https://runechat.com/
104.21.81.234 · Cloudflare, Inc.
Toronto, Canada
4414 days
403 · 23.9s
Valid· WE1, Google Trust Services, US
COMPLETED
No KB/IOK detections were recorded for this scan.
Scanner blocked by cloudflare
This scan likely captured a block/challenge page, so the AI analysis may not reflect the real site victims see.
finance | technology | ecommerce | cryptocurrency | social_media | education | other · 4/5/2026
The page at runechat.com presents a Cloudflare security verification block rather than a legitimate brand login. The page title and content do not reveal a recognizable brand, and the actual phishing content cannot be accessed due to a scanner-blocking WAF. Non-page signals indicate potential impersonation signals, but the brand cannot be confirmed from the available data.
Capture
Stages: 3
Canonical: Late Render (+3s)
Changed: No
Credential Signals
Forms: 0
Password fields: 0
Late-stage login UI: No
Resource Signals
Resources: 15
Hosts: 3
Domains: 3
Abuse teams should treat this as a high concern for potential impersonation. The domain runechat.com is fronted by Cloudflare and returns a block page, yet the scan data reveals an attempt to load Cloudflare Turnstile and orchestrated challenge endpoints. The page title is Just a moment..., and there is no visible brand name on the static HTML, but the network activity includes many brand-agnostic Cloudflare challenge artifacts. The presence of hidden form inputs reported in risk factors and SPA-like behavior suggests credential collection logic may be implemented in dynamic JavaScript. Given the WAF evasion signals and the potential for typosquatting or brand cloning, this domain warrants suspension or at minimum blocking of access to prevent credential harvesting.
Monitor