Phishing URL Checker
Enterprise-grade heuristic analysis tool for detecting homograph attacks, typosquatting, and obfuscated malicious URLs. Client-side execution with zero data leakage.
About
In the Zero Trust security model, validating the structural integrity of a Uniform Resource Locator is the first line of defense. This tool does not rely on static blacklists, which are often days behind active campaigns. Instead, it employs Heuristic Analysis to deconstruct the URL string, identifying anomalies such as IDN Homograph attacks (mixing Unicode scripts), high-entropy subdomains, and protocol downgrades. It effectively separates the Displayed Destination from the Actual Server. This tool runs entirely in the client browser, ensuring that sensitive internal links are never transmitted to third-party servers.
Formulas
The core risk assessment utilizes a weighted sum algorithm to determine the ThreatLevel. The baseline score is 0.
Reference Data
| Attack Vector | Detection Logic | Risk Weight | Visual Indicator |
|---|---|---|---|
| IDN Homograph | Regex match for mixed scripts (e.g., Latin + Cyrillic) | CRITICAL | Π°pple.com (Red Highlight) |
| IP Hostname | Pattern match IPv4 or IPv6 syntax | HIGH | 192.168.0.1 |
| TLD Spoofing | Dictionary check against Risky TLDs (e.g., .zip, .top) | MEDIUM | file.zip |
| Subdomain Abuse | Depth calculation (dots > 3) | MEDIUM | secure.login.update... |
| Credential Stuffing | Presence of @ before hostname | CRITICAL | user:pass@host |
| Port Obfuscation | Non-standard port usage (e.g., :8080, :21) | LOW | :8080 |