Suspicious

Phishings targeting Zelle

Suspicious and active websites


Phishings targeting Zelle

Suspicious and active websites


Active
1
New (7d)
0
Trend (7d)
About
AIUS bank-rail P2P target. Phishing usually pivots through the victim's bank login since Zelle is embedded inside US retail banking apps rather than a standalone account.
Countries
United StatesUnited States (1)

Suspicious sites — confidence is not always 100%. Use for Threat Hunting or watchlists.

Last check (UTC) First seen (UTC) URL Screenshot Flags Details
2026-05-22 13:30 2026-05-01 21:31
https://zelleria.shop
Screenshot of zelleria.shop urlscan Details

Suspicious sites — confidence is not always 100%. Use for Threat Hunting or watchlists.

URL Screenshot Details
https://zelleria.shop
urlscan
Screenshot of zelleria.shop Details

AIHow to verify a real Zelle URL

  • Legitimate Zelle URLs always end in zellepay.com (e.g. www.zellepay.com, account.zellepay.com). Anything else — including look-alike typosquats, hyphenated variations, or unfamiliar TLDs like .xyz / .top / .vip — is not Zelle.
  • The padlock icon proves TLS is active, not that the site is safe. Free DV certificates are issued to attackers in minutes; every active site listed above has a valid TLS certificate.
  • If you got the link from email, SMS, or social media, do not click it. Open zellepay.com from your browser bookmark or type the domain manually.
  • Real Zelle pages almost never ask for credentials immediately after clicking from a message — treat any such redirect as a phishing attempt until the domain is verified.