Telega.info is identified as the backend infrastructure for a malicious application that performs Man-in-the-Middle (MITM) attacks. It reroutes traffic from legitimate Telegram servers to intercept and decrypt user communications.
telega.info
Potentially Malicious High Traffic Tranco #19,144
Safety RecommendationHigh Risk Detected: Our security engines have flagged this site for malicious behavior, such as brand impersonation or phishing.
Bitdefender Total Security includes advanced anti-phishing that detects and blocks these threats automatically, protecting your passwords and personal data.
Get Bitdefender Affiliate link
Safety RecommendationHigh Risk Detected: Our security engines have flagged this site for malicious behavior, such as brand impersonation or phishing.
Bitdefender Total Security includes advanced anti-phishing that detects and blocks these threats automatically, protecting your passwords and personal data.
Get Bitdefender Total Security Affiliate link — we may earn a commission if you purchase.
Community Intelligence
0/20+
Messages are published to the community portal.
Investigate a specific URL
Recent Threat Analysis
URLert analyzed recent scan activity for telega.info and found 4 results.
| Status | Target URL | Type | Time |
|---|---|---|---|
| Clean | https://api.telega.info/v1/dc-proxy | 1d ago | |
| Safe | https://api.telega.info/v1/dc-proxy | 3d ago | |
| Suspicious | https://api.telega.info/v1/dc-proxy | 3d ago |
Network Infrastructure
Historical and current IP address mappings for this domain.
| IP Address / Infrastructure | Status | Subdomains | Last Seen |
|---|---|---|---|
YandexCloud Yandex.Cloud LLC (AS200350) | Active | api.telega.info | 1 day ago |
51.250.70.84
YandexCloud Yandex.Cloud LLC (AS200350)
Active
api.telega.info
Seen 1 day ago
Related Security Guides
Learn about common risks for this type of website
Something wrong?
Developer API
Integrate Domain Intelligence
Access this classification data programmatically via our API.
GET /api/v1/classify?domain=telega.info
{
"domain": "telega.info",
"confidence": "high",
"category": {
"purpose": "potentially_malicious",
"specialization": "Malicious Traffic Interception"
},
"identity": {
"headline": "Malicious infrastructure used for Telegram traffic interception",
"summary": "Telega.info is identified as the backend infrastructure for a malicious application that performs Man-in-the-Middle (MITM) attacks. It reroutes traffic from legitimate Telegram servers to intercept and decrypt user communications.",
"operator": "AO TELEGA",
"parent_entity": null,
"topics": [
"malware",
"mitm attack",
"security threat",
"telegram",
"data interception"
]
},
"functions": {
"is_ugc_platform": false,
"is_file_host": false,
"is_url_shortener": false,
"is_public_idp": false,
"is_crypto_platform": false,
"allows_user_subdomains": false,
"is_form_builder": false,
"is_document_host": false
},
"facts": {
"registered_date": "2025-02-16T15:15:36.106000Z",
"rank": 19144,
"hosting_provider": "YandexCloud Yandex.Cloud LLC"
}
}