Safe Browsing Checker – Instantly Verify If a Website Is Safe or Dangerous
Please complete the security verification to check the website
Enter any website URL to check for malware, phishing, and security threats
Checking website safety...
Analyzing with Google Safe Browsing API
Safety Check Results
Threat Details
Safety Recommendation
Do not visit this website. It may harm your computer or steal your personal information.
Safe Browsing Checker — Verify a URL Before You Click It
Every day, hundreds of millions of people click links they shouldn't. Phishing emails that look like PayPal notices. Shortened URLs shared in group chats. Ads that redirect through three domains before landing somewhere unexpected. Search results that look legitimate but lead to lookalike sites designed to steal passwords. The vast majority of these threats could be avoided with a single question asked first: is this URL actually safe?
This Safe Browsing Checker answers that question. You paste a URL, complete a quick verification, and get an instant verdict backed by Google's threat intelligence — the same database that protects Chrome, Gmail, Google Search, and over five billion devices worldwide. If the URL is known to be dangerous, you'll see exactly why. If it's clean, you'll see that confirmed within seconds.
What Google Safe Browsing Actually Is
Google Safe Browsing isn't a general reputation score or a community review system. It's a purpose-built threat detection infrastructure that Google has been running since 2005. Every day, Google's crawlers and reporting systems identify and catalog unsafe web resources — sites hosting malware, pages designed to steal credentials, software downloads that secretly modify your system, and applications that create security vulnerabilities.
The scale of this system is significant. Google identifies approximately 9,500 new malicious sites every day. The database is updated continuously, and the threat lists are checked against billions of URL requests across Google's products. When Chrome shows you a red warning page that says "Dangerous Site" before loading a URL, that's Google Safe Browsing at work. The same database, the same threat lists, power this checker.
The API behind this tool uses the threatMatches:find endpoint, which checks a submitted URL directly against Google's threat lists across four threat categories and multiple platform types. If there's a match, the response includes the specific threat type, affected platform, and severity — all of which this tool displays in the results.
The Four Threat Types Explained
When this tool returns an unsafe result, it tells you specifically which threat category was detected. Here's what each one means in practice:
Malware. Malware is software explicitly designed to damage devices, steal data, spy on users, or hold files for ransom. Malware sites typically serve drive-by downloads — files that install themselves when you visit the page, sometimes without any interaction required. Google has been flagging malware sites since 2006. Sites in this category may be legitimate websites that have been compromised and injected with malicious code, or they may be purpose-built distribution infrastructure for ransomware, keyloggers, or trojans.
Social Engineering (Phishing). Phishing is currently the most prevalent web threat — Google's data shows there are nearly 75 times more phishing sites than malware sites on the internet. A phishing site mimics a legitimate brand — your bank, a payment processor, a major retailer, a government agency — and tricks you into entering your login credentials or financial information. These sites often look pixel-perfect. The URL is usually the only giveaway, and even that can be obscured with lookalike characters or long redirect chains. Google Safe Browsing uses behavioral analysis and visual feature recognition to identify these pages even when the URL looks plausible.
Unwanted Software. Not quite malware, but not safe either. Unwanted software sites distribute programs that make unauthorized changes to your system — switching your default browser homepage, installing browser extensions you didn't ask for, adding toolbars, changing search engine defaults, or redirecting your searches through ad-serving proxies. Google added this category in 2014 specifically because these programs were too common and too harmful to ignore, even though they often didn't meet the technical definition of malware.
Potentially Harmful Applications (PHA). This category covers Android-specific threats and applications that violate Google's policies around privacy, device security, or deceptive behavior. Sites that distribute apps which access sensitive device data without disclosure, mimic system prompts, or grant themselves excessive permissions fall into this category. If you're checking URLs from app download pages or mobile-targeted links, this is a particularly relevant category.
Situations Where You Should Check a URL First
Most people check URLs when something feels off. But there are specific situations where running a check should be routine practice, not just a reaction to suspicion:
Email and message links from unknown senders. Phishing emails are the entry point for the majority of corporate data breaches. A link in an email claiming to be from your bank, your employer's IT department, a courier company, or a government agency deserves a check before clicking — regardless of how legitimate the sender name looks. Email headers are trivially spoofable.
Shortened URLs. Link shorteners (bit.ly, tinyurl.com, t.co) hide the actual destination. You have no way of knowing where a shortened link goes until you click it. Checking the expanded URL is the only way to verify the destination before visiting. Paste the shortened URL directly — the tool follows redirects before checking.
Links shared in social media, forums, and group chats. These are among the most common vectors for phishing links and malware distribution. The context of "someone in my Discord shared this" provides zero safety guarantee. Particularly be cautious with links shared with urgency or emotional pressure ("you need to see this," "you've been mentioned," "your account is at risk").
Links from search results on unfamiliar sites. Search engine manipulation is a persistent attack vector. Malicious sites can rank for specific queries — particularly for software downloads, free tools, media files, and product serial numbers. If a search result takes you to a domain you've never heard of that's offering something that seems too convenient, check it first.
URLs in QR codes. QR codes are visually opaque — you have no way to preview the destination before scanning. A QR code posted on a physical sign, printed on a flyer, or displayed in a public place could redirect to a phishing page. Capture the URL from the QR code first and check it before proceeding.
Links in invoice PDFs and document attachments. Business email compromise attacks often involve legitimate-looking PDF invoices containing malicious links. The document appears credible, but the "Pay Now" or "View Statement" link leads to a credential-harvesting page. Always check these links, particularly when the invoice is unexpected or from a vendor you don't regularly work with.
Understanding the Limitations of This Check
This tool is powered by Google Safe Browsing's threat database, which is one of the most comprehensive available. But it has specific limitations you should understand:
It reflects known threats, not all threats. The database catalogs sites that have been reported, crawled, and confirmed as dangerous. A brand-new phishing page created this morning may not be in the database yet. Google flags approximately 9,500 new malicious sites daily, but the lag between a site going live and being cataloged is real. A clean result is a strong positive signal — not a 100% guarantee.
It checks the URL, not the full page content. The API checks the URL against threat lists. It doesn't analyze the current content of the page in real time. A site that was clean last week and has since been compromised may not yet appear in the database.
It doesn't evaluate trust or quality. A clean result means the URL isn't in Google's threat database. It says nothing about whether the site is a scam, whether the business is legitimate, whether the content is accurate, or whether the site is a low-quality or fraudulent operation that hasn't been formally flagged yet. For evaluating general site trustworthiness, Google Safe Browsing is a starting point — not a complete answer.
For the most thorough URL analysis, particularly for high-stakes situations, consider also checking the URL against VirusTotal (which checks across 70+ security engines simultaneously) or Google's own Transparency Report tool.
How the Tool Works — Under the Hood
The process from entering a URL to seeing a result involves several steps that happen in sequence:
First, the frontend validates your URL before anything is sent anywhere. It checks for the presence of a valid hostname, rejects inputs containing spaces, and confirms the basic structure looks like a URL. This catches obvious mistakes before an API call is wasted.
Second, you complete reCAPTCHA verification. This is a genuine anti-abuse measure, not decorative friction. The Google Safe Browsing API has rate limits. Without reCAPTCHA, this tool would be trivially usable for bulk automated URL checking, which would exhaust the API quota quickly and degrade the service for everyone. The reCAPTCHA token generated by your verification is sent to the backend along with the URL and verified server-side before any check proceeds.
Third, the backend performs its own URL validation — independent of the frontend check. If a protocol is missing (you entered "example.com" rather than "https://example.com"), it's added automatically. The backend uses Python's URL parsing library to confirm the URL is structurally valid before calling the API.
Fourth, the verified URL is sent to the Google Safe Browsing threatMatches:find endpoint. The request checks across all four threat types simultaneously: MALWARE, SOCIAL_ENGINEERING, UNWANTED_SOFTWARE, and POTENTIALLY_HARMFUL_APPLICATION.
Fifth, the response is analyzed. If the API returns any threat matches, the URL is marked unsafe and the results card shows each detected threat type with its name, description, severity (high or medium), and any affected platforms included in the API response. If no matches are found, the URL is marked safe with confirmation that all four threat categories came back clean.
Finally, reCAPTCHA resets automatically — regardless of the result — so the next check requires fresh verification. A server-generated timestamp is included with every result so you know exactly when the check was performed.
Reading the Results
Green card — Safe. The URL was checked against Google's threat database and returned no matches for malware, phishing, unwanted software, or potentially harmful applications. The card confirms each category as clean. You can proceed with reasonable confidence, keeping in mind the inherent limitations of any threat database.
Red card — Unsafe. One or more threat matches were returned. The card shows the threat type name, a description of what that threat category means, the severity level, and which platforms are affected (Windows, Android, any platform, etc.). If multiple threats are detected, each is listed separately. The recommendation is clear: do not visit this URL.
The timestamp shown in every result tells you when the check was run. If you're sharing a result with someone else, this is useful context — threat database status can change, and a result from several hours ago reflects the state of Google's database at that moment in time.
Who Uses a Safe Browsing Checker
Security-conscious individuals who check links before clicking are the primary audience. But this tool also gets used in specific professional workflows:
IT and security teams use URL checkers as part of incident response — when a suspicious link appears in a reported phishing email, quickly confirming whether it's already in the database is a useful first-pass triage step before deeper investigation.
Content moderators on platforms that allow user-submitted links use URL checkers to screen submissions before approval.
Journalists and researchers who receive unsolicited links from anonymous sources need to verify those links without exposing their devices. Checking the URL in this tool first — before opening it in any browser — is a standard operational security practice.
Parents and educators who want to verify links before sharing them with children or students use checkers as an accessible, non-technical way to do a basic safety verification.
Customer support teams who receive "links to issues" from users in support tickets can verify those links before clicking through to troubleshoot.
Protecting Yourself Beyond This Tool
A URL checker is one layer of protection — not a complete security posture. Here are the other layers that matter:
Keep your browser updated. Chrome, Firefox, Safari, and Edge all include built-in Safe Browsing protections that provide real-time warnings as you browse. These operate automatically and catch many threats without requiring manual URL checking. Keeping the browser up to date ensures these protections use current threat data.
Enable multi-factor authentication on important accounts. Even if you click a phishing link and enter your password, MFA prevents the attacker from logging in with your credentials alone. This is the single most effective mitigation against phishing attacks.
Be skeptical of urgency. Phishing attacks are engineered to trigger panic — "Your account will be suspended in 24 hours," "Unusual sign-in detected," "Payment failed." The urgency is designed to override your judgment. Slow down. Check the URL. Call the company directly using a phone number from their official website if you're uncertain.
Hover before you click. On desktop browsers, hovering over a link shows the actual destination URL in the browser's status bar. If the displayed text says "PayPal" but the URL shows "paypa1-secure.net," don't click it.
Frequently Asked Questions
What is Google Safe Browsing and how does this tool use it?
Google Safe Browsing is a security infrastructure Google has operated since 2005. It maintains continuously updated lists of URLs that have been identified as hosting malware, phishing pages, unwanted software, or potentially harmful applications. Google identifies approximately 9,500 new malicious sites every day and adds them to these threat lists. This tool sends the URL you enter to the Google Safe Browsing API (threatMatches:find endpoint), which checks it against all current threat lists and returns a match or no-match result. It's the same database that powers Chrome's red warning pages, Gmail's link scanning, and Google Search's safety warnings.
Why is the "Check Safety" button disabled when the page loads?
The button is intentionally disabled until you complete the reCAPTCHA verification. The Google Safe Browsing API has usage rate limits — without reCAPTCHA, the tool could be abused by bots to run thousands of automated URL checks, which would exhaust the API quota and break the tool for legitimate users. The reCAPTCHA token is sent to the backend with your check request and verified server-side before the API call is made. After each check — successful or not — reCAPTCHA resets and needs to be completed again before the next check.
What does an "unsafe" result mean exactly?
It means the Google Safe Browsing API returned one or more confirmed threat matches for that URL in its database. The site has been previously identified and cataloged as dangerous. The results card shows which threat types were detected, which platforms are affected, and the severity level. You should not visit a URL flagged as unsafe. If you believe your own site was incorrectly flagged, you can request a review through Google's Search Console.
Does a "safe" result guarantee the website is trustworthy?
No — and this distinction is important. A safe result means the URL is not in Google's threat database at the time of the check. It doesn't mean the site is legitimate, reputable, well-built, or free of all risks. New malicious sites are created every day, and there's always a window between a site going live and when it gets cataloged. Very new phishing pages may temporarily pass a Safe Browsing check. Use a clean result as a positive signal, but exercise additional judgment — especially for sites asking for personal or financial information.
What happens if I enter a URL without https:// or http://?
The backend automatically prepends https:// before running the check. You can enter either example.com or https://example.com — both work. Both the frontend and backend validate the URL structure before any API call is made. URLs with spaces, missing domains, or invalid formats are rejected with a clear error message.
Can a URL be flagged for more than one threat type?
Yes. A single URL can match multiple threat categories in Google's database. A compromised site might be flagged as both a malware host and a phishing page simultaneously. The tool collects every threat match returned by the API and displays each one separately in the results — including the type, description, severity, and affected platforms for each.
Why am I seeing a timeout or network error?
The tool makes outbound requests to two Google services: reCAPTCHA for verification and the Safe Browsing API for the URL check. If either service is slow or temporarily unreachable, you'll see a timeout or network error. This is usually transient — wait a few seconds and try again. Persistent errors may indicate a network issue on your end or a brief outage in Google's services.
Does the tool store or log the URLs I check?
No. URLs submitted through this tool are sent directly to the Google Safe Browsing API for checking and are not stored in our database. We do not log, record, or retain the URLs you check. The reCAPTCHA verification and the API request happen in real time, and no history is kept.
What should I do if a URL I checked comes back unsafe?
Don't visit the site. If you received the link in an email, report it as phishing to your email provider and delete the message. If it was shared in a work context, alert your IT or security team — the link may be part of a targeted attack. If it appeared in a search result or an ad, you can report the URL to Google's Safe Browsing reporting form. If you've already visited the site before checking, run a malware scan on your device and consider changing passwords for any accounts you may have logged into around that time.