admin.flexcontrol.app
Category: Phishing
To use full-featured product, you have to purchase a license for Combo Cleaner. Limited seven days free trial available. Combo Cleaner is owned and operated by RCS LT, the parent company of PCRisk.com.
Description of admin.flexcontrol.app
The domain admin.flexcontrol.app appears to host a login portal branded as “AT&T FlexControl.” Based on the screenshot and page metadata, it presents itself as an account-access page in Spanish, asking for an email address and password and linking to terms and privacy information. The site appears to be built as a React-based web application, with static JavaScript and CSS assets referenced from the same host.
The naming and visual presentation suggest it may be attempting to resemble a telecommunications or account-management service rather than functioning as a general informational website. However, the domain itself is not an obvious official AT&T domain, and the available data does not identify a verified operator on the page. In practical terms, this appears to be a credential-entry page whose purpose may be user authentication, but its branding and hosting context warrant caution.
Safety Assessment for admin.flexcontrol.app
Multiple security signals indicate elevated risk at the time of this scan. The domain was flagged by 19 out of 91 security engines, with many of those detections classifying it as phishing or otherwise malicious. In addition, the page screenshot shows a branded login form requesting account credentials while using a domain that closely aligns with “FlexControl” branding but does not appear to be an official AT&T-owned web domain. That kind of mismatch may be consistent with a look-alike credential-harvesting page.
At the same time, some point-in-time checks were clean: the malware scan did not identify flagged files, and major blacklist and threat-database checks included in this scan did not report listings. Those clean results do not outweigh the broader multi-engine phishing consensus, especially for a page whose primary function is collecting login details. Based on these findings, this website may pose potential risks to visitors.
Technical Description
The site presented a valid SSL/TLS certificate issued by a mainstream certificate authority, with expiry listed in October 2026. It appears to be served behind an elastic load balancer on infrastructure geolocated to Ciudad de México, Mexico, with hosting attributed to Huawei International Pte. LTD. The web stack references standard static assets associated with a React application, and the server was identified generically as “elb.”
From a domain-security perspective, the domain is about three years old, registered through a mainstream registrar, and uses GoDaddy nameservers. DNSSEC appears to be unsigned, which is not uncommon but does mean DNS responses do not benefit from that additional integrity layer. The main technical concern here is not the certificate or hosting alone, but the combination of a credential-collection interface, third-party branding, and substantial phishing detections across security engines at the time of the scan.
Share your experience with this website. Was it safe? Did you encounter any issues?