Hi Stephen EasyCrypto,
That is included on -https://easycrypto.ai/auth comes up with a Page not found
I'm sorry, the page you were looking for does not exist.
SRC report: HTML
-easycrypto.ai/
18,345 bytes, 255 nodes
Javascript 5 (external 5, inline 0)
-www.google-analytics.com/analytics.js
48,759 bytes
-d3uvwl4wtkgzo1.cloudfront.net/e8af8301-45e2-41c6-9212-9421ce1b1dc7.js
-easycrypto.ai/js/chunk-vendors.9dd1f715.js
-easycrypto.ai/js/app.0f4ad939.js
-static.cloudflareinsights.com/beacon.min.js
CSS 5 (external 4, inline 1)
INLINE: @font-face{font-family:'Axiforma-Black';src:url(/assets/webfonts/Axiforma-Black/
808 bytes INJECTED
-easycrypto.ai/assets/css/ec-2.10.css
INJECTED
-easycrypto.ai/assets/fontawesome/css/all.min.css
INJECTED
-easycrypto.ai/css/chunk-vendors.6c0b1195.css
INJECTED
-easycrypto.ai/css/app.ab40635f.css
INJECTED
We are still waiting for a final verdict from an avast team member for these apparent FP PHISHING findings
on various CloudFlare driven websites. Yours is one of them.
I PM-ed avast threat lab, but probably they will not reply earlier than over the week-end,
polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)