Skip to content

ZeroTrace OSINT

URL Tools

URL parser, suspicion-scoring URL analyzer, and IDN homograph detection.

A pair of utilities for URL inspection. The simple parser breaks a URL into its components. The analyzer scores a URL for suspicion based on shape and content.

URL Parser

For any URL, the parser returns:

ComponentExample
Schemehttps
Hostapp.example.com
Subdomainapp
Registrable domainexample.com (via Public Suffix List)
Top-level domaincom
Port443 (default if not specified)
Path/login
Path segments["login"]
Query parametersEach parsed and decoded
Fragment#section
Username / passwordWhen present (a phishing-URL signal)

For each query parameter, the parser also offers:

  • Base64 decode-attempt (catches base64-encoded values).
  • URL decode-attempt (catches double-encoded values).
  • JSON parse-attempt (catches structured values).

URL Analyzer

The analyzer takes a URL and emits a suspicion score plus rationale:

SignalContributes if
Long random subdomainSubdomain looks like kj3h8s7d.example.com
Many subdomainsThree or more subdomain levels (often a phishing pattern)
Suspicious TLDFree or abuse-friendly TLDs (.tk, .ml, .ga, .cf)
IP in URLHostname is a raw IP rather than a domain
Username in URLuser:pass@host form
PunycodeIDN-encoded hostname (xn--...)
Homograph candidatesVisually-confusable characters in the hostname (Cyrillic а for Latin a, etc.)
Suspicious path elements/login, /wp-admin, /.git, /.env
Long URLURLs over a kilobyte (often base64-payload phishing)
Fragment that looks like data#data:... patterns

The composite score lets you triage a list of URLs quickly. High scores get manual review; low scores can be batch-processed.

IDN homograph detection

A particular emphasis. The tool decodes Punycode hostnames and surfaces visually-confusable characters:

  • paypal.com (all Latin) vs. pаypаl.com (with Cyrillic а).
  • google.com (all Latin) vs. gооgle.com (with Cyrillic о).

The visual rendering is critical — the URL looks identical to the human eye but resolves to a different domain. The analyzer surfaces this with a coloured warning.

Homograph attacks rely on the visual-vs-actual mismatch. Always verify hostname spelling on suspicious links by viewing the Punycode form alongside the rendered form. The URL parser and analyzer both show this pair.

Auto-compose

A one-click affordance opens site analysis for the URL. For URLs that score high on suspicion, the natural follow-up is to run them through site analysis (with appropriate caution about whether to actually fetch a hostile URL — often you would prefer the Wayback Machine or a sandboxed environment for that).

Bulk URL parsing / analysis

Bulk paste accepts a list of URLs. The aggregate table shows per-URL components and analyzer scores — useful for triaging URLs from a phishing-report dump.

Pivots

Click on...Pivot to
HostDNS, WHOIS, certificate transparency, site analysis
Registrable domainWHOIS, DNS history
Path segments(no pivot — informational)
Query parameters(no pivot — copy and inspect)
Punycode form(no pivot — copy and verify)

Sources

All parsing and analysis is local. The Public Suffix List for registrable-domain extraction is bundled with the application. The homograph catalog is bundled.

Command Palette

Search for a command to run...