access-learn-kraken-en.tem3.io favicon

access-learn-kraken-en.tem3[.]io

Category: Phishing And Fraud

Scanned: May 6, 2026, 01:20 PM UTC · First seen: May 6, 2026 · Threat Engines: 15 / 91 · Times Scanned: 1
0 / 100 Trust Score Based on scan findings at the time of analysis
Potentially Dangerous
0 - High Risk50 - Moderate100 - No Threats
Not scanned has not been scanned yet. Hit Scan Now to check it.

Scans can take up to 5 minutes to complete. Please keep this tab open - we'll redirect you to the report when it's ready.

Failed
Scan unavailable
Scan failed
Protect yourself from potentially harmful websites
Combo Cleaner's real-time web protection module actively blocks access to scam, phishing & malware-infected websites.
★★★★★ 4.8 / 5 Recommended by PCrisk.com editors Windows · Mac · Android · iOS
Download Combo Cleaner Free scan · no signup

To use full-featured product, you have to purchase a license for Combo Cleaner. Limited seven days free trial available. Combo Cleaner is owned and operated by RCS LT, the parent company of PCRisk.com.

Screenshot of access-learn-kraken-en.tem3[.]io Captured May 6, 2026
https://access-learn-kraken-en.tem3[.]io
Screenshot of access-learn-kraken-en.tem3.io
This website has been flagged as potentially harmful
Screenshot blurred for safety. Multiple security engines flagged potential threats at the time of scanning.
1 year (tem3.io)
Not Ranked - This website does not appear in the Tranco top list
Flagged by 15 of 91 engines
✓ Valid (TLS)
CloudFlare, Inc.
Toronto, Canada
cloudflare
Next.js
188.114.96.2
Domain & WHOIS Information
Registrar GoDaddy.com, LLC
Registered August 2, 2024 (tem3.io)
Expires August 2, 2026
Name Servers val.ns.cloudflare.com
DNSSEC Unsigned
Hosting CloudFlare, Inc.
This is a subdomain of tem3.io. The WHOIS data above belongs to the parent domain, not to access-learn-kraken-en.tem3[.]io. The actual creation date of this subdomain is unknown and could be much more recent than the parent.
Look-Alike Domain Check
Suspect look-alike This domain is 1 character apart from temu.com - a curated brand we track. A single character was substituted for a different one.
Reinforcing Signals: Not in Tranco top 1M No mail server
Reputation & Threat Check 91 security engines checked
File Scan Summary Powered by Quttera Engine
22 files scanned
No threats
21
Low Risk
0
Medium Risk
0
High Risk
1
No threats Low Risk Medium Risk High Risk
access-learn-kraken-en.tem3.io/# 220.2 KB Flagged: high risk
access-learn-kraken-en.tem3.io/favicon.png 23.6 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/lb-_kGhn1ec4cubt53eRl/_ssgManifest.js 77 B No threats
landingbuilder-cdn.tekoapis.com/_next/static/lb-_kGhn1ec4cubt53eRl/_buildManifest.js 1.3 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/83656-0f4d20455ed1fc0b.js 27.9 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/42376.2c59f019c87a5b96.js 451.4 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/37279-a5603accf11e1f2d.js 31.4 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/vendor-dompurify-6a9e13a6485d397d.js 20.9 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/vendor-react-62d734338f07e375.js 136.6 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/78419.7164ed4f33f630e6.js 134.9 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/15406-60216e650a865628.js 123.4 KB No threats
Show 11 more...
Quttera flagged high risk files - is this your website?
Investigate and remove potential threats with Quttera
Remove Malware

Quttera Web Malware Removal is a paid subscription service. Pricing, plans, and trial availability are set by Quttera. Quttera is operated by Quttera Ltd, an independent third-party company unrelated to RCS LT. PCRisk.com may earn a referral commission when users sign up through this link.

External Links & Domains
39
External Links
1 Flagged
1
Iframes
Clean
13
Referenced Domains
1 Flagged
2
Flagged Resources
Detected
footprint-ingestor.tekoapis.comFlagged: Generic Malicious Object
https://footprint-ingestor.tekoapis.comFlagged: Generic Malicious Object
https://footprint-ingestor.tekoapis.comFlagged: Generic Malicious Object
http://access-learn-kraken-en.tem3.io/${n}Not flagged
http://access-learn-kraken-en.tem3.io/${r}Not flagged
http://access-learn-kraken-en.tem3.io/${s}Not flagged
http://access-learn-kraken-en.tem3.io/favicon.pngNot flagged
https://access-learn-kraken-en.tem3.ioNot flagged
https://cdn.tekoapis.comNot flagged
https://cdnjs.cloudflare.comNot flagged
https://cdnjs.cloudflare.com/ajax/libs/animate.css/4.1.1/animate.min.cssNot flagged
https://fonts.googleapis.comNot flagged
https://fonts.googleapis.com/css2?family%3DRoboto:wght@100%3B200%3B300%3B400%3B500%3B600%3B700%3B800%3B900&amp%3Bfamily%3DRoboto:wght@100%3B200%3B300%3B400%3B500%3B600%3B700%3B800%3B900&amp%3Bfamily%3DRoboto:wght@100%3B200%3B300%3B400%3B500%3B600%3B700%3B800%3B900&amp%3Bdisplay%3DswapNot flagged
https://fonts.gstatic.comNot flagged
https://landingbuilder-cdn.tekoapis.com/_next/static/chunks/15406-60216e650a865628.jsNot flagged
https://landingbuilder-cdn.tekoapis.com/_next/static/chunks/29282-2c9b9dff63048849.jsNot flagged
https://landingbuilder-cdn.tekoapis.com/_next/static/chunks/36076-8a51c4f62e6fd9ee.jsNot flagged
Show 24 more...
footprint-ingestor.tekoapis.comFlagged: Generic Malicious Object
access-learn-kraken-en.tem3.ioNot flagged
b.w.VNNot flagged
cdn.tekoapis.comNot flagged
cdnjs.cloudflare.comNot flagged
fonts.googleapis.comNot flagged
fonts.gstatic.comNot flagged
landingbuilder-cdn.tekoapis.comNot flagged
lh3.googleusercontent.comNot flagged
public.tempi.vnNot flagged
storage.googleapis.comNot flagged
temp3.ioNot flagged
tracking.tekoapis.comNot flagged
<iframe")?(0,i.jsx)("div",{dangerouslySetInnerHTML:{__html:(0,w.a)(o)}}):(0,i.jsx)("iframe",{src:o,title:"map",allowFullScreen:!0})})]})},O%3Da.A.div(({mainColor:e})%3D>` line-height: 2%3B padding: 0.8em 1.5em%3B background-color: white%3B border-bottom: 1px solid #eaeaea%3B &:hover{ background: color-mix(in srgb, ${e} 10%, white)%3B } .store-name{ font-size: 1.4em%3B color: ${e}%3B } .store-details{ position: relative%3B .bottom-elements{ display: flex%3B flex-wrap: wrap%3B align-items: center%3B .store-info{ display: inline-block%3B margin-right: auto%3B padding-bottom: 0.5em%3B } .map-toggle{ border: 1px solid ${e}%3B background-color: white%3B height: 40px%3B color: ${e}%3B line-height: 40px%3B display: block%3B padding: 0 15px%3B border-radius: 4px%3B outline-color: ${e}%3B svg{ vertical-align: baseline%3B } } } } .store-map{ margin-top: 1em%3B iframe{ width: 100%%3B border: none%3B border-radius: 1em%3B } }`)%3Bvar C%3Dn(48166),S%3Dn(30979),F%3DObject.getOwnPropertySymbols,j%3DObject.prototype.hasOwnProperty,P%3DObject.prototype.propertyIsEnumerable%3Blet k%3D(0,c.forwardRef)((e,t)%3D>{var{stores:n,mainColor:r%3D"#2e7ac1",title:l,id:a}%3De,o%3D((e,t)%3D>{var n%3D{}%3Bfor(var i in e)j.call(e,i)&&0>t.indexOf(i)&&(n[i]%3De[i])%3Bif(null!%3De&&F)for(var i of F(e))0>t.indexOf(i)&&P.call(e,i)&&(n[i]%3De[i])%3Breturn n})(e,["stores","mainColor","title","id"])%3Blet[u,p]%3D(0,c.useState)(),[g,m]%3D(0,c.useState)(),[f,h]%3D(0,c.useState)(n),{cities:y,districts:v}%3D(()%3D>{let[e,t]%3D(0,c.useState)({})%3Breturn(0,c.useEffect)(()%3D>{(async()%3D>{try{let e%3Dawait fetch(b.w.VN),n%3Dawait e.json()%3Bt(n)}catch(e){console.error(e)}})()},[]),{cities:e.province||[],districts:e.district||[]}})(),{device:w}%3D(0,d.P)(),{stickyTop:O,commonStyle:k}%3D(0,s.gJ)(o,w),I%3Dy.filter(e%3D>!!n.find(t%3D>t.cityId%3D%3D%3De.idProvince)),$%3Dv.filter(e%3D>e.idProvince%3D%3D%3Du&&!!n.find(t%3D>t.districtId%3D%3D%3De.idDistrict)),E%3D(e,t)%3D>{e&&(p(e),m(null)),t&&m(t)}%3Breturn(0,c.useEffect)(()%3D>{h(u&&"0"!%3D%3Du?!u||g&&"0"!%3D%3Dg?n.filter(e%3D>e.cityId%3D%3D%3Du&&e.districtId%3D%3D%3Dg):n.filter(e%3D>e.cityId%3D%3D%3Du):n)},[u,g,n]),(0,i.jsx)(A,{ref:t,"data-id":a,stickyTop:O,mainColor:r,commonStyle:k,children:(0,i.jsxs)(C.f,{gutter:[24,16],children:[(0,i.jsxs)(S.fv,{md:5,xs:12,children:[(0,i.jsxs)("div",{className:"label",children:["H thng ",n.length," ca h\xe0ng"]}),(0,i.jsxs)("div",{className:"select-location",children:[(0,i.jsx)("h5",{children:(0,i.jsx)("b",{children:l||"Chn ca h\xe0ng theo tnh/th\xe0nh ph"})}),(0,i.jsxs)("select",{onChange:e%3D>E(e.target.value),children:[(0,i.jsx)("option",{value:0,children:"Chn tnh/ th\xe0nh ph"}),I.map(e%3D>(0,i.jsx)("option",{value:e.idProvince,children:e.name},e.idProvince))]}),(0,i.jsxs)("select",{onChange:e%3D>E(null,e.target.value),children:[(0,i.jsx)("option",{value:0,children:"Chn qun/ huyn"}),$.sort((e,t)%3D>Not flagged
access-learn-kraken-en.tem3[.]io Overview

Description of access-learn-kraken-en.tem3[.]io

The domain access-learn-kraken-en.tem3[.]io appears to host a landing page built on the Tem3 website-building platform. Based on the page title, meta description, and screenshot, the page presents itself as a cryptocurrency login or promotional page associated with Kraken, using branding and language related to crypto account access, trading, and portfolio management.

The visible content does not appear to be an official standalone corporate website for the hosting domain itself; instead, it looks like a branded landing page placed on a third-party subdomain. The screenshot also shows Tem3 platform branding above and below the page content, which suggests the page may have been created through a hosted landing-page service rather than operated from an official Kraken-owned domain.

The domain structure and content create mixed branding signals. While the page references Kraken, a separate similarity check indicates the hostname also closely resembles another well-known e-commerce brand in its broader naming pattern, which may indicate an attempt to attract traffic through confusing or misleading naming conventions.

Safety Assessment for access-learn-kraken-en.tem3[.]io

Multiple risk indicators were present at the time of this scan. The site was flagged by 15 out of 91 security engines, categorized by multiple web-classification providers as phishing or fraud-related, and listed in at least one major safe-browsing database for social-engineering activity. A malware scan also reported a malicious threat level and identified one flagged object associated with an external ingestion endpoint.

The page content itself raises additional concerns. It appears to imitate Kraken branding while being hosted on a tem3.io subdomain rather than an official Kraken domain, and the page title contains the misspelling "Keaken," which may be consistent with a look-alike or credential-harvesting setup. In addition, the domain closely resembles temu.com in plain spelling terms, which may indicate broader look-alike abuse even though the visible page content references a different brand.

Based on these findings, this website may pose potential risks to visitors. Users should be cautious about entering login credentials, wallet details, recovery phrases, or payment information on this page.

Technical Description

The site was reachable over HTTPS with a valid TLS certificate issued by a mainstream certificate authority, and it appears to be served through Cloudflare infrastructure with an IP address in the 188.114.96.0/24 range. The domain uses Cloudflare nameservers and the certificate was valid through mid-2026. DNSSEC was reported as unsigned at the time of the scan.

From a security perspective, the presence of valid HTTPS should not be treated as proof of legitimacy. The domain is not ranked in major popularity lists, appears to be hosted as a subdomain on a landing-page platform, and was associated with phishing classifications and a flagged external domain during scanning. Those factors may be more relevant than the basic TLS setup when assessing risk.

HTTP Redirect Chain
No redirects detected - direct connection to destination
Website Insights
Not Ranked
Tranco Rank
Not in Top 1M
Visitors Unknown
Category: Phishing And Fraud
Rank History (30 days)
No rank data available
2 cookies detected
Essential2
Analytics0
Advertising0
Social0
2 1st party cookies
0 3rd party (trackers)
Dispute This Score For website owners
Believe this score is inaccurate?
If you are the website owner and believe the scan results contain errors or false positives, you can submit a dispute for manual review. Our team typically responds within 1-2 business days.
You will be asked to verify your email before the dispute can be processed.
By submitting this form, you confirm that the information provided is accurate. Disputes are reviewed manually and results may take up to 48 hours to update.
One more step..
To submit your dispute for access-learn-kraken-en.tem3[.]io, please click the verification link we just emailed you. Once verified, we'll review it within 1–2 business days.
This report was generated automatically and is provided for informational purposes only. Results are based on a point-in-time scan and may contain false positives or incomplete data. This does not constitute a security audit or certification. No vendor in the market can guarantee a 100% detection rate. If you believe this report is inaccurate, please submit a dispute.

Share your experience with this website. Was it safe? Did you encounter any issues?