Scam Detective
Domain

inamoto.com

First seen Feb 22, 2026

Suspicious
  • No SSL certificate
  • 30 community reports from users

Campaign Intelligence

This cluster centers on 2764 connected domains tagged as BeaverTail, Kaiji, fbf543. 645 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1132 phone numbers (7638857447, 8664372914, 2157987305) with 10266 FTC complaints; 146 companies (JPMORGAN CHASE & CO., Advanced Resolution Services Inc., EVERBANK, NATIONAL ASSOCIATION) with 8616274 CFPB complaints; 298 email addresses (xxxxxxxxxxxxxxxxxxxxxxxx@vm...

This cluster centers on 3287 connected domains tagged as HijackLoader, RemcosRAT, screenconnect. 617 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1649 phone numbers (5408463620, 8552597377, 8007873903) with 7110 FTC complaints; 143 companies (Informative LLC, HomePlus Corporation, Doral Capital Corporation) with 8547081 CFPB complaints; 807 email addresses (kellymoore_64@yahoo.com, schantzsybg7@...

This cluster centers on 2874 connected domains tagged as QuasarRAT, StealitStealer, pw-k53mv9bc. 652 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1375 phone numbers (2157987305, 2025069230, 2028641298) with 14635 FTC complaints; 160 companies (JPMORGAN CHASE & CO., Advanced Resolution Services Inc., EVERBANK, NATIONAL ASSOCIATION) with 8680419 CFPB complaints; 299 email addresses (abuse@fb.com, ...

This cluster centers on 1486 connected domains tagged as None, keylogger. 5 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1364 phone numbers (3124141737, 3163966869, 8553892999) with 17909 FTC complaints; 170 companies (EQUIFAX, INC., TRANSUNION INTERMEDIATE HOLDINGS, INC., BANK OF AMERICA, NATIONAL ASSOCIATION) with 8747332 CFPB complaints; 187 email addresses (xxxxxxxxxxxxxxxxxxxxxxxx@vmh5.grup...

Details

Registrar
Japan Registry Services Co.,Ltd.(JPRS)
Registration Date
1/12/1999
First Seen
2/22/2026

Related Domains

Community Reports

intriguing phishing attempt I just received a typical phishing email asking me for my credit card information, but with an intriguing feature. The link in the email was http://inamoto.com/am, which redirects presumably to the phishing site's page. But inamoto.com is a site for "Acorn English Academy", a very innocent-looking Japanese ESL school. Why would they do this? Are the phishers now hacking innocent 3rd party websites to "launder" their phishing links, shielding their problematic domains from immediate identification by spam/phishing filters? It's just kind of interesting to me...

5189 days ago1 upvote

intriguing phishing attempt I just received a typical phishing email asking me for my credit card information, but with an intriguing feature. The link in the email was http://inamoto.com/am, which redirects presumably to the phishing site's page. But inamoto.com is a site for "Acorn English Academy", a very innocent-looking Japanese ESL school. Why would they do this? Are the phishers now hacking innocent 3rd party websites to "launder" their phishing links, shielding their problematic domains from immediate identification by spam/phishing filters? It's just kind of interesting to me...

5189 days ago1 upvote

intriguing phishing attempt I just received a typical phishing email asking me for my credit card information, but with an intriguing feature. The link in the email was http://inamoto.com/am, which redirects presumably to the phishing site's page. But inamoto.com is a site for "Acorn English Academy", a very innocent-looking Japanese ESL school. Why would they do this? Are the phishers now hacking innocent 3rd party websites to "launder" their phishing links, shielding their problematic domains from immediate identification by spam/phishing filters? It's just kind of interesting to me...

5189 days ago1 upvote

intriguing phishing attempt I just received a typical phishing email asking me for my credit card information, but with an intriguing feature. The link in the email was http://inamoto.com/am, which redirects presumably to the phishing site's page. But inamoto.com is a site for "Acorn English Academy", a very innocent-looking Japanese ESL school. Why would they do this? Are the phishers now hacking innocent 3rd party websites to "launder" their phishing links, shielding their problematic domains from immediate identification by spam/phishing filters? It's just kind of interesting to me...

5189 days ago1 upvote

intriguing phishing attempt I just received a typical phishing email asking me for my credit card information, but with an intriguing feature. The link in the email was http://inamoto.com/am, which redirects presumably to the phishing site's page. But inamoto.com is a site for "Acorn English Academy", a very innocent-looking Japanese ESL school. Why would they do this? Are the phishers now hacking innocent 3rd party websites to "launder" their phishing links, shielding their problematic domains from immediate identification by spam/phishing filters? It's just kind of interesting to me...

5189 days ago1 upvote

intriguing phishing attempt I just received a typical phishing email asking me for my credit card information, but with an intriguing feature. The link in the email was http://inamoto.com/am, which redirects presumably to the phishing site's page. But inamoto.com is a site for "Acorn English Academy", a very innocent-looking Japanese ESL school. Why would they do this? Are the phishers now hacking innocent 3rd party websites to "launder" their phishing links, shielding their problematic domains from immediate identification by spam/phishing filters? It's just kind of interesting to me...

5189 days ago1 upvote

intriguing phishing attempt I just received a typical phishing email asking me for my credit card information, but with an intriguing feature. The link in the email was http://inamoto.com/am, which redirects presumably to the phishing site's page. But inamoto.com is a site for "Acorn English Academy", a very innocent-looking Japanese ESL school. Why would they do this? Are the phishers now hacking innocent 3rd party websites to "launder" their phishing links, shielding their problematic domains from immediate identification by spam/phishing filters? It's just kind of interesting to me...

5189 days ago1 upvote

intriguing phishing attempt I just received a typical phishing email asking me for my credit card information, but with an intriguing feature. The link in the email was http://inamoto.com/am, which redirects presumably to the phishing site's page. But inamoto.com is a site for "Acorn English Academy", a very innocent-looking Japanese ESL school. Why would they do this? Are the phishers now hacking innocent 3rd party websites to "launder" their phishing links, shielding their problematic domains from immediate identification by spam/phishing filters? It's just kind of interesting to me...

5189 days ago1 upvote

intriguing phishing attempt I just received a typical phishing email asking me for my credit card information, but with an intriguing feature. The link in the email was http://inamoto.com/am, which redirects presumably to the phishing site's page. But inamoto.com is a site for "Acorn English Academy", a very innocent-looking Japanese ESL school. Why would they do this? Are the phishers now hacking innocent 3rd party websites to "launder" their phishing links, shielding their problematic domains from immediate identification by spam/phishing filters? It's just kind of interesting to me...

5189 days ago1 upvote

intriguing phishing attempt I just received a typical phishing email asking me for my credit card information, but with an intriguing feature. The link in the email was http://inamoto.com/am, which redirects presumably to the phishing site's page. But inamoto.com is a site for "Acorn English Academy", a very innocent-looking Japanese ESL school. Why would they do this? Are the phishers now hacking innocent 3rd party websites to "launder" their phishing links, shielding their problematic domains from immediate identification by spam/phishing filters? It's just kind of interesting to me...

5189 days ago1 upvote

Share Your Experience

What's Your Exposure?

Know your risk exposure to this message with a Thorough Analysis. It returns a detailed report covering the complaint history, your data breach exposure, related scam entities, and risk signals tied to this email message. Check the box and enter your email address now.

NordProtect Identity theft monitoring and recovery

NordProtect watches for your personal info on the dark web, monitors your credit, and covers up to $1M in identity theft insurance.