URL Redirect Analyzer
Inspect suspicious URLs, query parameters and redirect patterns locally in your browser.
How it works
The analyzer parses the provided URL locally using standard Web APIs, extracts query parameters and fragments, and runs heuristic checks for common redirect parameters and suspicious indicators. No network requests are performed and nothing is uploaded.
Use cases
- Inspect emails or messages with long URLs to detect embedded redirect parameters.
- Quickly check if a link uses IP addresses, nested URLs, or suspicious keywords before visiting.
- Generate internal and external pivot links to continue investigation with other toolkit tools and OSINT services.
Limits
This tool analyzes URL structure only. It cannot follow live redirects or validate remote content. Large pasted inputs (over 50 KB) may be slower to analyze in the browser.
Frequently Asked Questions
What does this tool look for in a URL?
It parses the URL, extracts parameters and looks for common redirect parameters, nested URLs, IP hosts, percent-encoding, suspicious keywords and other heuristics.
Can it follow live redirects?
No. This tool analyzes the URL structure locally and does not perform network requests or follow redirects.
Does the URL get uploaded anywhere?
No. All parsing and analysis happens in your browser; no data is sent to any server.