Telega.info is identified as the backend infrastructure for a malicious application that performs Man-in-the-Middle (MITM) attacks. It reroutes traffic from legitimate Telegram servers to intercept and decrypt user communications.
api.telega.info
Potentially Malicious High Traffic Tranco #19,144
Safety RecommendationHigh Risk Detected: Our security engines have flagged this site for malicious behavior, such as brand impersonation or phishing.
Bitdefender Total Security includes advanced anti-phishing that detects and blocks these threats automatically, protecting your passwords and personal data.
Get Bitdefender Affiliate link
Safety RecommendationHigh Risk Detected: Our security engines have flagged this site for malicious behavior, such as brand impersonation or phishing.
Bitdefender Total Security includes advanced anti-phishing that detects and blocks these threats automatically, protecting your passwords and personal data.
Get Bitdefender Total Security Affiliate link — we may earn a commission if you purchase.
Community Intelligence
0/20+
Messages are published to the community portal.
Investigate a specific URL
Recent Threat Analysis
URLert analyzed recent scan activity for api.telega.info and found 4 results.
| Status | Target URL | Type | Time |
|---|---|---|---|
| Clean | https://api.telega.info/v1/dc-proxy | 1d ago | |
| Safe | https://api.telega.info/v1/dc-proxy | 3d ago | |
| Suspicious | https://api.telega.info/v1/dc-proxy | 3d ago |
Network Infrastructure
Historical and current IP address mappings for this domain.
| IP Address / Infrastructure | Status | Subdomains | Last Seen |
|---|---|---|---|
YandexCloud Yandex.Cloud LLC (AS200350) | Active | api.telega.info | Today |
51.250.70.84
YandexCloud Yandex.Cloud LLC (AS200350)
Active
api.telega.info
Seen Today
Related Security Guides
Learn about common risks for this type of website
Something wrong?
Developer API
Integrate Domain Intelligence
Access this classification data programmatically via our API.
GET /api/v1/classify?domain=api.telega.info
{
"domain": "telega.info",
"confidence": "high",
"category": {
"purpose": "potentially_malicious",
"specialization": "Malicious Traffic Interception"
},
"identity": {
"headline": "Malicious infrastructure used for Telegram traffic interception",
"summary": "Telega.info is identified as the backend infrastructure for a malicious application that performs Man-in-the-Middle (MITM) attacks. It reroutes traffic from legitimate Telegram servers to intercept and decrypt user communications.",
"operator": "AO TELEGA",
"parent_entity": null,
"topics": [
"malware",
"mitm attack",
"security threat",
"telegram",
"data interception"
]
},
"functions": {
"is_ugc_platform": false,
"is_file_host": false,
"is_url_shortener": false,
"is_public_idp": false,
"is_crypto_platform": false,
"allows_user_subdomains": false,
"is_form_builder": false,
"is_document_host": false
},
"facts": {
"registered_date": "2025-02-16T15:15:36.106000Z",
"rank": 19144,
"hosting_provider": "YandexCloud Yandex.Cloud LLC"
}
}