https://giftcardmallmygiftac.com/
104.21.4.90 · Cloudflare, Inc.
Toronto, Canada
0 days ⚠
200 · 15.0s
Valid· E8, Let's Encrypt, US
COMPLETED
Linked Phishing Report
This scan is attached to a vendor submission report
Brand
giftcardmallmygiftac.com
Vendors
27/27
Status
completed
No KB/IOK detections were recorded for this scan.
finance | technology | ecommerce | others · 4/15/2026
The page presents GiftCardMall/MyGift balance check and card activation content, but the domain giftcardmallmygiftac.com is extremely new (0 days old) and uses a free Let’s Encrypt SSL cert. The page content includes branding and a UI that mimics GiftCardMall/MyGift, yet the domain is not an official GiftCardMall domain. The static HTML includes a canonical link to loveandgifts.com and a disclosure FAQ stating the site is not affiliated with GiftCardMall. The SPA-like behavior is inferred from dynamic credential-collection signals (no static login form, 2 external scripts, a POST to a rum endpoint, and an informational layout that could be used to collect data). Overall, indicators point to potential impersonation risk rather than confirmed first-party use; no definitive credential harvesting form is present in static HTML, but dynamic rendering could capture data.
Capture
Stages: 2
Canonical: Settled Render
Changed: No
Credential Signals
Forms: 0
Password fields: 0
Late-stage login UI: No
Resource Signals
Resources: 4
Hosts: 2
Domains: 2
No suspicious indicators identified
The domain giftcardmallmygiftac.com is new and not an official GiftCardMall domain. The page presents GiftCardMall/MyGift balance and activation content, with a FAQ stating no affiliation to GiftCardMall. Combined with dynamic rendering indicators (SPA-like page, POST to a rum endpoint, and 0 static forms), this suggests a potential credential collection mechanism aimed at phishing through impersonation rather than a legitimate first-party page. The presence of a recently issued SSL cert and Cloudflare WAF presence adds to the complexity but does not mitigate impersonation risk. Recommend close monitoring and potential takedown if additional evidence confirms credential harvesting or brand impersonation.
Monitor