April 2026 — URLert Research

Which Hosting Providers Harbor the Most Dangerous Websites? An Analysis of 36,000 Domains

April 3, 2026 URLert Research 12 min read

Key Findings

  • Out of 36,033 classified domains, 5,344 (14.8%) were flagged as problematic — either through automated scan verdicts, admin investigations, or classification as potentially malicious.
  • Nearly 38.2% of all standard scans returned a Suspicious or Dangerous verdict.
  • Cloudflare hosts the largest absolute number of problematic domains (2,418), though its scale (11,797 domains) means only 20.5% are flagged.
  • Tencent stands out with 91.6% bad scan rates — the highest among major providers.
  • Scam is the dominant threat category, appearing across 545 problematic domains, followed by phishing (311) and credential harvesting (248).

Methodology

We analyzed 36,033 domain classifications from URLert's database alongside 19,346 completed standard scan results. Each domain was mapped to its hosting provider via ASN (Autonomous System Number) lookups — identifying the infrastructure company serving each domain's traffic.

A domain was considered "problematic" if it met any of three criteria:

  1. Scan verdict: At least one standard scan returned DANGEROUS or SUSPICIOUS (4,192 domains)
  2. Classification: Classified as POTENTIALLY_MALICIOUS by URLert's domain classification system (1,549 domains)
  3. Admin flag: Manually flagged with a WARNING or DANGER admin note (470 domains)

Many domains met multiple criteria simultaneously.


The Verdict Landscape

Across all 19,346 standard scans:

VerdictCount% of Total
Safe11,40058.9%
Suspicious4,95425.6%
Dangerous2,43212.6%
Parked3031.6%
Unknown2571.3%

More than 1 in 3 scanned URLs (38.2%) received a Suspicious or Dangerous verdict, indicating a significant proportion of web traffic encounters potentially harmful content.


ASN Hosts: Who Hosts the Most Problematic Domains?

Across 2,561 unique ASN hosts, the top 30 by number of problematic domains are below.

ASN Risk Explorer: Volume vs. Density

Interact with the data below to see how sorting by density changes the threat landscape compared to sorting by pure volume.

HostPapa
79.5%
TENCENT-NET-AP-CN
41.8%
FranTech Solutions
39.1%
Servers.com, Inc.
28.4%
Namecheap, Inc.
28.3%
Hostinger International
26.2%
ALIBABA US
22.5%
Cloudflare, Inc.
20.5%
DigitalOcean, LLC
17.1%
UNKNOWN
14.7%
OVH SAS
14.4%
Akamai Connected Cloud
14.1%
Microsoft Corporation
10.8%
Google LLC
10.7%
Hetzner Online
10.6%
Google Cloud
10.6%
Amazon.com, Inc.
8.6%
Amazon.com (AES)
7.9%
Fastly, Inc.
6.5%
CLOUDFLARENET (Secondary)
5.0%

Tier 1: Major Infrastructure (100+ problematic domains)

ASN HostTotal DomainsProblematic% ProblematicBad Scans% Bad
Cloudflare11,7972,41820.5%3,45246.5%
Amazon (AWS)3,5663068.6%77639.1%
Hostinger67617726.2%16758.8%
Tencent26811241.8%10991.6%

Tier 2: Significant Presence (30–100 problematic domains)

ASN HostTotal DomainsProblematic% ProblematicBad Scans% Bad
Google Cloud6617010.6%12426.2%
Amazon (AES)825657.9%10131.7%
Namecheap2306528.3%5863.0%
OVH4436414.5%5625.3%
Cloudflare (secondary ASN)1,166585.0%711.7%
Alibaba (US)2275122.5%5265.8%
Google4504810.7%20517.8%
Microsoft4244610.9%12128.7%
DigitalOcean2644517.1%5042.7%
Hetzner3864110.6%5640.9%
Fastly585386.5%8117.0%
Akamai (Linode)2343314.1%2640.6%
HostPapa (ColoCrossing)393179.5%6088.2%

Tier 3: Smaller but Notable (10–29 problematic domains)

ASN HostTotal DomainsProblematic% ProblematicBad Scans% Bad
Servers.com1022928.4%4863.2%
FranTech (Ponynet)642539.1%2374.2%
Cloudflare Spectrum420245.7%2215.7%
Interserver472144.7%2880.0%
Wildcard UK321753.1%2553.2%
IONOS1121614.3%1228.6%
Neon Core Networks241458.3%3196.9%
Akamai (International)388143.6%187.1%
Oracle Cloud981414.3%1742.5%
Team Internet471429.8%844.4%
Antbox Networks (HK)231356.5%18100.0%
GoDaddy671319.4%934.6%

Cloudflare dominates in raw numbers — hosting 2,418 problematic domains — but this is partially a function of its enormous market share (11,797 classified domains). Its 20.5% problematic rate, while concerning, is moderate relative to smaller providers.

Tencent is the most alarming among major providers: 91.6% of all scans for Tencent-hosted domains returned Suspicious or Dangerous verdicts, and 41.8% of its domains are flagged as problematic.

Hostinger and Namecheap — popular budget hosting and domain registration services — show elevated rates at 26.2% and 28.3% problematic respectively, with Namecheap's bad scan rate reaching 63.0%.

A striking pattern emerges in the smaller providers: HostPapa/ColoCrossing (79.5% problematic, 88.2% bad scans), Neon Core Networks (58.3% problematic, 96.9% bad scans), Antbox Networks (56.5% problematic, 100% bad scans), and Interserver (44.7% problematic, 80.0% bad scans) have dramatically higher concentrations of malicious content than the major cloud providers. These smaller hosts appear to serve as preferred infrastructure for threat actors.

The 100% Club: Providers Where Every Scan Is Bad

Among providers with at least 10 scans, the following showed near-perfect bad scan rates:

ASN Host% Bad ScansTotal ScansProblematic DomainsTotal Domains
Antbox Networks (HK)100.0%181323
Shinjiru Technology (MY)100.0%17511
JSC IOT (RU)100.0%10515
Neon Core Networks (US)96.9%321424
IT7 Networks (CA)93.3%30510
Tencent (CN)91.6%119112268
Shock Hosting (US)90.9%1158
Private Layer (CH)90.0%10713
WIBO Baltic (LT)90.0%40615
Zillion Network (US)90.0%1059

These providers — often offshore or privacy-focused hosting companies — appear almost exclusively associated with malicious content, functioning effectively as "bulletproof hosting" for bad actors.

Notably, Tencent is the only major-scale provider in this list, with 268 total domains and 119 scans — far larger than the typical bulletproof host, yet maintaining a 91.6% bad scan rate. The geographic pattern is also striking: Hong Kong, Malaysia, Russia, Switzerland, and Lithuania feature prominently — jurisdictions where takedown enforcement can be challenging.


Threat Categories: What Are the Dangers?

Among problematic domains, the most common threat types detected are:

Threat CategoryDomains Affected
Scam545
Phishing311
Credential Harvesting248
Suspicious Redirect177
Malware122
Privacy Risk91
Tracking13

Scam content is the dominant threat, appearing nearly twice as often as phishing. Credential harvesting — fake login pages designed to steal usernames and passwords — affects 248 domains, often overlapping with phishing campaigns.


Admin-Flagged Domains: Human Intelligence

URLert's security team manually flagged 470 domains with WARNING (245) or DANGER (225) admin notes — representing the most heavily investigated sites.

The hosting distribution of these admin-flagged domains:

ASN HostAdmin-Flagged Domains
Cloudflare257
Amazon (AWS)26
Unknown (no classification)13
Hostinger12
HostPapa (ColoCrossing)11
Google Cloud10
Namecheap7
Amazon (AES)6
WIBO Baltic5
Cloudflare (secondary ASN)5

Cloudflare's dominance here (54.7% of all admin-flagged domains) is notable and disproportionate even relative to its market share. Two operational factors likely drive this concentration:

  1. Scam sites that survive abuse reports: A large share of Cloudflare-flagged domains are scam operations — fake shops, deceptive "investment" platforms, misleading subscription traps — rather than classic phishing or malware. Because these sites don't distribute malware binaries or host credential-harvesting forms in the traditional sense, they often don't violate hosting abuse policies clearly enough to be taken down quickly. They stay online for weeks or months, requiring the security team to manually flag them each time they resurface in user submissions.
  2. Anti-bot shielding obscures automated detection: Cloudflare's bot protection — designed to defend legitimate sites — inadvertently shields malicious actors as well. When automated scanners are blocked by challenge pages, URLert's security team must manually review and flag these domains, inflating the admin-flagged count relative to providers without similar protections.

These factors compound: threat actors deliberately leverage Cloudflare's free tier, DDoS protection, and domain proxying capabilities to obscure their origin servers — while the platform's own defenses make it harder for security tools to automatically classify the threats hiding behind them.

WIBO Baltic (Lithuania) is noteworthy as a small provider with only 15 total domains yet 5 admin-flagged — a 33% manual flag rate, indicating concentrated human-verified malicious activity.


The Worst Individual Domains

The top individual domains generating the most bad scans:

DomainHostBad ScansTotal ScansThreats
shrinkme.clickCloudflare247248Scam, Suspicious redirect
nowplaytoc.comCloudflare105105Suspicious redirect, Tracking
google.comGoogle82364Credential harvesting, Phishing, Scam
t.coCloudflare69125Multiple threat categories
tinyurl.comCloudflare4668Credential harvesting, Phishing, Scam
ln.runCloudflare4290Phishing, Scam, Suspicious redirect
t.meTelegram38149Scam
is.gdCloudflare3646Credential harvesting, Phishing, Scam
bit.lyGoogle Cloud3266Phishing, Scam, Suspicious redirect
share.googleGoogle3292Phishing, Scam, Suspicious redirect
ey43.comCloudflare3232Credential harvesting, Phishing
outlook.comMicrosoft2980Credential harvesting, Malware, Phishing, Scam
blogspot.comGoogle28106Credential harvesting, Malware, Phishing, Scam
roblox.com.geWIBO Baltic2626Credential harvesting, Phishing, Scam

Patterns in the Top Individual Domains

Dedicated malicious domains like shrinkme.click (99.6%), nowplaytoc.com (100%), and ey43.com (100%) are purpose-built for malicious activity — scam operations and redirect chains.

URL shorteners are heavily abused: tinyurl.com, ln.run, is.gd, and bit.ly all appear in the top results. These services mask destination URLs, making them ideal vectors for distributing phishing and scam links. Of 68 total scans for tinyurl.com, 46 (67.6%) were bad.

Major platforms like google.com, t.co, t.me, outlook.com, and blogspot.com appear due to user-generated content — the scanned URLs are paths within these domains that lead to phishing or scam content, not the platforms themselves. Telegram (t.me) is notable: while only 25.5% of its scans return bad verdicts, it still ranks 8th by absolute bad scan count (38), confirming its role as a distribution channel for scam content.

roblox.com.ge is a typosquatting domain impersonating Roblox, hosted on WIBO Baltic (Lithuania) — every single scan (26/26) returned a bad verdict, flagged for credential harvesting and phishing targeting young gamers.


Conclusions

  1. Scale ≠ safety: Large providers like Cloudflare and Amazon host the most problematic domains in absolute terms, but their scale means the rate is moderate (8–20%). The real outliers are mid-tier and niche providers with 60–100% bad scan rates.
  2. A clear three-tier risk model: Major cloud providers (Google, AWS, Microsoft) cluster around 8–11% problematic rates. Budget hosts (Hostinger, Namecheap, DigitalOcean) run 17–28%. Niche/offshore providers (HostPapa, Interserver, FranTech, Neon Core, Antbox) hit 40–80%+ — a strong signal for automated risk scoring.
  3. Budget hosting attracts bad actors: Hostinger (26.2% problematic), Namecheap (28.3%), and Alibaba US (22.5%) — known for low-cost hosting and domain registration — show significantly elevated rates compared to premium cloud providers.
  4. Offshore hosting remains a haven: Providers like Antbox Networks (Hong Kong), Shinjiru (Malaysia), JSC IOT (Russia), Private Layer (Switzerland), and WIBO Baltic (Lithuania) show 90–100% bad scan rates, functioning as de facto bulletproof hosting. The jurisdictional diversity makes coordinated takedowns difficult.
  5. Tencent is a red flag: With 91.6% of scans returning bad verdicts across 119 scans and 268 domains, Tencent-hosted domains should be treated with high suspicion by URL safety systems. This is unprecedented for a provider of its scale.
  6. URL shorteners are a major attack surface: Several of the worst individual domains are URL shorteners (tinyurl.com, ln.run, is.gd, bit.ly, shrinkme.click). Link obfuscation remains the primary distribution method for phishing and scam campaigns.
  7. Scam surpasses phishing: Scam content (545 domains) is now nearly twice as prevalent as traditional phishing (311), suggesting a shift in threat actor tactics toward broader social engineering rather than targeted credential theft.
  8. Cloudflare's admin-flag concentration: While Cloudflare hosts 20.5% of problematic domains overall, it hosts 54.7% of all admin-flagged domains — a disproportionate share that suggests threat actors deliberately leverage Cloudflare's free tier and proxy capabilities to obscure their infrastructure.

Data collected April 3, 2026. Analysis covers 36,033 domain classifications and 19,346 standard scan results from URLert's production database. Domain classifications use eTLD+1 (registered domain) granularity. ASN hosting provider is determined via BGP routing table lookups from RouteViews.