Security Scan Report: bit.ly

Redirected to: https://www.emailmeform.com/builder/form/WnUFuL9aKbzc6t9

Submitted: Apr 1, 2026, 8:20:01 PMCompleted: Apr 1, 2026, 8:21:39 PMpubliccompleted
Loading additional data...

Summary

This website contacted 4 IPs in 1 country across 8 domains to perform 11 HTTP transactions. The main domain is emailmeform.com and was registered NaN years ago.

Submitted URL: https://bit.ly/securemethod

Effective URL: https://www.emailmeform.com/builder/form/WnUFuL9aKbzc6t9Redirected

The Cisco Umbrella rank of the primary domain is #7,359 of the top 1 million websitesTop 10K Site

AI Security Verdict

Confirmed Scam

Confidence: 92%

9
Risk Score

Impersonates AT&T to collect payment data on a third‑party form builder – high‑risk phishing.

Risk Factors
Brand impersonation (AT&T) on a third‑party form service
Payment collection for AT&T on an unrelated domain
Highly obfuscated JavaScript with multiple eval() calls
High‑severity IDS alert indicating unsafe Referrer‑Policy
Domain age information unavailable

Details

Page Title

EmailMe Form - Secure Payment Capture Form (AT&T Order)

Scan Type

public

Language

🇺🇸

English

(80% confidence)

Category

finance banking

(69%)

Domain Information

Domain 'bit.ly' uses the Libyan country-code top-level domain (.ly) while skipping any subdomain. Count 3 characters in 'bit' split between 1 vowel and 2 consonants. It segments into one word: bit. No strong language cues emerged from the frequency lists.

Screenshot

Security scan screenshot of https://bit.ly/securemethod

Page Load Overview

1.45s
Total Load Time
11
HTTP Requests
8
Domains
261 KB
Total Size

Language Analysis

Primary Language

🇺🇸English
Code: en
Confidence:80%
Script:Latin
Direction:ltr

Detection Details

Language Code:en
Detection Confidence:80%
Script Type:Latin
HTML Lang Attribute:en
Text Length:96 chars
Detector Agreement:100%

Website Classification

Primary Category

finance banking69% confidence
Type: dynamic
Method: ml+structural

All Detected Categories

finance banking
69%
technology software
40%
documentation technical
39%
healthcare medical
38%
government public service
34%

Detected Features

No structural features detected

Domain & IP Information

RequestsIP AddressLocationAS Autonomous System
5142.251.14.95United States
AS15169Google LLC
2142.251.110.97United States
AS15169Google LLC
267.199.248.11United States
AS396982Google LLC
2104.17.230.29United States
AS13335Cloudflare, Inc.
114--

Content Similarity HashesFor malware variant detection

TLSH (Trend Micro Locality Sensitive Hash)

Security-focused

Specialized for malware detection and similarity analysis

T10A51216F4D4BC96653714AC7F17BF628D042E11E9A41CCC4B9EC45A82FA4F9B8811BAC

ssdeep (Context Triggered Piecewise Hashing)

Context-aware

Detects similar content even with modifications

24:hv+zVl3xzSspxw2RKLJxJt8dSNVvPdKDt20dqTlovPt8dUINVvPdAt20dqTDPoH6:d+zpvROJsEVKDt2aFk/VAt2amvmH6x8U

sdhash (Similarity Digest Hashing)

High-precision

High-precision similarity detection for forensic analysis

sdhash:3:2460:GBEAAAAwAAIAAAAQAAAAAiJAIFAkAEAYAogAQAAAAAYACAAIgEAEAABMABAACAcQAAAAQAIAKCAACAQAQQwAAAAAoAAAAQBA

These hashes enable detection of similar websites and malware variants by comparing content similarity even when exact matches aren't found.

Image Hashes

Perceptual Hashes

Average Hash:c3c3ffffffffffff
Perceptual Hash:e666666626999999
Difference Hash:0c0c000000000000
Wavelet Hash:03030f0ff0f0f0f0
Color Hash:#d28879

Other Hashes

Crop Resistant:0c0c000000000000

Scan History

Scan history not available

Unable to load historical scan data