swiftmail[.]cc
Category: Phishing
To use full-featured product, you have to purchase a license for Combo Cleaner. Limited seven days free trial available. Combo Cleaner is owned and operated by RCS LT, the parent company of PCRisk.com.
Description of swiftmail[.]cc
swiftmail[.]cc appears to present itself as a web-based email login portal branded as "Swift." The visible page is a minimal sign-in form requesting an email address and password, with text referencing a "Secure IMAP Email Client." Based on the domain name and page layout, the site appears to be positioned as an email access or webmail-related service rather than a general content website.
However, the publicly visible content is very limited and does not clearly identify a company, organization, or legitimate service operator behind the platform. No obvious corporate branding, support information, legal pages, or provider details are visible in the supplied scan context, which makes independent verification of ownership and purpose difficult based on available data.
Safety Assessment for swiftmail[.]cc
Multiple security signals indicate elevated risk at the time of this scan. The domain was flagged by 12 out of 91 security engines, and several web-classification sources categorized it as phishing, fraud, or suspicious content. The screenshot also shows a generic email credential form with minimal branding and no clear operator identity, which is a common pattern seen on credential-harvesting pages.
At the same time, the malware scan summary reported no directly flagged files among the scanned set, although the scanner still associated the domain and linked static assets with a generic malicious-object label. Blacklist coverage was mixed: most checked databases did not list the domain, while one threat database did. This combination can occur when a site is primarily suspected of phishing rather than serving conventional malware payloads.
Given the strong phishing-related classifications, the very low trust score, lack of ranking, and the login-focused page design, this website may pose potential risks to visitors, especially if it asks for email credentials or other sensitive information.
Technical Description
The site uses a valid TLS certificate issued by a mainstream certificate authority, and traffic appears to be routed through Cloudflare infrastructure with hosting resolved to a Cloudflare IP in Canada. The certificate validity and CDN usage may help with transport encryption and availability, but they do not by themselves verify the legitimacy of the service.
DNSSEC appears to be unsigned, and the site uses Cloudflare nameservers. The flagged resources are mostly JavaScript and CSS files under a modern web application structure, which suggests a scripted frontend. While that structure is not unusual on its own, the broader scan context raises concern because the application is centered on credential submission and has been flagged by multiple security engines at the time of this scan.
Share your experience with this website. Was it safe? Did you encounter any issues?