https://roelite.net
18.208.88.157 · AWS EC2 (us-east-1)
Ashburn, United States
886 days
200 · 19.2s
Valid· E8, Let's Encrypt, US
COMPLETED
roelite-clone-kit-2
roelite-clone-kit-2
Directives: skipAi, skipUnblocker, skipMobileVariant
Technology · 4/15/2026
The page presents RoeLite branding (logo.gif, site title 'RoeLite Plugins') on roelite.net, suggesting a first-party RoeLite site. However, the screenshot and page content show a polished product landing with login/join buttons, and the HTML indicates a SPA that renders UI via JavaScript. There is no explicit impersonation of another well-known brand; there is potential credential collection UI, but no concrete evidence of credential harvesting in the static HTML. Given the limited static signals, the page appears to be the legitimate RoeLite site, though its hosted assets and SPA behavior merit monitoring for possible credential-phishing flow if credentials are indeed captured client-side in the runtime code.
Capture
Stages: 3
Canonical: Late Render (+3s)
Changed: No
Credential Signals
Forms: 0
Password fields: 0
Late-stage login UI: No
Resource Signals
Resources: 20
Hosts: 2
Domains: 1
The scan indicates a first-party RoeLite site with a dynamic SPA that could render credential collection UI at runtime, but there is no direct evidence of credential harvesting in the static HTML or API endpoints. The presence of login/join UI in the visible UI suggests potential for credential prompts, but without observed form fields in the static source or explicit exfiltration endpoints, the evidence for phishing is not conclusive. Given the visual branding aligns with RoeLite, monitor for any runtime credential capture scripts or API calls that collect user data. The site is not obviously impersonating another brand based on the available signals; treat as potentially legitimate but benign with a watchful stance for abuse.
Monitor