Statistics

ZeroSSL ECC Domain Secure Site CA

URLs
7
Brands targeted
2
Unique IPs
5

What is ZeroSSL ECC Domain Secure Site CA?

ZeroSSL / Sectigo ECDSA since 2020 chains to USERTrust ECC Certification Authority

Free DV TLS from ZeroSSL's hosted signup and ACME endpoints. Popular with WordPress plugins and shared-hosting control panels. Operated by Sectigo on behalf of ZeroSSL. Same trust chain as Sectigo's direct customers.

Suspicious sites — confidence is not always 100%. Use for Threat Hunting or watchlists.

Last check (UTC) First seen (UTC) URL Screenshot Flags Details
2026-05-21 07:30 2026-05-17 00:03
http://microsoft365xx1.iceiy.com
Screenshot of microsoft365xx1.iceiy.com OpenPhish urlscan Details
2026-05-21 07:30 2026-05-15 13:01
http://reactivar-outlook365.iceiy.com
Screenshot of reactivar-outlook365.iceiy.com OpenPhish Details
2026-05-21 07:30 2026-04-30 21:00
https://verificarmicuentaa-microsoft2o26.zya.me
Screenshot of verificarmicuentaa-microsoft2o26.zya.me PhishTank urlscan Details
2026-05-21 07:30 2026-04-30 21:00
https://verificarmicuentaa-microsoft2o26.zya.me/?i=1
Screenshot of verificarmicuentaa-microsoft2o26.zya.me PhishTank urlscan Details
2026-05-21 07:30 2026-04-30 01:01
http://verificarmicuentaa-microsoft2o26.zya.me/?i=1
Screenshot of verificarmicuentaa-microsoft2o26.zya.me OpenPhish urlscan Details
2026-05-21 07:30 2026-04-28 13:01
https://spotify-konto-gesperrt.page.gd/?i=1
Screenshot of spotify-konto-gesperrt.page.gd OpenPhish Details
2026-05-21 07:30 2026-04-20 01:01
http://reactivar-microsoft-live.iceiy.com
Screenshot of reactivar-microsoft-live.iceiy.com OpenPhish Details

Suspicious sites — confidence is not always 100%. Use for Threat Hunting or watchlists.

URL Screenshot Flags Details
http://microsoft365xx1.iceiy.… Screenshot of microsoft365xx1.iceiy.com OpenPhish urlscan Details
http://reactivar-outlook365.i… Screenshot of reactivar-outlook365.iceiy.com OpenPhish Details
https://verificarmicuentaa-mi… Screenshot of verificarmicuentaa-microsoft2o26.zya.me PhishTank urlscan Details
https://verificarmicuentaa-mi… Screenshot of verificarmicuentaa-microsoft2o26.zya.me PhishTank urlscan Details
http://verificarmicuentaa-mic… Screenshot of verificarmicuentaa-microsoft2o26.zya.me OpenPhish urlscan Details
https://spotify-konto-gesperr… Screenshot of spotify-konto-gesperrt.page.gd OpenPhish Details
http://reactivar-microsoft-li… Screenshot of reactivar-microsoft-live.iceiy.com OpenPhish Details

Brands most often impersonated with ZeroSSL ECC Domain Secure Site CA

Among the active sites currently using a ZeroSSL ECC Domain Secure Site CA certificate, these are the brands attackers are mimicking most:

Frequently asked questions about ZeroSSL ECC Domain Secure Site CA

What is ZeroSSL ECC Domain Secure Site CA?

ZeroSSL ECC Domain Secure Site CA is a publicly trusted intermediate certificate authority operated by ZeroSSL / Sectigo and chained to USERTrust ECC Certification Authority. It is recognized by all mainstream browsers and operating system trust stores, so the certificate itself is not a phishing indicator - the same intermediate signs millions of legitimate sites. phishunt only flags the specific domains listed below as suspicious; ZeroSSL ECC Domain Secure Site CA as a CA is fine.

Is ZeroSSL ECC Domain Secure Site CA a legitimate certificate authority?

Yes. ZeroSSL ECC Domain Secure Site CA is a publicly trusted intermediate CA operated by ZeroSSL / Sectigo, included in the Microsoft, Apple, Google and Mozilla root trust stores. Every mainstream browser automatically accepts certificates it signs. The intermediate itself is not a phishing signal — what matters is the specific domain. phishunt flags only the suspicious domains listed below; ZeroSSL ECC Domain Secure Site CA keeps signing millions of legitimate sites.

Who runs the ZeroSSL ECC Domain Secure Site CA certificate authority?

ZeroSSL ECC Domain Secure Site CA is operated by ZeroSSL / Sectigo. It is a ECDSA intermediate that chains up to the USERTrust ECC Certification Authority root, which ZeroSSL / Sectigo also owns. Anyone can look up the chain in the public Certificate Transparency logs; the same operator publishes a Certificate Policy / Certification Practice Statement (CP/CPS) describing how issuance and revocation work.

What does ZeroSSL ECC Domain Secure Site CA mean when my browser shows it as the issuer?

When a browser shows ZeroSSL ECC Domain Secure Site CA as the certificate issuer for a site, it means TLS was validated through ZeroSSL / Sectigo's ECDSA chain ending at USERTrust ECC Certification Authority. That is normal for tens of millions of legitimate sites that use ZeroSSL / Sectigo's automated DV TLS. The certificate proves the connection is encrypted and that the certificate matches the hostname — it does not prove the site behind it is trustworthy. Always verify the domain name itself.

Why does ZeroSSL ECC Domain Secure Site CA show up on phishing sites?

ZeroSSL / Sectigo issues ECDSA domain-validated certificates automatically and at no cost (or very low cost), which is the exact workflow scammers need to put HTTPS on a throwaway domain. Domain validation only proves that the requester controls the domain name, not that the site behind it is trustworthy. phishunt lists the specific domains currently flagged below — those are the suspicious ones, not ZeroSSL ECC Domain Secure Site CA itself.

How do I verify a certificate issued by ZeroSSL ECC Domain Secure Site CA?

In a desktop browser, click the padlock in the address bar and open the certificate viewer. Confirm the issuer chain ends at USERTrust ECC Certification Authority, that the subject matches the domain you expect, and that the notAfter date has not passed. A valid ZeroSSL ECC Domain Secure Site CA certificate only proves TLS was negotiated correctly — always verify the domain name itself belongs to the service you intended to visit.

What is the difference between ZeroSSL ECC Domain Secure Site CA and ZeroSSL RSA Domain Secure Site CA?

ZeroSSL ECC Domain Secure Site CA and its siblings (ZeroSSL RSA Domain Secure Site CA) share the same operator (ZeroSSL / Sectigo) and roll up to the same root (USERTrust ECC Certification Authority). CAs rotate multiple intermediates so that if one key ever has to be revoked, the damage is contained. As a user, you can treat all of them as the same trust anchor.