vsyp8r3xp1vsyp8r3xp1vsyp8r3xp1vsyp8r3xp.trump.viabilitygap[.]fund
Category: Business, Economy, Phishing
To use full-featured product, you have to purchase a license for Combo Cleaner. Limited seven days free trial available. Combo Cleaner is owned and operated by RCS LT, the parent company of PCRisk.com.
Quttera Web Malware Removal is a paid subscription service. Pricing, plans, and trial availability are set by Quttera. Quttera is operated by Quttera Ltd, an independent third-party company unrelated to RCS LT. PCRisk.com may earn a referral commission when users sign up through this link.
Description of vsyp8r3xp1vsyp8r3xp1vsyp8r3xp1vsyp8r3xp.trump.viabilitygap[.]fund
This domain appears to host a very minimal web server directory listing rather than a finished public-facing website. The screenshot shows a plain "Index of /" page with a single visible cgi-bin directory, which commonly indicates default server configuration, exposed directory indexing, or an incompletely configured hosting environment.
Based on the domain structure and available categorization data, the site may be associated with financial or business-themed targeting, but the visible content does not present a legitimate business homepage, branding, or operator identity. No clear ownership, company details, or service description are visible from the page content provided, so the actual purpose of the site cannot be verified from the screenshot alone.
Safety Assessment for vsyp8r3xp1vsyp8r3xp1vsyp8r3xp1vsyp8r3xp.trump.viabilitygap[.]fund
The scan results show mixed but concerning signals. One out of 92 security engines flagged the domain, and one major threat database listed it for social engineering at the time of this scan. In addition, the domain was categorized by available classifiers as phishing and financial-data-related, which raises the possibility that it may be intended for deceptive or credential-harvesting activity even though the visible page is currently sparse.
The malware scan did not identify a named malware family, but it did mark the index page as suspicious. The screenshot itself shows only a directory listing, which is not inherently malicious, yet exposed directory indexes on obscure subdomains can sometimes be used as temporary staging locations, abandoned phishing infrastructure, or misconfigured hosting. The lack of normal website content, the unusual autogenerated-looking subdomain, and the social-engineering listing together increase uncertainty.
Based on these findings, this website may pose potential risks to visitors.
Technical Description
The domain uses a valid Let's Encrypt SSL certificate with expiry in August 2026, and it resolves to infrastructure hosted on Microsoft Azure in Pune, India. Nameservers point to A2 Hosting, suggesting a split setup where DNS and hosting-related services may involve multiple providers. The site is not ranked in Tranco, which is consistent with a low-traffic or non-public-facing host.
DNSSEC appears to be unsigned, and the visible web response exposes directory indexing at the root path. That kind of configuration may indicate weak hardening or an unfinished deployment. No iframe-related issues were reported, and blacklist checks were otherwise mostly clean, but the social-engineering listing and suspicious page assessment remain notable technical concerns at the time of this scan.
Share your experience with this website. Was it safe? Did you encounter any issues?