doc-exodusweb3-web-access.tem3.io favicon

doc-exodusweb3-web-access.tem3[.]io

Category: Phishing And Fraud

Scanned: May 6, 2026, 02:02 PM UTC · First seen: May 6, 2026 · Threat Engines: 10 / 91 · Times Scanned: 1
0 / 100 Trust Score Based on scan findings at the time of analysis
Potentially Dangerous
0 - High Risk50 - Moderate100 - No Threats
Not scanned has not been scanned yet. Hit Scan Now to check it.

Scans can take up to 5 minutes to complete. Please keep this tab open - we'll redirect you to the report when it's ready.

Failed
Scan unavailable
Scan failed
Protect yourself from potentially harmful websites
Combo Cleaner's real-time web protection module actively blocks access to scam, phishing & malware-infected websites.
★★★★★ 4.8 / 5 Recommended by PCrisk.com editors Windows · Mac · Android · iOS
Download Combo Cleaner Free scan · no signup

To use full-featured product, you have to purchase a license for Combo Cleaner. Limited seven days free trial available. Combo Cleaner is owned and operated by RCS LT, the parent company of PCRisk.com.

Screenshot of doc-exodusweb3-web-access.tem3[.]io Captured May 6, 2026
https://doc-exodusweb3-web-access.tem3[.]io
Screenshot of doc-exodusweb3-web-access.tem3.io
This website has been flagged as potentially harmful
Screenshot blurred for safety. Multiple security engines flagged potential threats at the time of scanning.
1 year (tem3.io)
Not Ranked - This website does not appear in the Tranco top list
Flagged by 10 of 91 engines
✓ Valid (TLS)
CloudFlare, Inc.
Toronto, Canada
cloudflare
Next.js
188.114.96.0
Domain & WHOIS Information
Registrar GoDaddy.com, LLC
Registered August 2, 2024 (tem3.io)
Expires August 2, 2026
Name Servers val.ns.cloudflare.com
DNSSEC Unsigned
Hosting CloudFlare, Inc.
This is a subdomain of tem3.io. The WHOIS data above belongs to the parent domain, not to doc-exodusweb3-web-access.tem3[.]io. The actual creation date of this subdomain is unknown and could be much more recent than the parent.
Look-Alike Domain Check
Suspect look-alike This domain is 1 character apart from temu.com - a curated brand we track. A single character was substituted for a different one.
Reinforcing Signals: Not in Tranco top 1M No mail server
Reputation & Threat Check 91 security engines checked
File Scan Summary Powered by Quttera Engine
22 files scanned
No threats
21
Low Risk
0
Medium Risk
0
High Risk
1
No threats Low Risk Medium Risk High Risk
doc-exodusweb3-web-access.tem3.io/# 313.9 KB Flagged: high risk
doc-exodusweb3-web-access.tem3.io/favicon.png 23.6 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/lb-_kGhn1ec4cubt53eRl/_ssgManifest.js 77 B No threats
landingbuilder-cdn.tekoapis.com/_next/static/lb-_kGhn1ec4cubt53eRl/_buildManifest.js 1.3 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/83656-0f4d20455ed1fc0b.js 27.9 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/42376.2c59f019c87a5b96.js 451.4 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/37279-a5603accf11e1f2d.js 31.4 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/vendor-dompurify-6a9e13a6485d397d.js 20.9 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/vendor-react-62d734338f07e375.js 136.6 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/78419.7164ed4f33f630e6.js 134.9 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/15406-60216e650a865628.js 123.4 KB No threats
Show 11 more...
Quttera flagged high risk files - is this your website?
Investigate and remove potential threats with Quttera
Remove Malware

Quttera Web Malware Removal is a paid subscription service. Pricing, plans, and trial availability are set by Quttera. Quttera is operated by Quttera Ltd, an independent third-party company unrelated to RCS LT. PCRisk.com may earn a referral commission when users sign up through this link.

External Links & Domains
38
External Links
1 Flagged
1
Iframes
Clean
12
Referenced Domains
1 Flagged
2
Flagged Resources
Detected
footprint-ingestor.tekoapis.comFlagged: Generic Malicious Object
https://footprint-ingestor.tekoapis.comFlagged: Generic Malicious Object
https://footprint-ingestor.tekoapis.comFlagged: Generic Malicious Object
http://doc-exodusweb3-web-access.tem3.io/${n}Not flagged
http://doc-exodusweb3-web-access.tem3.io/${r}Not flagged
http://doc-exodusweb3-web-access.tem3.io/${s}Not flagged
http://doc-exodusweb3-web-access.tem3.io/favicon.pngNot flagged
https://cdn.tekoapis.comNot flagged
https://cdnjs.cloudflare.comNot flagged
https://cdnjs.cloudflare.com/ajax/libs/animate.css/4.1.1/animate.min.cssNot flagged
https://doc-exodusweb3-web-access.tem3.ioNot flagged
https://fonts.googleapis.comNot flagged
https://fonts.googleapis.com/css2?family%3DOpen%20Sans:wght@100%3B200%3B300%3B400%3B500%3B600%3B700%3B800%3B900&amp%3Bfamily%3DRoboto:wght@100%3B200%3B300%3B400%3B500%3B600%3B700%3B800%3B900&amp%3Bfamily%3DRoboto:wght@100%3B200%3B300%3B400%3B500%3B600%3B700%3B800%3B900&amp%3Bdisplay%3DswapNot flagged
https://fonts.gstatic.comNot flagged
https://landingbuilder-cdn.tekoapis.com/_next/static/chunks/15406-60216e650a865628.jsNot flagged
https://landingbuilder-cdn.tekoapis.com/_next/static/chunks/29282-2c9b9dff63048849.jsNot flagged
https://landingbuilder-cdn.tekoapis.com/_next/static/chunks/36076-8a51c4f62e6fd9ee.jsNot flagged
Show 23 more...
footprint-ingestor.tekoapis.comFlagged: Generic Malicious Object
b.w.VNNot flagged
cdn.tekoapis.comNot flagged
cdnjs.cloudflare.comNot flagged
doc-exodusweb3-web-access.tem3.ioNot flagged
fonts.googleapis.comNot flagged
fonts.gstatic.comNot flagged
landingbuilder-cdn.tekoapis.comNot flagged
public.tempi.vnNot flagged
storage.googleapis.comNot flagged
temp3.ioNot flagged
tracking.tekoapis.comNot flagged
<iframe")?(0,i.jsx)("div",{dangerouslySetInnerHTML:{__html:(0,w.a)(o)}}):(0,i.jsx)("iframe",{src:o,title:"map",allowFullScreen:!0})})]})},O%3Da.A.div(({mainColor:e})%3D>` line-height: 2%3B padding: 0.8em 1.5em%3B background-color: white%3B border-bottom: 1px solid #eaeaea%3B &:hover{ background: color-mix(in srgb, ${e} 10%, white)%3B } .store-name{ font-size: 1.4em%3B color: ${e}%3B } .store-details{ position: relative%3B .bottom-elements{ display: flex%3B flex-wrap: wrap%3B align-items: center%3B .store-info{ display: inline-block%3B margin-right: auto%3B padding-bottom: 0.5em%3B } .map-toggle{ border: 1px solid ${e}%3B background-color: white%3B height: 40px%3B color: ${e}%3B line-height: 40px%3B display: block%3B padding: 0 15px%3B border-radius: 4px%3B outline-color: ${e}%3B svg{ vertical-align: baseline%3B } } } } .store-map{ margin-top: 1em%3B iframe{ width: 100%%3B border: none%3B border-radius: 1em%3B } }`)%3Bvar C%3Dn(48166),S%3Dn(30979),F%3DObject.getOwnPropertySymbols,j%3DObject.prototype.hasOwnProperty,P%3DObject.prototype.propertyIsEnumerable%3Blet k%3D(0,c.forwardRef)((e,t)%3D>{var{stores:n,mainColor:r%3D"#2e7ac1",title:l,id:a}%3De,o%3D((e,t)%3D>{var n%3D{}%3Bfor(var i in e)j.call(e,i)&&0>t.indexOf(i)&&(n[i]%3De[i])%3Bif(null!%3De&&F)for(var i of F(e))0>t.indexOf(i)&&P.call(e,i)&&(n[i]%3De[i])%3Breturn n})(e,["stores","mainColor","title","id"])%3Blet[u,p]%3D(0,c.useState)(),[g,m]%3D(0,c.useState)(),[f,h]%3D(0,c.useState)(n),{cities:y,districts:v}%3D(()%3D>{let[e,t]%3D(0,c.useState)({})%3Breturn(0,c.useEffect)(()%3D>{(async()%3D>{try{let e%3Dawait fetch(b.w.VN),n%3Dawait e.json()%3Bt(n)}catch(e){console.error(e)}})()},[]),{cities:e.province||[],districts:e.district||[]}})(),{device:w}%3D(0,d.P)(),{stickyTop:O,commonStyle:k}%3D(0,s.gJ)(o,w),I%3Dy.filter(e%3D>!!n.find(t%3D>t.cityId%3D%3D%3De.idProvince)),$%3Dv.filter(e%3D>e.idProvince%3D%3D%3Du&&!!n.find(t%3D>t.districtId%3D%3D%3De.idDistrict)),E%3D(e,t)%3D>{e&&(p(e),m(null)),t&&m(t)}%3Breturn(0,c.useEffect)(()%3D>{h(u&&"0"!%3D%3Du?!u||g&&"0"!%3D%3Dg?n.filter(e%3D>e.cityId%3D%3D%3Du&&e.districtId%3D%3D%3Dg):n.filter(e%3D>e.cityId%3D%3D%3Du):n)},[u,g,n]),(0,i.jsx)(A,{ref:t,"data-id":a,stickyTop:O,mainColor:r,commonStyle:k,children:(0,i.jsxs)(C.f,{gutter:[24,16],children:[(0,i.jsxs)(S.fv,{md:5,xs:12,children:[(0,i.jsxs)("div",{className:"label",children:["H thng ",n.length," ca h\xe0ng"]}),(0,i.jsxs)("div",{className:"select-location",children:[(0,i.jsx)("h5",{children:(0,i.jsx)("b",{children:l||"Chn ca h\xe0ng theo tnh/th\xe0nh ph"})}),(0,i.jsxs)("select",{onChange:e%3D>E(e.target.value),children:[(0,i.jsx)("option",{value:0,children:"Chn tnh/ th\xe0nh ph"}),I.map(e%3D>(0,i.jsx)("option",{value:e.idProvince,children:e.name},e.idProvince))]}),(0,i.jsxs)("select",{onChange:e%3D>E(null,e.target.value),children:[(0,i.jsx)("option",{value:0,children:"Chn qun/ huyn"}),$.sort((e,t)%3D>Not flagged
doc-exodusweb3-web-access.tem3[.]io Overview

Description of doc-exodusweb3-web-access.tem3[.]io

This domain appears to host a landing page themed around the Exodus Web3 Wallet, presenting itself as a cryptocurrency wallet or browser-extension access page. The page metadata references "Exódus® Web3 Wallet | Exódus® Browser Extension," and the screenshot shows Exodus branding, crypto-related messaging, and a download-oriented interface.

At the same time, the site appears to be built on a third-party landing-page platform under the tem3.io infrastructure rather than an obvious official Exodus-owned domain. The domain string itself is unusually long and promotional in style, which may indicate a campaign-style page rather than a primary corporate website. Based on the visible content and categorization data, the site would most likely be understood as a cryptocurrency-related landing page that may be attempting to attract users seeking wallet access or downloads.

Safety Assessment for doc-exodusweb3-web-access.tem3[.]io

This website was flagged by 10 out of 91 security engines at the time of this scan, and multiple web-classification sources associated it with phishing or fraud-related activity. A malware scan also reported a malicious threat level and identified one flagged object among the scanned files, along with a flagged external resource. These findings suggest that the page may be involved in credential harvesting, deceptive wallet access flows, or other abusive behavior.

There is also a notable domain resemblance concern: the hostname closely resembles a well-known retail brand domain while the page content promotes a cryptocurrency wallet brand, which is an unusual combination and may indicate a look-alike or deceptive campaign. The lack of ranking data, the phishing-related categorization, and the mismatch between the domain naming pattern and the displayed brand all increase risk. Although some blacklist databases did not list the domain at the time of this scan, that does not outweigh the direct phishing detections and malicious scan results.

Based on these findings, this website may pose potential risks to visitors.

Technical Description

The site uses a valid TLS certificate issued by a mainstream certificate authority and is served through Cloudflare infrastructure, with Cloudflare nameservers and hosting endpoints visible in the scan data. This means the connection may be encrypted in transit, but encryption alone does not validate the legitimacy of the content. DNSSEC appears to be unsigned, which is not uncommon but provides less DNS integrity assurance than a signed configuration.

The domain is relatively new in practical reputation terms, has no Tranco ranking, and appears to rely on a landing-page builder and related CDN resources. The scan also identified a flagged external endpoint under tekoapis.com and a suspicious embedded/inline iframe-related string, which may indicate third-party script dependence or injected content concerns. Taken together, the infrastructure appears functional, but the security findings suggest the content and linked resources should be treated with caution at the time of this scan.

HTTP Redirect Chain
No redirects detected - direct connection to destination
Website Insights
Not Ranked
Tranco Rank
Not in Top 1M
Visitors Unknown
Category: Phishing And Fraud
Rank History (30 days)
No rank data available
2 cookies detected
Essential2
Analytics0
Advertising0
Social0
2 1st party cookies
0 3rd party (trackers)
Dispute This Score For website owners
Believe this score is inaccurate?
If you are the website owner and believe the scan results contain errors or false positives, you can submit a dispute for manual review. Our team typically responds within 1-2 business days.
You will be asked to verify your email before the dispute can be processed.
By submitting this form, you confirm that the information provided is accurate. Disputes are reviewed manually and results may take up to 48 hours to update.
One more step..
To submit your dispute for doc-exodusweb3-web-access.tem3[.]io, please click the verification link we just emailed you. Once verified, we'll review it within 1–2 business days.
This report was generated automatically and is provided for informational purposes only. Results are based on a point-in-time scan and may contain false positives or incomplete data. This does not constitute a security audit or certification. No vendor in the market can guarantee a 100% detection rate. If you believe this report is inaccurate, please submit a dispute.

Share your experience with this website. Was it safe? Did you encounter any issues?