ZeroSSL ECC Domain Secure Site CA
What is ZeroSSL ECC Domain Secure Site CA?
Free DV TLS from ZeroSSL's hosted signup and ACME endpoints. Popular with WordPress plugins and shared-hosting control panels. Operated by Sectigo on behalf of ZeroSSL. Same trust chain as Sectigo's direct customers.
Suspicious sites — confidence is not always 100%. Use for Threat Hunting or watchlists.
| Last check (UTC) | First seen (UTC) ▾ | URL | Screenshot | Flags | Details |
|---|---|---|---|---|---|
| 2026-05-21 07:30 | 2026-05-17 00:03 | ![]() |
OpenPhish urlscan | Details | |
| 2026-05-21 07:30 | 2026-05-15 13:01 | ![]() |
OpenPhish | Details | |
| 2026-05-21 07:30 | 2026-04-30 21:00 | ![]() |
PhishTank urlscan | Details | |
| 2026-05-21 07:30 | 2026-04-30 21:00 | ![]() |
PhishTank urlscan | Details | |
| 2026-05-21 07:30 | 2026-04-30 01:01 | ![]() |
OpenPhish urlscan | Details | |
| 2026-05-21 07:30 | 2026-04-28 13:01 | ![]() |
OpenPhish | Details | |
| 2026-05-21 07:30 | 2026-04-20 01:01 | ![]() |
OpenPhish | Details |
Suspicious sites — confidence is not always 100%. Use for Threat Hunting or watchlists.
| URL | Screenshot | Flags | Details |
|---|---|---|---|
| http://microsoft365xx1.iceiy.… | ![]() |
OpenPhish urlscan | Details |
| http://reactivar-outlook365.i… | ![]() |
OpenPhish | Details |
| https://verificarmicuentaa-mi… | ![]() |
PhishTank urlscan | Details |
| https://verificarmicuentaa-mi… | ![]() |
PhishTank urlscan | Details |
| http://verificarmicuentaa-mic… | ![]() |
OpenPhish urlscan | Details |
| https://spotify-konto-gesperr… | ![]() |
OpenPhish | Details |
| http://reactivar-microsoft-li… | ![]() |
OpenPhish | Details |
Brands most often impersonated with ZeroSSL ECC Domain Secure Site CA
Among the active sites currently using a ZeroSSL ECC Domain Secure Site CA certificate, these are the brands attackers are mimicking most:
Frequently asked questions about ZeroSSL ECC Domain Secure Site CA
What is ZeroSSL ECC Domain Secure Site CA?
ZeroSSL ECC Domain Secure Site CA is a publicly trusted intermediate certificate authority operated by ZeroSSL / Sectigo and chained to USERTrust ECC Certification Authority. It is recognized by all mainstream browsers and operating system trust stores, so the certificate itself is not a phishing indicator - the same intermediate signs millions of legitimate sites. phishunt only flags the specific domains listed below as suspicious; ZeroSSL ECC Domain Secure Site CA as a CA is fine.
Is ZeroSSL ECC Domain Secure Site CA a legitimate certificate authority?
Yes. ZeroSSL ECC Domain Secure Site CA is a publicly trusted intermediate CA operated by ZeroSSL / Sectigo, included in the Microsoft, Apple, Google and Mozilla root trust stores. Every mainstream browser automatically accepts certificates it signs. The intermediate itself is not a phishing signal — what matters is the specific domain. phishunt flags only the suspicious domains listed below; ZeroSSL ECC Domain Secure Site CA keeps signing millions of legitimate sites.
Who runs the ZeroSSL ECC Domain Secure Site CA certificate authority?
ZeroSSL ECC Domain Secure Site CA is operated by ZeroSSL / Sectigo. It is a ECDSA intermediate that chains up to the USERTrust ECC Certification Authority root, which ZeroSSL / Sectigo also owns. Anyone can look up the chain in the public Certificate Transparency logs; the same operator publishes a Certificate Policy / Certification Practice Statement (CP/CPS) describing how issuance and revocation work.
What does ZeroSSL ECC Domain Secure Site CA mean when my browser shows it as the issuer?
When a browser shows ZeroSSL ECC Domain Secure Site CA as the certificate issuer for a site, it means TLS was validated through ZeroSSL / Sectigo's ECDSA chain ending at USERTrust ECC Certification Authority. That is normal for tens of millions of legitimate sites that use ZeroSSL / Sectigo's automated DV TLS. The certificate proves the connection is encrypted and that the certificate matches the hostname — it does not prove the site behind it is trustworthy. Always verify the domain name itself.
Why does ZeroSSL ECC Domain Secure Site CA show up on phishing sites?
ZeroSSL / Sectigo issues ECDSA domain-validated certificates automatically and at no cost (or very low cost), which is the exact workflow scammers need to put HTTPS on a throwaway domain. Domain validation only proves that the requester controls the domain name, not that the site behind it is trustworthy. phishunt lists the specific domains currently flagged below — those are the suspicious ones, not ZeroSSL ECC Domain Secure Site CA itself.
How do I verify a certificate issued by ZeroSSL ECC Domain Secure Site CA?
In a desktop browser, click the padlock in the address bar and open the certificate viewer. Confirm the issuer chain ends at USERTrust ECC Certification Authority, that the subject matches the domain you expect, and that the notAfter date has not passed. A valid ZeroSSL ECC Domain Secure Site CA certificate only proves TLS was negotiated correctly — always verify the domain name itself belongs to the service you intended to visit.
What is the difference between ZeroSSL ECC Domain Secure Site CA and ZeroSSL RSA Domain Secure Site CA?
ZeroSSL ECC Domain Secure Site CA and its siblings (ZeroSSL RSA Domain Secure Site CA) share the same operator (ZeroSSL / Sectigo) and roll up to the same root (USERTrust ECC Certification Authority). CAs rotate multiple intermediates so that if one key ever has to be revoked, the damage is contained. As a user, you can treat all of them as the same trust anchor.






