviors, from unexpected redirects to aggressive pop-ups, and other potential red flags not covered in the initial 15 signs.

Cross-Browser Analysis

Cybercriminals sometimes exploit browser-specific and platform-specific vulnerabilities. For example, they might target Chrome version 115 that runs on Windows 10. Browserling's capability to test URLs across multiple browsers and platforms means you're not just looking for general threats, but also those that are browser-specific.

Zero Additional Risks

With no required downloads, installs, or extensions, Browserling ensures that your safety isn't compromised by adding potential vulnerabilities. Every interaction is web-based, keeping a safe distance from potential threats.

Clean State Every Time

Each session with Browserling is temporary and wiped clean after use. This clean up of session data guarantees that no malware, viruses, cookies, or trackers linger post-investigation.

Secure Connections

Browserling prioritizes user data privacy and security with SSL-encrypted connections. This ensures that, while you're investigating a URL, your connection remains invisible to potential eavesdroppers.

Who Uses Browserling?

Browserling has now become the tool of choice for testing link safety and it's used by hundreds of thousands of users around the world every month. Browserling's customers include governments, states, cities, banks, stock exchanges, universities, newspapers, Fortune 100, Fortune 500 companies, and private multi-billion dollar companies.

Conclusion

The scope of unsafe URLs extends far beyond the 15 signs I initially outlined. With Browserling, users are equipped with an advanced tool offering both breadth and depth in analysis and defense against the countless URL-based cyber threats. Give it a try and browse safe!