AMP
AMP (Accelerated Mobile Pages) is a Google-backed framework for building fast-loading, heavily constrained mobile pages, often served from Google’s AMP cache. ScanMalware detects it from the amp HTML attribute and the AMP runtime script.
AMP pages run a restricted subset of HTML and JavaScript, which limits some client-side abuse, but AMP has also been used to lend phishing pages a fast, Google-adjacent appearance — so the verdict still depends on the scanned content.
Commonly deployed alongside AMP
Of the 1,424 public scans where AMP was detected, these are the technologies most often present on the same site. The share is the percentage of AMP sites that also ran each one.
| Technology | Category | Share of AMP sites |
|---|---|---|
| Open-Graph-Protocol | miscellaneous | 81.47% |
| Cloudflare | wappalyzer | 57.75% |
| jQuery | wappalyzer | 56.49% |
| X-UA-Compatible | miscellaneous | 56.21% |
| Cloudflare Bot Management | wappalyzer | 55.02% |
| HTTP/3 | wappalyzer | 49.89% |
| JQuery | miscellaneous | 47.72% |
| HSTS | wappalyzer | 42.88% |
| PoweredBy | miscellaneous | 38.74% |
| Google Analytics | wappalyzer | 37.61% |
| PasswordField | miscellaneous | 34.18% |
| Google Tag Manager | wappalyzer | 29.05% |
| Microsoft ASP.NET | wappalyzer | 28.98% |
| Meta-Geo | miscellaneous | 28.56% |
How ScanMalware detects AMP
AMP is detected by analysing the response headers, HTML markup, JavaScript runtime and asset URLs captured when ScanMalware loads the site in a real headless browser.
From any scan you can pivot into related signals — JARM TLS fingerprints, ASN ownership and BGP routing, certificate history, JavaScript analysis and the overall security verdict — to understand not just that AMP is present, but how it is being used. Open the full search interface for AMP →
Recent public scans featuring AMP
A rolling sample of recent public scans where AMP was detected. Listing a site here is not a safety judgement — open a scan to see its full verdict.
| Site | Scanned |
|---|---|
| Snow Rider https://snow-rider.io | 2026-05-17 |
| Best Fuel Discounts for Truckers - Mudflap https://mudflapinc.com | 2026-05-17 |
| Login | Qualtrics https://zn1mdx3zmq39jkigz-marriott.siteintercept.qualtrics.com | 2026-05-17 |
| Naga138 : valbergtrail Trial Gratis Tanpa Ada Biaya Pasti Berhasil https://www.valbergtrail.com/ | 2026-05-16 |
| High School, College & Olympic Wrestling Videos, News, Rankings, Software & more https://www.trackwrestling.com | 2026-05-16 |
| Subscription preferences https://hs-21065354.s.hubspotemail.net/hs/preferences-center/en/page?data=W2nXS-N30h-FXW3J… | 2026-05-16 |
| http://21065354.hs-sites.com/-temporary-slug-44cc2d18-1645-4d6b-a4b1-0f90b0cb0060 | 2026-05-16 |
| Deque University: Web Accessibility Training and Courses https://dequeuniversity.com | 2026-05-16 |
Frequently asked questions about AMP
- Does using AMP mean a website is unsafe?
- No. AMP is a stack component, not a verdict. ScanMalware scores the whole page — its scripts, redirects, certificates, threat-intelligence matches and behaviour — so a site using AMP can be perfectly safe or actively malicious.
- How many sites using AMP has ScanMalware scanned?
- AMP has been detected in 1,424 public scans on ScanMalware.com. Each scan is a real headless-browser visit, and the figure updates as new URLs are submitted.
- What technologies are commonly used with AMP?
- Across scanned sites, AMP is most often seen alongside Open-Graph-Protocol, Cloudflare and jQuery. The full co-occurrence breakdown is listed on this page.
Browse all profiled technologies on the technology index, or scan a URL to see its full stack.