Security Scan Report: bit.ly

Redirected to: https://www.emailmeform.com/builder/form/WnUFuL9aKbzc6t9

Submitted: Mar 29, 2026, 12:28:05 AMCompleted: Mar 29, 2026, 12:29:12 AMpubliccompleted
Loading additional data...

Summary

This website contacted 8 IPs in 1 country across 9 domains to perform 31 HTTP transactions. The main domain is emailmeform.com and was registered NaN years ago.

Submitted URL: https://bit.ly/securemethod

Effective URL: https://www.emailmeform.com/builder/form/WnUFuL9aKbzc6t9Redirected

The Cisco Umbrella rank of the primary domain is #7,359 of the top 1 million websitesTop 10K Site

AI Security Verdict

Confirmed Scam

Confidence: 92%

9
Risk Score

Impersonates AT&T to collect payment data on a third‑party form builder – high‑risk phishing.

Risk Factors
Brand impersonation (AT&T) on a third‑party form service
Payment collection for AT&T on an unrelated domain
Highly obfuscated JavaScript with multiple eval() calls
High‑severity IDS alert indicating unsafe Referrer‑Policy
Domain age information unavailable

Details

Page Title

EmailMe Form - Secure Payment Capture Form (AT&T Order)

Scan Type

public

Language

🇺🇸

English

(80% confidence)

Category

finance banking

(55%)

Domain Information

The domain name 'bit.ly' uses the Libyan country-code top-level domain (.ly) without a subdomain. The registrable portion 'bit' spans 3 characters containing one vowel alongside two consonants. Segmentation suggests 1 word: bit. Expect 3 characters per word on average. No strong language cues emerged from the frequency lists.

Screenshot

Security scan screenshot of https://bit.ly/securemethod

Page Load Overview

1.69s
Total Load Time
31
HTTP Requests
9
Domains
269 KB
Total Size

Language Analysis

Primary Language

🇺🇸English
Code: en
Confidence:80%
Script:Latin
Direction:ltr

Detection Details

Language Code:en
Detection Confidence:80%
Script Type:Latin
HTML Lang Attribute:en
Text Length:3,352 chars
Detector Agreement:100%

Website Classification

Primary Category

finance banking55% confidence
Type: dynamic
Method: ml+structural

All Detected Categories

finance banking
55%
government public service
33%
corporate business
28%
documentation technical
28%

Detected Features

No structural features detected

Domain & IP Information

RequestsIP AddressLocationAS Autonomous System
10104.17.231.29United States
AS13335Cloudflare, Inc.
367.199.248.10United States
AS396982Google LLC
3104.17.230.29United States
AS13335Cloudflare, Inc.
3142.251.140.170United States
AS15169Google LLC
3142.251.140.163United States
AS15169Google LLC
3142.250.186.67United States
AS15169Google LLC
3142.251.20.95United States
AS15169Google LLC
3142.251.153.119United States
AS15169Google LLC
318--

Content Similarity HashesFor malware variant detection

TLSH (Trend Micro Locality Sensitive Hash)

Security-focused

Specialized for malware detection and similarity analysis

T198139510BE58CC2144A70EDE5076836A25FE9742D62298C8FA7D8BF213FDD58E73B154

ssdeep (Context Triggered Piecewise Hashing)

Context-aware

Detects similar content even with modifications

768:b6Gz5TAs0BVZfOow80VLFdH6UQr0gxVUX4gtKEYG:b6Gz5TAs0BVcoUIxVU4gtv

sdhash (Similarity Digest Hashing)

High-precision

High-precision similarity detection for forensic analysis

sdhash:3:42134:mAmQo3KJjOBw9KwzwYPEtEiqNRAAyAyWgFkBLQgQkQJ4IAAxBEOIAkEIAMjAEgT8OAZBSAIgCBAbBkd0EgDR4SlJb1MDKSuA

These hashes enable detection of similar websites and malware variants by comparing content similarity even when exact matches aren't found.

Image Hashes

Perceptual Hashes

Average Hash:c2cefefefefffff7
Perceptual Hash:f774243466667466
Difference Hash:8e1a3a28283a6868
Wavelet Hash:00041c3cf4dcfde5
Color Hash:#e06cbf

Other Hashes

Crop Resistant:8e1a3a28283a6868

Scan History

Scan history not available

Unable to load historical scan data