https://tr.ee/1mjROl
151.101.66.133 · Fastly, Inc.
Montreal, Canada
—
200 · 20.5s
Valid· R12, Let's Encrypt, US
COMPLETED
Domain Intelligence: tr.ee
Scanned 3 times since Mar 9, 2026, 01:27 AM UTC
No KB/IOK detections were recorded for this scan.
technology | finance | ecommerce | cryptocurrency | social_media · 4/15/2026
The scan shows a redirect to a suspicious domain and a page that visually resembles a login/verification flow, but the final URL and page title indicate a potential impersonation setup. The page title reads 'Just a moment...' and the final destination is a domain under gamingvote.com with OAuth-like query parameters, suggesting an OAuth/login redirection flow. Visual cues in the screenshot imply impersonation of a trusted portal (e.g., a login/verification UI), but the evidence is primarily redirect and SPA-like behavior rather than a clear credential form on the initial domain.
Capture
Stages: 3
Canonical: Late Render (+3s)
Changed: No
Credential Signals
Forms: 0
Password fields: 0
Late-stage login UI: No
Resource Signals
Resources: 17
Hosts: 4
Domains: 4
The domain tr.ee is a known link shortener, but the scan redirected to oldschoolrsrunescapeosrs.gamingvote.com with OAuth-like parameters and Cloudflare challenge endpoints. The final URL and SPA-style content strongly suggest an impersonation/credential-phishing setup, where the actual login UI would be rendered by client-side JavaScript on a non-official domain. The presence of Cloudflare challenge infrastructure and opaque POST endpoints increases suspicion of anti-scraping measures designed to mask credential collection. Given the impersonation indicators and redirected OAuth-like flow to a non-brand domain, this constitutes potential first-party abuse via credential phishing scaffolding. Recommend treating as suspicious/phishing activity and escalate for takedown action if corroborated by further evidence.
Suspend Domain