metamaskio-auth.tem3.io favicon

metamaskio-auth.tem3[.]io

Category: Phishing And Fraud

Scanned: May 6, 2026, 12:40 PM UTC · First seen: May 6, 2026 · Threat Engines: 18 / 91 · Times Scanned: 1
0 / 100 Trust Score Based on scan findings at the time of analysis
Potentially Dangerous
0 - High Risk50 - Moderate100 - No Threats
Not scanned has not been scanned yet. Hit Scan Now to check it.

Scans can take up to 5 minutes to complete. Please keep this tab open - we'll redirect you to the report when it's ready.

Failed
Scan unavailable
Scan failed
Protect yourself from potentially harmful websites
Combo Cleaner's real-time web protection module actively blocks access to scam, phishing & malware-infected websites.
★★★★★ 4.8 / 5 Recommended by PCrisk.com editors Windows · Mac · Android · iOS
Download Combo Cleaner Free scan · no signup

To use full-featured product, you have to purchase a license for Combo Cleaner. Limited seven days free trial available. Combo Cleaner is owned and operated by RCS LT, the parent company of PCRisk.com.

Screenshot of metamaskio-auth.tem3[.]io Captured May 6, 2026
https://metamaskio-auth.tem3[.]io
Screenshot of metamaskio-auth.tem3.io
This website has been flagged as potentially harmful
Screenshot blurred for safety. Multiple security engines flagged potential threats at the time of scanning.
1 year (tem3.io)
Not Ranked - This website does not appear in the Tranco top list
Flagged by 18 of 91 engines
✓ Valid (TLS)
CloudFlare, Inc.
Toronto, Canada
cloudflare
Next.js
188.114.97.0
Domain & WHOIS Information
Registrar GoDaddy.com, LLC
Registered August 2, 2024 (tem3.io)
Expires August 2, 2026
Name Servers val.ns.cloudflare.com
DNSSEC Unsigned
Hosting CloudFlare, Inc.
This is a subdomain of tem3.io. The WHOIS data above belongs to the parent domain, not to metamaskio-auth.tem3[.]io. The actual creation date of this subdomain is unknown and could be much more recent than the parent.
Look-Alike Domain Check
Suspect look-alike This domain is 1 character apart from temu.com - a curated brand we track. A single character was substituted for a different one.
Reinforcing Signals: Not in Tranco top 1M No mail server
Reputation & Threat Check 91 security engines checked
File Scan Summary Powered by Quttera Engine
22 files scanned
No threats
21
Low Risk
0
Medium Risk
0
High Risk
1
No threats Low Risk Medium Risk High Risk
metamaskio-auth.tem3.io/# 214.8 KB Flagged: high risk
metamaskio-auth.tem3.io/favicon.png 23.6 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/lb-_kGhn1ec4cubt53eRl/_ssgManifest.js 77 B No threats
landingbuilder-cdn.tekoapis.com/_next/static/lb-_kGhn1ec4cubt53eRl/_buildManifest.js 1.3 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/83656-0f4d20455ed1fc0b.js 27.9 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/42376.2c59f019c87a5b96.js 451.4 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/37279-a5603accf11e1f2d.js 31.4 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/vendor-dompurify-6a9e13a6485d397d.js 20.9 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/vendor-react-62d734338f07e375.js 136.6 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/78419.7164ed4f33f630e6.js 134.9 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/15406-60216e650a865628.js 123.4 KB No threats
Show 11 more...
Quttera flagged high risk files - is this your website?
Investigate and remove potential threats with Quttera
Remove Malware

Quttera Web Malware Removal is a paid subscription service. Pricing, plans, and trial availability are set by Quttera. Quttera is operated by Quttera Ltd, an independent third-party company unrelated to RCS LT. PCRisk.com may earn a referral commission when users sign up through this link.

External Links & Domains
38
External Links
1 Flagged
1
Iframes
Clean
12
Referenced Domains
2 Flagged
3
Flagged Resources
Detected
footprint-ingestor.tekoapis.comFlagged: Generic Malicious Object
metamaskio-auth.tem3.ioFlagged: Generic Suspicious Object
https://footprint-ingestor.tekoapis.comFlagged: Generic Malicious Object
https://footprint-ingestor.tekoapis.comFlagged: Generic Malicious Object
http://metamaskio-auth.tem3.io/${n}Not flagged
http://metamaskio-auth.tem3.io/${r}Not flagged
http://metamaskio-auth.tem3.io/${s}Not flagged
http://metamaskio-auth.tem3.io/favicon.pngNot flagged
https://cdn.tekoapis.comNot flagged
https://cdnjs.cloudflare.comNot flagged
https://cdnjs.cloudflare.com/ajax/libs/animate.css/4.1.1/animate.min.cssNot flagged
https://fonts.googleapis.comNot flagged
https://fonts.googleapis.com/css2?family%3DRoboto:wght@100%3B200%3B300%3B400%3B500%3B600%3B700%3B800%3B900&amp%3Bfamily%3DRoboto:wght@100%3B200%3B300%3B400%3B500%3B600%3B700%3B800%3B900&amp%3Bfamily%3DRoboto:wght@100%3B200%3B300%3B400%3B500%3B600%3B700%3B800%3B900&amp%3Bdisplay%3DswapNot flagged
https://fonts.gstatic.comNot flagged
https://landingbuilder-cdn.tekoapis.com/_next/static/chunks/15406-60216e650a865628.jsNot flagged
https://landingbuilder-cdn.tekoapis.com/_next/static/chunks/29282-2c9b9dff63048849.jsNot flagged
https://landingbuilder-cdn.tekoapis.com/_next/static/chunks/36076-8a51c4f62e6fd9ee.jsNot flagged
https://landingbuilder-cdn.tekoapis.com/_next/static/chunks/37279-a5603accf11e1f2d.jsNot flagged
Show 23 more...
footprint-ingestor.tekoapis.comFlagged: Generic Malicious Object
metamaskio-auth.tem3.ioFlagged: Generic Suspicious Object
b.w.VNNot flagged
cdn.tekoapis.comNot flagged
cdnjs.cloudflare.comNot flagged
fonts.googleapis.comNot flagged
fonts.gstatic.comNot flagged
landingbuilder-cdn.tekoapis.comNot flagged
public.tempi.vnNot flagged
storage.googleapis.comNot flagged
temp3.ioNot flagged
tracking.tekoapis.comNot flagged
<iframe")?(0,i.jsx)("div",{dangerouslySetInnerHTML:{__html:(0,w.a)(o)}}):(0,i.jsx)("iframe",{src:o,title:"map",allowFullScreen:!0})})]})},O%3Da.A.div(({mainColor:e})%3D>` line-height: 2%3B padding: 0.8em 1.5em%3B background-color: white%3B border-bottom: 1px solid #eaeaea%3B &:hover{ background: color-mix(in srgb, ${e} 10%, white)%3B } .store-name{ font-size: 1.4em%3B color: ${e}%3B } .store-details{ position: relative%3B .bottom-elements{ display: flex%3B flex-wrap: wrap%3B align-items: center%3B .store-info{ display: inline-block%3B margin-right: auto%3B padding-bottom: 0.5em%3B } .map-toggle{ border: 1px solid ${e}%3B background-color: white%3B height: 40px%3B color: ${e}%3B line-height: 40px%3B display: block%3B padding: 0 15px%3B border-radius: 4px%3B outline-color: ${e}%3B svg{ vertical-align: baseline%3B } } } } .store-map{ margin-top: 1em%3B iframe{ width: 100%%3B border: none%3B border-radius: 1em%3B } }`)%3Bvar C%3Dn(48166),S%3Dn(30979),F%3DObject.getOwnPropertySymbols,j%3DObject.prototype.hasOwnProperty,P%3DObject.prototype.propertyIsEnumerable%3Blet k%3D(0,c.forwardRef)((e,t)%3D>{var{stores:n,mainColor:r%3D"#2e7ac1",title:l,id:a}%3De,o%3D((e,t)%3D>{var n%3D{}%3Bfor(var i in e)j.call(e,i)&&0>t.indexOf(i)&&(n[i]%3De[i])%3Bif(null!%3De&&F)for(var i of F(e))0>t.indexOf(i)&&P.call(e,i)&&(n[i]%3De[i])%3Breturn n})(e,["stores","mainColor","title","id"])%3Blet[u,p]%3D(0,c.useState)(),[g,m]%3D(0,c.useState)(),[f,h]%3D(0,c.useState)(n),{cities:y,districts:v}%3D(()%3D>{let[e,t]%3D(0,c.useState)({})%3Breturn(0,c.useEffect)(()%3D>{(async()%3D>{try{let e%3Dawait fetch(b.w.VN),n%3Dawait e.json()%3Bt(n)}catch(e){console.error(e)}})()},[]),{cities:e.province||[],districts:e.district||[]}})(),{device:w}%3D(0,d.P)(),{stickyTop:O,commonStyle:k}%3D(0,s.gJ)(o,w),I%3Dy.filter(e%3D>!!n.find(t%3D>t.cityId%3D%3D%3De.idProvince)),$%3Dv.filter(e%3D>e.idProvince%3D%3D%3Du&&!!n.find(t%3D>t.districtId%3D%3D%3De.idDistrict)),E%3D(e,t)%3D>{e&&(p(e),m(null)),t&&m(t)}%3Breturn(0,c.useEffect)(()%3D>{h(u&&"0"!%3D%3Du?!u||g&&"0"!%3D%3Dg?n.filter(e%3D>e.cityId%3D%3D%3Du&&e.districtId%3D%3D%3Dg):n.filter(e%3D>e.cityId%3D%3D%3Du):n)},[u,g,n]),(0,i.jsx)(A,{ref:t,"data-id":a,stickyTop:O,mainColor:r,commonStyle:k,children:(0,i.jsxs)(C.f,{gutter:[24,16],children:[(0,i.jsxs)(S.fv,{md:5,xs:12,children:[(0,i.jsxs)("div",{className:"label",children:["H thng ",n.length," ca h\xe0ng"]}),(0,i.jsxs)("div",{className:"select-location",children:[(0,i.jsx)("h5",{children:(0,i.jsx)("b",{children:l||"Chn ca h\xe0ng theo tnh/th\xe0nh ph"})}),(0,i.jsxs)("select",{onChange:e%3D>E(e.target.value),children:[(0,i.jsx)("option",{value:0,children:"Chn tnh/ th\xe0nh ph"}),I.map(e%3D>(0,i.jsx)("option",{value:e.idProvince,children:e.name},e.idProvince))]}),(0,i.jsxs)("select",{onChange:e%3D>E(null,e.target.value),children:[(0,i.jsx)("option",{value:0,children:"Chn qun/ huyn"}),$.sort((e,t)%3D>Not flagged
metamaskio-auth.tem3[.]io Overview

Description of metamaskio-auth.tem3[.]io

The domain metamaskio-auth.tem3[.]io appears to host a cryptocurrency-themed landing page that imitates the branding and messaging of MetaMask, a widely known Web3 wallet platform. The page title and visible content promote installing a browser extension wallet, and the screenshot shows MetaMask-style logos, navigation labels, and wallet interface imagery. At the same time, the page is served from a subdomain of tem3.io rather than an official MetaMask-owned domain, which is a notable mismatch.

Based on the screenshot and linked assets, the page also appears to be built using a third-party landing-page platform associated with Tem3/Teko infrastructure. The visible footer and header references suggest the operator may be using a generic site builder rather than an official product site. This combination of copied wallet branding, third-party hosting, and non-official domain naming is commonly associated with credential harvesting or deceptive crypto download pages.

Safety Assessment for metamaskio-auth.tem3[.]io

Multiple scan signals indicate elevated risk at the time of this scan. The domain was flagged by 18 out of 91 security engines, categorized by multiple web-classification providers as phishing/fraud, and listed in at least one major blacklist database for social-engineering activity. A malware scan also reported a malicious threat level and identified one flagged object, with an additional flagged external endpoint referenced by the page.

The domain name itself raises further concern. Although the page visually presents itself as MetaMask, it is hosted on metamaskio-auth.tem3[.]io rather than an official MetaMask domain. In addition, the domain closely resembles temu.com in structure and may be a look-alike, while the page content imitates a different well-known brand, MetaMask. That mismatch between domain identity and on-page branding is a common warning sign for deceptive campaigns.

The screenshot shows a polished crypto-wallet landing page, but the surrounding indicators do not support it as an authentic brand property. Based on these findings, this website may pose potential risks to visitors.

Technical Description

The site uses a valid TLS certificate issued by a mainstream certificate authority and is fronted by Cloudflare infrastructure, with the server IP resolving to Cloudflare-hosted space in Canada. Nameservers also point to Cloudflare, suggesting CDN or reverse-proxy protection is in use. DNSSEC appears to be unsigned, which is not uncommon but does remove one layer of DNS integrity protection.

From a security perspective, the more important concerns are reputational and behavioral rather than transport encryption. The domain is not ranked in major popularity lists, reportedly lacks MX records, and references a flagged external ingestion endpoint. The page appears to be delivered through a landing-page builder on a subdomain rather than a dedicated official brand domain, which may be consistent with short-lived phishing infrastructure.

HTTP Redirect Chain
No redirects detected - direct connection to destination
Website Insights
Not Ranked
Tranco Rank
Not in Top 1M
Visitors Unknown
Category: Phishing And Fraud
Rank History (30 days)
No rank data available
2 cookies detected
Essential2
Analytics0
Advertising0
Social0
2 1st party cookies
0 3rd party (trackers)
Dispute This Score For website owners
Believe this score is inaccurate?
If you are the website owner and believe the scan results contain errors or false positives, you can submit a dispute for manual review. Our team typically responds within 1-2 business days.
You will be asked to verify your email before the dispute can be processed.
By submitting this form, you confirm that the information provided is accurate. Disputes are reviewed manually and results may take up to 48 hours to update.
One more step..
To submit your dispute for metamaskio-auth.tem3[.]io, please click the verification link we just emailed you. Once verified, we'll review it within 1–2 business days.
This report was generated automatically and is provided for informational purposes only. Results are based on a point-in-time scan and may contain false positives or incomplete data. This does not constitute a security audit or certification. No vendor in the market can guarantee a 100% detection rate. If you believe this report is inaccurate, please submit a dispute.

Share your experience with this website. Was it safe? Did you encounter any issues?