Phishing detection
Identify phishing attempts by tracing suspicious links to their final destination. Scammers often use URL shorteners and redirects to hide malicious websites.Email link verification
Trace links from unexpected emails claiming to be from your bank, shipping companies, or IT department before clicking them
Social media scams
Check shortened URLs in social media messages that promise prizes, urgent security alerts, or too-good-to-be-true offers
Real-world example
You receive an email claiming to be from your bank with a shortened bit.ly link:Legitimate companies rarely use URL shorteners in official communications. If you see a shortened link in an email claiming to be from your bank or a major service, trace it first.
Malware prevention
Check URLs before clicking them to avoid malware downloads and drive-by infections. Many malware campaigns use multiple redirects to evade detection.How redirect chains hide malware
How redirect chains hide malware
Attackers use multiple redirects to:
- Bypass email and security filters that only check the first URL
- Make it harder to track and block malicious domains
- Add fingerprinting and targeting between redirect steps
- Change the final destination based on your location or device
Common malware patterns
Watch for these red flags when tracing URLs:- Multiple suspicious redirects - More than 3-4 redirects, especially through unfamiliar domains
- Mixed short domains - Chains that jump between multiple URL shorteners (bit.ly → tinyurl → custom shortener)
- Geographic redirects - URLs that redirect based on your location to target specific regions
- File downloads - Final URLs that point directly to .exe, .zip, or .dmg files
If you see a redirect chain with more than 5 steps or redirects through unfamiliar domains, don’t click the link. Legitimate websites rarely use complex redirect chains.
Link verification
Verify that links are legitimate before sharing them with colleagues or clicking them yourself. This is especially important for:Shortened URLs
Verify where bit.ly, tinyurl, t.co, and other shortened URLs really lead before sharing them internally
Email attachments
Check links in email attachments and documents from unknown senders before accessing them
QR codes
Trace URLs from QR codes you scan in public places or receive in mail to verify they’re safe
Slack and Teams
Verify links shared in workplace chat tools, especially from new contacts or external guests
Verification workflow
Follow this workflow when you receive a suspicious link:- Copy the URL without clicking it - right-click and select “Copy Link Address”
- Open Redirect Trace in Raycast
- Paste the URL into the search bar or use clipboard detection for long URLs
- Review the redirect chain - Check each step for suspicious domains
- Verify the final destination - Confirm it matches what you expect
What to look for in the redirect chain
What to look for in the redirect chain
Green flags (safe patterns):
- Final URL matches the expected domain (e.g., company.com)
- 0-2 redirects, typically just HTTP to HTTPS
- Clean final URL without suspicious parameters
- Well-known tracking domains (google.com/url, facebook.com/l.php)
- Final domain completely different from what you expect
- Multiple unfamiliar domains in the redirect chain
- Very long final URLs with encoded or obfuscated parameters
- Domains registered recently (check with WHOIS if unsure)
- Top-level domains associated with spam (.tk, .ml, .ga)
Security best practices
Never click first
Always trace suspicious URLs before clicking, especially in emails, texts, and social media messages
Check the final domain
Verify the final destination domain matches what you expect - if it doesn’t, don’t click
Watch for https
Legitimate sites use HTTPS (the lock icon). If the final URL is HTTP only, be cautious
Trust your instincts
If something feels off about a URL or redirect chain, don’t click it - even if you can’t identify the specific threat
Integration with security workflow
Use Redirect Trace as part of your security toolkit:- Before reporting phishing - Trace the URL and copy the full chain report to include in your report to IT security
- Security awareness training - Show colleagues how redirect chains work and how to verify links
- Incident response - When investigating a security incident, trace URLs to understand the attack vector
- Threat intelligence - Document malicious redirect patterns and share them with your security team
Use the “Copy Full Chain Report” action (⌘⌥C) to capture all redirect details when reporting suspicious URLs to your security team.