https://complaints-dmca.report/
172.67.149.83 · Cloudflare, Inc.
Toronto, Canada
6 days ⚠
403 · 34.1s
Valid· E8, Let's Encrypt, US
COMPLETED
Domain Intelligence: complaints-dmca.report
Scanned 2 times since Apr 12, 2026, 11:07 PM UTC
No KB/IOK detections were recorded for this scan.
Scanner blocked by cloudflare
This scan likely captured a block/challenge page, so the AI analysis may not reflect the real site victims see.
Technology · 4/15/2026
The domain ATO is a very new domain (6 days old) and is served behind Cloudflare. The page content captured is a Cloudflare blocking/notice page rather than the actual phishing content, indicating scanner blockage. External signals suggest potential phishing indicators (suspicious endpoints and Turnstile integration), but the visible page is a WAF block page rather than impersonation content. Based on non-page signals, the domain appears to be used in an abusive/obfuscated context, but the accessible content in the screenshot is not the phishing page itself.
Capture
Stages: 2
Canonical: Settled Render
Changed: No
Credential Signals
Forms: 1
Password fields: 0
Late-stage login UI: No
Resource Signals
Resources: 12
Hosts: 2
Domains: 2
Suspicious Endpoints
hxxps://complaints-dmca[.]report/cdn-cgi/phish-bypass
The site presents as a likely abuse-hosting domain used to surface phishing content, but the actual page loaded by the scanner is a Cloudflare block page, not the phishing UI. The combination of a new domain, Cloudflare proxy, references to phish-bypass endpoints, and Turnstile integration suggests anti-automation measures typical of phishing hosts attempting to evade scanners. The scanner was blocked by a WAF, and the page content available is not sufficient to confirm credential harvesting or impersonation on this domain. Recommend heightened monitoring and further domain intelligence gathering to determine if the domain hosts or links to phishing content.
Monitor