On‑device checks · No URLs uploaded
URL Scam Risk Checker
Spot red flags in one click
Detects common scam traits: disguised domains, Punycode (xn--
), mixed scripts, short links, excessive subdomains, non‑standard ports, bait keywords, and messy parameters. We grade Low / Medium / High risk — for guidance only. Always verify through official channels.
- Domain structure & TLD
- Punycode / mixed scripts
- Short link / redirects
- Common phishing keywords
- Suspicious paths & parameters
Get help if you’ve been scammed
1) Stop and secure
Cease contact. Change passwords. Enable 2‑step verification. Suspend cards if needed.
2) Call your bank
Ask to block transfers and freeze compromised accounts immediately.
3) Report it
File a police report and keep screenshots, URLs, phone numbers, and transaction IDs.
Note: Hotlines differ by country/region. Contact your local anti‑scam or police helpline.
URL Scam Risk Check
⚠️ Educational use only. We do not collect URLs. When in doubt, close the tab and access the service from its official app/site.
Key highlights
Suspicious domain structure
Deep subdomains (≥3), many dashes/digits, or unusual TLDs raise caution.
Punycode / mixed scripts
xn--
or mixing Latin with Cyrillic/Greek/CJK can imitate brand names.
Short links & redirects
bit.ly, t.co, rebrand.ly… conceal the destination. Prefer official links.
Bait keywords
login, verify, bonus, invoice, bank… often paired with SMS links.
Non‑standard ports
e.g. :8080
, :444
. Confirm the source when ports look odd.
Messy parameters
Long query strings, tokens, or trackers can hide where you’ll land.
Common examples (demo)
Learn: 3‑step recognition
example.com
, ignore confusing prefixes like login.example.com.security-update.cn
. Focus on the last two labels (registrable domain).