support-uphold-user-auth.tem3.io favicon

support-uphold-user-auth.tem3.io

Category: Phishing And Fraud

Scanned: May 17, 2026, 08:06 PM UTC · First seen: May 17, 2026 · Threat Engines: 14 / 92 · Times Scanned: 1
5 / 100 Trust Score Based on scan findings at the time of analysis
Potentially Dangerous
0 - High Risk50 - Moderate100 - No Threats
Not scanned has not been scanned yet. Hit Scan Now to check it.

Scans can take up to 5 minutes to complete. Please keep this tab open - we'll redirect you to the report when it's ready.

Failed
Scan unavailable
Scan failed
Protect yourself from potentially harmful websites
Combo Cleaner's real-time web protection module actively blocks access to scam, phishing & malware-infected websites.
★★★★★ 4.8 / 5 Recommended by PCrisk.com editors Windows · Mac · Android · iOS
Download Combo Cleaner Free scan · no signup

To use full-featured product, you have to purchase a license for Combo Cleaner. Limited seven days free trial available. Combo Cleaner is owned and operated by RCS LT, the parent company of PCRisk.com.

Screenshot of support-uphold-user-auth.tem3.io Captured May 17, 2026
https://support-uphold-user-auth.tem3.io
Screenshot of support-uphold-user-auth.tem3.io
This website has been flagged as potentially harmful
Screenshot blurred for safety. Multiple security engines flagged potential threats at the time of scanning.
1 year (tem3.io)
Not Ranked - This website does not appear in the Tranco top list
Flagged by 14 of 92 engines
✓ Valid (TLS)
CloudFlare, Inc.
Toronto, Canada
cloudflare
Next.js
188.114.96.0
Domain & WHOIS Information
Registrar GoDaddy.com, LLC
Registered August 2, 2024 (tem3.io)
Expires August 2, 2026
Name Servers val.ns.cloudflare.com
DNSSEC Unsigned
Hosting CloudFlare, Inc.
This is a subdomain of tem3.io. The WHOIS data above belongs to the parent domain, not to support-uphold-user-auth.tem3.io. The actual creation date of this subdomain is unknown and could be much more recent than the parent.
Reputation & Threat Check 92 security engines checked
File Scan Summary Powered by Quttera Engine
22 files scanned
No threats
21
Low Risk
0
Medium Risk
0
High Risk
1
No threats Low Risk Medium Risk High Risk
support-uphold-user-auth.tem3.io/# 271.0 KB Flagged: high risk
support-uphold-user-auth.tem3.io/favicon.png 23.6 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/VcA4Cd8a4sMUzkX-a9LEa/_ssgManifest.js 77 B No threats
landingbuilder-cdn.tekoapis.com/_next/static/VcA4Cd8a4sMUzkX-a9LEa/_buildManifest.js 1.3 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/83656-0f4d20455ed1fc0b.js 27.9 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/42376.76ea601de265ebac.js 451.7 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/37904-b04e8aad5a34d280.js 10.4 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/37279-a5603accf11e1f2d.js 31.4 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/landing-misc-ed7e0d4674eacec1.js 4.5 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/vendor-dompurify-6a9e13a6485d397d.js 20.9 KB No threats
landingbuilder-cdn.tekoapis.com/_next/static/chunks/vendor-react-62d734338f07e375.js 136.6 KB No threats
Show 11 more...
Quttera flagged high risk files - is this your website?
Investigate and remove potential threats with Quttera
Remove Malware

Quttera Web Malware Removal is a paid subscription service. Pricing, plans, and trial availability are set by Quttera. Quttera is operated by Quttera Ltd, an independent third-party company unrelated to RCS LT. PCRisk.com may earn a referral commission when users sign up through this link.

External Links & Domains
38
External Links
1 Flagged
1
Iframes
Clean
12
Referenced Domains
1 Flagged
2
Flagged Resources
Detected
footprint-ingestor.tekoapis.comFlagged: Generic Malicious Object
https://footprint-ingestor.tekoapis.comFlagged: Generic Malicious Object
https://footprint-ingestor.tekoapis.comFlagged: Generic Malicious Object
http://support-uphold-user-auth.tem3.io/${i}Not flagged
http://support-uphold-user-auth.tem3.io/${n}Not flagged
http://support-uphold-user-auth.tem3.io/${s}Not flagged
http://support-uphold-user-auth.tem3.io/favicon.pngNot flagged
https://cdn.tekoapis.comNot flagged
https://cdnjs.cloudflare.comNot flagged
https://cdnjs.cloudflare.com/ajax/libs/animate.css/4.1.1/animate.min.cssNot flagged
https://fonts.googleapis.comNot flagged
https://fonts.googleapis.com/css2?family%3DRoboto:wght@100%3B200%3B300%3B400%3B500%3B600%3B700%3B800%3B900&amp%3Bfamily%3DRoboto:wght@100%3B200%3B300%3B400%3B500%3B600%3B700%3B800%3B900&amp%3Bfamily%3DRoboto:wght@100%3B200%3B300%3B400%3B500%3B600%3B700%3B800%3B900&amp%3Bdisplay%3DswapNot flagged
https://fonts.gstatic.comNot flagged
https://landingbuilder-cdn.tekoapis.com/_next/static/VcA4Cd8a4sMUzkX-a9LEa/_buildManifest.jsNot flagged
https://landingbuilder-cdn.tekoapis.com/_next/static/VcA4Cd8a4sMUzkX-a9LEa/_ssgManifest.jsNot flagged
https://landingbuilder-cdn.tekoapis.com/_next/static/chunks/15406-60216e650a865628.jsNot flagged
https://landingbuilder-cdn.tekoapis.com/_next/static/chunks/36076-8a51c4f62e6fd9ee.jsNot flagged
Show 23 more...
footprint-ingestor.tekoapis.comFlagged: Generic Malicious Object
b.w.VNNot flagged
cdn.tekoapis.comNot flagged
cdnjs.cloudflare.comNot flagged
fonts.googleapis.comNot flagged
fonts.gstatic.comNot flagged
landingbuilder-cdn.tekoapis.comNot flagged
public.tempi.vnNot flagged
storage.googleapis.comNot flagged
support-uphold-user-auth.tem3.ioNot flagged
temp3.ioNot flagged
tracking.tekoapis.comNot flagged
<iframe")?(0,r.jsx)("div",{dangerouslySetInnerHTML:{__html:(0,w.a)(o)}}):(0,r.jsx)("iframe",{src:o,title:"map",allowFullScreen:!0})})]})},O%3Da.A.div(({mainColor:e})%3D>` line-height: 2%3B padding: 0.8em 1.5em%3B background-color: white%3B border-bottom: 1px solid #eaeaea%3B &:hover{ background: color-mix(in srgb, ${e} 10%, white)%3B } .store-name{ font-size: 1.4em%3B color: ${e}%3B } .store-details{ position: relative%3B .bottom-elements{ display: flex%3B flex-wrap: wrap%3B align-items: center%3B .store-info{ display: inline-block%3B margin-right: auto%3B padding-bottom: 0.5em%3B } .map-toggle{ border: 1px solid ${e}%3B background-color: white%3B height: 40px%3B color: ${e}%3B line-height: 40px%3B display: block%3B padding: 0 15px%3B border-radius: 4px%3B outline-color: ${e}%3B svg{ vertical-align: baseline%3B } } } } .store-map{ margin-top: 1em%3B iframe{ width: 100%%3B border: none%3B border-radius: 1em%3B } }`)%3Bvar C%3Dn(48166),S%3Dn(30979),F%3DObject.getOwnPropertySymbols,j%3DObject.prototype.hasOwnProperty,P%3DObject.prototype.propertyIsEnumerable%3Blet k%3D(0,c.forwardRef)((e,t)%3D>{var{stores:n,mainColor:i%3D"#2e7ac1",title:l,id:a}%3De,o%3D((e,t)%3D>{var n%3D{}%3Bfor(var r in e)j.call(e,r)&&0>t.indexOf(r)&&(n[r]%3De[r])%3Bif(null!%3De&&F)for(var r of F(e))0>t.indexOf(r)&&P.call(e,r)&&(n[r]%3De[r])%3Breturn n})(e,["stores","mainColor","title","id"])%3Blet[u,p]%3D(0,c.useState)(),[g,m]%3D(0,c.useState)(),[f,h]%3D(0,c.useState)(n),{cities:y,districts:v}%3D(()%3D>{let[e,t]%3D(0,c.useState)({})%3Breturn(0,c.useEffect)(()%3D>{(async()%3D>{try{let e%3Dawait fetch(b.w.VN),n%3Dawait e.json()%3Bt(n)}catch(e){console.error(e)}})()},[]),{cities:e.province||[],districts:e.district||[]}})(),{device:w}%3D(0,d.P)(),{stickyTop:O,commonStyle:k}%3D(0,s.gJ)(o,w),I%3Dy.filter(e%3D>!!n.find(t%3D>t.cityId%3D%3D%3De.idProvince)),$%3Dv.filter(e%3D>e.idProvince%3D%3D%3Du&&!!n.find(t%3D>t.districtId%3D%3D%3De.idDistrict)),E%3D(e,t)%3D>{e&&(p(e),m(null)),t&&m(t)}%3Breturn(0,c.useEffect)(()%3D>{h(u&&"0"!%3D%3Du?!u||g&&"0"!%3D%3Dg?n.filter(e%3D>e.cityId%3D%3D%3Du&&e.districtId%3D%3D%3Dg):n.filter(e%3D>e.cityId%3D%3D%3Du):n)},[u,g,n]),(0,r.jsx)(A,{ref:t,"data-id":a,stickyTop:O,mainColor:i,commonStyle:k,children:(0,r.jsxs)(C.f,{gutter:[24,16],children:[(0,r.jsxs)(S.fv,{md:5,xs:12,children:[(0,r.jsxs)("div",{className:"label",children:["H thng ",n.length," ca h\xe0ng"]}),(0,r.jsxs)("div",{className:"select-location",children:[(0,r.jsx)("h5",{children:(0,r.jsx)("b",{children:l||"Chn ca h\xe0ng theo tnh/th\xe0nh ph"})}),(0,r.jsxs)("select",{onChange:e%3D>E(e.target.value),children:[(0,r.jsx)("option",{value:0,children:"Chn tnh/ th\xe0nh ph"}),I.map(e%3D>(0,r.jsx)("option",{value:e.idProvince,children:e.name},e.idProvince))]}),(0,r.jsxs)("select",{onChange:e%3D>E(null,e.target.value),children:[(0,r.jsx)("option",{value:0,children:"Chn qun/ huyn"}),$.sort((e,t)%3D>Not flagged
support-uphold-user-auth.tem3.io Overview

Description of support-uphold-user-auth.tem3.io

This domain appears to be a landing page hosted on the tem3.io website-building platform and presented as an Uphold account login page for cryptocurrency users. The page title and meta description reference signing in to an Uphold account to buy, sell, and store digital assets, while the visible content in the screenshot uses Uphold branding and crypto-related marketing language such as "Trade Crypto Better."

However, the domain itself is not an official-looking Uphold domain and instead uses a subdomain structure, support-uphold-user-auth.tem3.io, that appears designed to resemble a support or authentication portal. The screenshot also shows clear Tem3 platform branding above and below the page content, which suggests the page may have been created through a third-party landing-page builder rather than operated directly by the cryptocurrency company it references.

Safety Assessment for support-uphold-user-auth.tem3.io

Multiple scan signals indicate elevated risk at the time of this scan. The domain was flagged by 14 out of 92 security engines, and multiple web-classification providers categorized it as phishing, fraud, or spam-related content. In addition, a major safe-browsing database listed the page for social engineering, which is a strong indicator that the site may be attempting to collect credentials or other sensitive information under misleading branding.

The page content also raises concern because it appears to imitate Uphold while being hosted on an unrelated subdomain under tem3.io. In plain terms, the address closely presents itself as an Uphold support or user authentication page without using an official Uphold-owned domain, which may indicate a look-alike login page. The combination of brand-referencing domain terms, phishing-oriented classifications, and social-engineering listing materially increases the likelihood of deceptive intent.

A malware scan also reported one flagged object and one flagged external endpoint, although that signal is less important than the broader phishing consensus. Based on these findings, this website may pose potential risks to visitors.

Technical Description

The site was served over HTTPS with a valid TLS certificate issued by Google Trust Services, expiring on 2026-08-11. It appears to be proxied through Cloudflare infrastructure, with hosting resolved to a Cloudflare IP in Toronto, Canada, and nameservers also using Cloudflare. DNSSEC appears to be unsigned at the time of this scan.

From an infrastructure perspective, the use of HTTPS and a mainstream CDN does not by itself establish legitimacy, since phishing pages commonly use the same protections. The domain is relatively recent at about 653 days old, is not ranked in Tranco, and appears to rely on a landing-page builder ecosystem with external resources from tekoapis.com and related CDN endpoints. The mismatch between the claimed Uphold login purpose and the actual hosting context is a notable technical concern.

HTTP Redirect Chain
No redirects detected - direct connection to destination
Website Insights
Not Ranked
Tranco Rank
Not in Top 1M
Visitors Unknown
Category: Phishing And Fraud
Rank History (30 days)
No rank data available
2 cookies detected
Essential2
Analytics0
Advertising0
Social0
2 1st party cookies
0 3rd party (trackers)
Dispute This Score For website owners
Believe this score is inaccurate?
If you are the website owner and believe the scan results contain errors or false positives, you can submit a dispute for manual review. Our team typically responds within 1-2 business days.
You will be asked to verify your email before the dispute can be processed.
By submitting this form, you confirm that the information provided is accurate. Disputes are reviewed manually and results may take up to 48 hours to update.
One more step..
To submit your dispute for support-uphold-user-auth.tem3.io, please click the verification link we just emailed you. Once verified, we'll review it within 1–2 business days.
This report was generated automatically and is provided for informational purposes only. Results are based on a point-in-time scan and may contain false positives or incomplete data. This does not constitute a security audit or certification. No vendor in the market can guarantee a 100% detection rate. If you believe this report is inaccurate, please submit a dispute.

Share your experience with this website. Was it safe? Did you encounter any issues?