dpd.bzqwpn.club
Category: Phishing
To use full-featured product, you have to purchase a license for Combo Cleaner. Limited seven days free trial available. Combo Cleaner is owned and operated by RCS LT, the parent company of PCRisk.com.
Description of dpd.bzqwpn.club
The domain dpd.bzqwpn.club appears to be a very recently registered subdomain with no clear standalone branding, business identity, or published site content visible at the time of this scan. The captured page shows a generic HTTP 404 error rather than an active homepage, which suggests the address may be inactive, misconfigured, or used only for temporary campaign-specific paths rather than as a normal public website.
Based on the domain string, the use of "dpd" may be intended to reference parcel delivery or logistics themes, but the broader hostname and available metadata do not indicate an official relationship with a known courier operator. Independent web-classification sources associated this domain with phishing or fraud-related activity, so its apparent purpose may be credential harvesting or deceptive traffic routing rather than legitimate consumer services.
No operator details, company information, contact details, or normal website navigation were visible in the scan results. That lack of transparent ownership, combined with the newly registered status and absent real content, limits confidence in any legitimate business use.
Safety Assessment for dpd.bzqwpn.club
This domain was flagged by 21 out of 91 security engines at the time of this scan, with multiple sources classifying it as phishing or fraud-related. In addition, it appeared on a major safe-browsing blocklist for social-engineering activity and was listed in a DNS-based threat database. Those are stronger risk indicators than a single heuristic alert because they show broad agreement across independent detection systems.
The domain is also only 9 days old, is not ranked among established websites, and currently resolves to a 404 page rather than a functioning service. While a 404 page by itself does not prove harmful intent, newly created domains with no legitimate public-facing content are commonly used in short-lived phishing campaigns. The hostname structure also does not resemble a typical official corporate domain, which further reduces trust.
A separate malware scan did not detect malicious files on the page that was reachable during this check, but that does not offset the phishing-related signals because credential theft pages can be simple, short-lived, or path-specific. Based on these findings, this website may pose potential risks to visitors.
Technical Description
The domain is using a valid Let's Encrypt TLS certificate and is fronted by Cloudflare infrastructure, with the observed IP resolving to Cloudflare in Toronto, Canada. Nameservers are also on Cloudflare, which may help with availability and conceal origin hosting, but this setup is common across both legitimate and abusive sites. The certificate validity indicates encrypted transport was available at the time of the scan, though encryption alone does not establish legitimacy.
DNSSEC appears to be unsigned, and the site was observed returning an HTTP 404 page rather than active application content. No malicious files, external links, or iframes were identified in the limited page content that was scanned. The main technical concerns are therefore not exploit-related artifacts on the visible page, but rather the domain's very recent registration, blacklist presence, and broad phishing-related detection consensus.
Share your experience with this website. Was it safe? Did you encounter any issues?