What is Outlook Safe Links Decoder?
Outlook Safe Links Decoder — An Outlook SafeLink Decoder is a free tool that extracts the original URL from Microsoft Outlook SafeLinks (safelinks.protection.outlook.com) wrapped URLs.
Loading your tools...
Extract and reveal the original destination URL hidden inside Microsoft Outlook Safe Links (safelinks.protection.outlook.com) from Office 365 emails, Microsoft Teams messages, and Microsoft Defender for Office 365 rewritten links — essential for phishing investigations, email security triage, and IT support workflows.
Outlook Safe Links Decoder: Paste an Outlook SafeLink URL to instantly reveal the original destination URL hidden behind Microsoft's safe link protection. Copy the decoded URL. Works with all SafeLinks formats.
Paste a Safe Links URL and extract the original destination.
Outlook Safe Links Decoder — An Outlook SafeLink Decoder is a free tool that extracts the original URL from Microsoft Outlook SafeLinks (safelinks.protection.outlook.com) wrapped URLs.
Right-click a Safe Links URL in Outlook, Office 365 email, or Microsoft Teams and copy the full link address (starts with safelinks.protection.outlook.com).
Paste the complete Safe Links URL into the decoder input field — the tool accepts all regional Safe Links URL formats.
The decoder automatically extracts and URL-decodes the original destination from the embedded 'url' parameter.
Review the decoded destination URL to verify the domain, path, and query parameters before visiting.
Copy the clean original URL with one click for documentation, incident reports, or sharing with end users.
Phishing investigation and email security triage — decode suspicious Safe Links to inspect the actual destination domain before visiting
IT help desk support — quickly verify user-reported links without manually parsing long safelinks.protection.outlook.com URLs
Marketing campaign auditing — check that email campaign links still resolve to correct landing pages after Office 365 rewriting
Compliance and incident response documentation — extract and log original destination URLs for security incident reports
SOC analyst workflows — batch-decode Safe Links from phishing emails during threat analysis and indicator extraction
Microsoft Safe Links is a core feature of Microsoft Defender for Office 365 (formerly Office 365 Advanced Threat Protection). When enabled by an organization's security administrator, Safe Links automatically rewrites URLs in incoming emails, Microsoft Teams messages, and Office documents. The rewritten URL routes through safelinks.protection.outlook.com, where Microsoft performs real-time URL scanning and reputation checking at the moment a user clicks — providing time-of-click protection against malicious links that may have been safe when the email was delivered but later weaponized. The original destination URL is embedded as an encoded query parameter within the rewritten Safe Links URL structure.
This decoder does not bypass, disable, or circumvent Microsoft Defender's security scanning. It simply extracts and displays the original destination URL so security professionals, IT administrators, and end users can inspect where a link actually leads before visiting it. This transparency is especially valuable during phishing investigations where analysts need to quickly identify malicious domains, during help desk triage where support staff need to verify links reported by users, and during compliance audits where original destination documentation is required. The decoder runs entirely in your browser — no URLs are transmitted to external servers, ensuring sensitive link data from security investigations remains private.
Decoding is only one step in link analysis. After extraction, validate domain age, reputation, and destination intent before interacting with unknown content.
Safe Links improve protection but can obscure destination readability in tickets and reports. A decoder restores transparency for analysts and support teams.