bafkreifv4toarzwlzqzc2cfi34btq6zfvwxnepfkcrap4bjuev5wdcclc4.ipfs.dweb[.]link
Category: Phishing
To use full-featured product, you have to purchase a license for Combo Cleaner. Limited seven days free trial available. Combo Cleaner is owned and operated by RCS LT, the parent company of PCRisk.com.
Description of bafkreifv4toarzwlzqzc2cfi34btq6zfvwxnepfkcrap4bjuev5wdcclc4.ipfs.dweb[.]link
This URL appears to be an IPFS-hosted page delivered through the dweb.link gateway rather than a conventional branded website. The visible content is a simple "EmailLogin" form asking for an email address and mailbox password, with minimal branding and no clear indication of a legitimate organization, service provider, or business identity behind it.
Based on the page layout and wording, the site appears to be presenting itself as a generic webmail or secure mail access portal. However, the domain itself is a long content-addressed IPFS identifier rather than a recognizable mail provider domain, which makes it difficult to attribute the page to any established operator based on available data.
Safety Assessment for bafkreifv4toarzwlzqzc2cfi34btq6zfvwxnepfkcrap4bjuev5wdcclc4.ipfs.dweb[.]link
Multiple independent security signals indicate elevated risk at the time of this scan. The URL was flagged by 17 out of 92 security engines, and several web-classification sources categorized it as phishing or fraud-related. The screenshot also shows a credential-entry page requesting an email password on a non-branded IPFS gateway URL, which is a common pattern associated with credential harvesting.
Although one malware scan reported no directly flagged files, it still noted a generic suspicious-object heuristic tied to the page and one referenced link/domain. In addition, one blacklist source showed a listing while other blacklist checks were clean. The combination of multi-engine phishing detections, phishing-oriented categorization, and the deceptive-looking login prompt materially outweighs the limited clean signals.
Based on these findings, this website may pose potential risks to visitors, particularly anyone asked to enter email account credentials.
Technical Description
The site is served over HTTPS with a valid Let's Encrypt certificate that was valid at the time of scanning, and it resolves to infrastructure associated with Protocol Labs through the dweb.link gateway. Nameservers are on Cloudflare, and DNSSEC appears to be unsigned. The domain itself is older, but that age reflects the gateway domain rather than the specific IPFS-hosted content shown in the screenshot.
From a security perspective, the main concern is not TLS but the page behavior and hosting model: a generic credential form hosted on a decentralized content gateway can make attribution and takedown more difficult. The page also loads common third-party assets such as icon fonts and Google Fonts, but no technical indicator here offsets the stronger phishing-related findings from the scan data.
Share your experience with this website. Was it safe? Did you encounter any issues?