Community Intel for Every Domain
Recent Discussions
URL: https://www.lidls-eu.shop/collections/best-sellers1/products/parkside-coupe-branches-sans-fil-paas-20-li-b1-20-v_c22430e2?data_from=collection_detail&spm=collection_detail.442282.collection_detail-10760773.2.
User Assessment: Dangerous
AI Verdict: DANGEROUS (90% confidence)
Analysis: This website is impersonating Lidl, a well-known brand, which is a common tactic used in phishing attacks to trick people into revealing personal information.
Key Findings:
- Impersonates the brand 'Lidl'
- Uses a suspicious domain name 'lidls-eu.shop'
- The domain uses a high-risk top-level domain (.shop)
User Comment: Fake shopping site
URL: https://syrocast.com
User Assessment: Dangerous
AI Verdict: SAFE (70% confidence)
Analysis: No threats were detected. The page appears to be a legitimate site that is currently loading or under development.
Key Findings:
- No phishing forms or brand impersonation detected
- No malicious downloads or scripts identified
- The page shows a standard loading state with no suspicious content
User Comment: Malicious PowerShell script
URL: https://reservationextracontrolpanel.com
User Assessment: Dangerous
AI Verdict: DANGEROUS (80% confidence)
Analysis: This website is impersonating Booking.com on a suspicious, newly registered domain to trick users into interacting with a fake security check.
Key Findings:
- Domain is less than 24 hours old and not affiliated with Booking.com
- Page uses Booking.com branding and logos without authorization
- Displays a fake 'human verification' challenge to appear legitimate
- Requests that users only access the site from a Windows device, which is a common tactic for delivering OS-specific malware
User Comment: Phishing booking.com
URL: https://dpdp.ncointnl.nl/nl
User Assessment: Dangerous
AI Verdict: SUSPICIOUS (60% confidence)
Analysis: This website is very new and uses a verification screen to hide its content from automated scanners.
Key Findings:
- Domain was registered only 3 days ago
- The page uses a Turnstile/CAPTCHA to block access to the actual content
- The domain name contains unusual character strings
URL: https://skarnovik.fr/
User Assessment: Suspicious
AI Verdict: PARKED (65% confidence)
Analysis: The domain name is registered, but nothing is set up at this address.
Key Findings:
- This address leads nowhere
- Domain registered 400 day(s) ago
- Registered via AMEN / Agence des Médias Numériques
User Comment: Leads to nowhere. Website of a known scammer.
URL: https://intlecoms.364278.xin/ca-redelivery-authentication
User Assessment: Dangerous
AI Verdict: DANGEROUS (80% confidence)
Analysis: This website is impersonating the delivery company Intelcom to steal personal information. It uses a fake delivery failure notice to create a sense of urgency.
Key Findings:
- Domain is only 1 day old and uses a high-risk .xin extension
- Page content mimics Intelcom branding on an unrelated domain
- Uses a fake 'Action Required' alert to trick users into providing information
- The URL path 'ca-redelivery-authentication' is typical of phishing scams
this person is trying to scam people on Roblox from different wed links asking them to copy and paste given links
URL: https://www.home-profile.digital
User Assessment: Dangerous
AI Verdict: SUSPICIOUS (60% confidence)
Analysis: This link redirected to a different website that appears to be a payment page, which is suspicious given the original domain.
Key Findings:
- The link redirected to a different website.
- The final website's domain is 'flverr-payment.com', which suggests a payment page.
User Comment: looks like a phishing website.
URL: https://shorturl.promo/amazon.mystery.pokemon.box
User Assessment: Dangerous
AI Verdict: SUSPICIOUS (60% confidence)
Analysis: This website uses a domain that is very new and tries to look like Amazon, but it is not actually Amazon. The page title also says "amazon.com" which is misleading.
Key Findings:
- The website's domain is only 27 days old.
- The domain name "shorturl.promo/amazon.mystery.pokemon.box" attempts to impersonate Amazon.
- The page title is "amazon.com", further attempting to impersonate Amazon.
URL: https://fancouriei.top/ro
User Assessment: Dangerous
AI Verdict: DANGEROUS (80% confidence)
Analysis: This website is a phishing scam impersonating the Romanian delivery service FAN Courier to steal personal information. It uses a fake delivery failure notification to trick you into providing your address and likely payment details.
Key Findings:
- Impersonates the official FAN Courier brand and logo
- Uses a deceptive domain name (fancouriei.top) instead of the official fan courier.ro
- Creates false urgency with a fake delivery failure notice
- Requests personal information under the guise of updating a delivery address
User Comment: Grija la scam!