This domain is used as a landing page to trick users into downloading malicious files under the guise of an invitation. It employs social engineering tactics to encourage execution on Windows systems.
velrion.cfd
Potentially Malicious Unranked
Safety RecommendationHigh Risk Detected: Our security engines have flagged this site for malicious behavior, such as brand impersonation or phishing.
Bitdefender Total Security includes advanced anti-phishing that detects and blocks these threats automatically, protecting your passwords and personal data.
Get Bitdefender Affiliate link
Safety RecommendationHigh Risk Detected: Our security engines have flagged this site for malicious behavior, such as brand impersonation or phishing.
Bitdefender Total Security includes advanced anti-phishing that detects and blocks these threats automatically, protecting your passwords and personal data.
Get Bitdefender Total Security Affiliate link — we may earn a commission if you purchase.
Community Intelligence
0/20+
Messages are published to the community portal.
Investigate a specific URL
Recent Threat Analysis
URLert analyzed recent scan activity for velrion.cfd and found 1 result.
| Status | Target URL | Type | Time |
|---|---|---|---|
| Suspicious | https://velrion.cfd/invite/ | 13h ago |
Network Infrastructure
Historical and current IP address mappings for this domain.
| IP Address / Infrastructure | Status | Subdomains | Last Seen |
|---|---|---|---|
CLOUDFLARENET - Cloudflare, Inc. (AS13335) | Active | velrion.cfd | Today |
CLOUDFLARENET - Cloudflare, Inc. (AS13335) | Active | velrion.cfd | Today |
104.21.47.30
CLOUDFLARENET - Cloudflare, Inc. (AS13335)
Active
velrion.cfd
Seen Today
172.67.144.42
CLOUDFLARENET - Cloudflare, Inc. (AS13335)
Active
velrion.cfd
Seen Today
Something wrong?
Developer API
Integrate Domain Intelligence
Access this classification data programmatically via our API.
GET /api/v1/classify?domain=velrion.cfd
{
"domain": "velrion.cfd",
"confidence": "high",
"category": {
"purpose": "potentially_malicious",
"specialization": "Malware delivery"
},
"identity": {
"headline": "Malicious file delivery landing page",
"summary": "This domain is used as a landing page to trick users into downloading malicious files under the guise of an invitation. It employs social engineering tactics to encourage execution on Windows systems.",
"operator": null,
"parent_entity": null,
"topics": [
"malware",
"social engineering",
"phishing",
"threat"
]
},
"functions": {
"is_ugc_platform": false,
"is_file_host": false,
"is_url_shortener": false,
"is_public_idp": false,
"is_crypto_platform": false,
"allows_user_subdomains": false,
"is_form_builder": false,
"is_document_host": false
},
"facts": {
"registered_date": "2026-02-26T15:37:14Z",
"rank": null,
"hosting_provider": "CLOUDFLARENET - Cloudflare, Inc."
}
}