Recently blocked content on PageDrop. We maintain transparency about security actions to protect our community.
PageDrop uses automated security systems and community reports to detect and block malicious content. All blocked content is preserved for manual review.
If you believe content was blocked in error, please contact support for review.
Reported Content
This page provides tools to create a spoofed browser window (custom title + favicon) and inject arbitrary content or an iframe pointed at any URL, while also installing handlers that can trap or blank the parent page. Those behaviors enable realistic phishing pages and deceptive UI spoofing that can trick users into entering credentials or interacting with malicious content.
Reported Content
This page covertly collects the visitor's public IP and game score and sends them to an external Discord webhook URL constructed in the page, without clear user consent. That behavior transmits identifiable information to a third party and can be used to track or deanonymize visitors or otherwise harvest telemetry covertly.
Reported Content
This page is a fake Snapchat login that captures entered usernames and passwords in-page and explicitly notifies the user that their credentials were captured. Harvested credentials can be used to take over accounts, impersonate users, or be sold to attackers, posing a direct account-compromise risk to visitors.
Reported Content
The page contains JavaScript that intentionally exhausts device resources to freeze or crash the browser/phone: it allocates huge arrays in a tight recursive loop, spawns thousands of busy Worker threads, and continuously appends huge DOM elements while vibrating the device. This behavior causes immediate CPU and RAM exhaustion, leading to unresponsive devices and possible crashes or reboots.
Reported Content
This page contains JavaScript that intentionally exhausts device resources (infinite memory allocations, endless CPU loops, and nonstop DOM updates) and triggers vibration/rapid repaints, which will freeze or crash a visitor's phone and can make the device unresponsive. The embedded comments and the page title explicitly describe the harmful purpose. Such behavior poses a direct risk of hangs, crashes, and degraded device stability for visitors.
Reported Content
This page contains JavaScript that deliberately exhausts device CPU and memory, plays loud looping audio, and triggers vibration and flashing visuals that can crash or severely degrade phones and pose a seizure risk. The combined effects are intended to make devices unresponsive, overheat, drain battery, and potentially force a shutdown within seconds to minutes of visiting the page.
Reported Content
This page auto-opens a TRON wallet deep link that pre-fills a contract call and asks the user to sign, a common technique to trick users into approving unwanted transactions. The automatic redirect plus the instruction to “sign the transaction” indicates likely payment/scam behavior rather than a benign utility.
Reported Content
This page immediately opens a TronLink wallet deeplink that requests a contract call to the USDT token address, likely prompting a user to sign a transaction without context or consent. That behavior matches common crypto payment/phishing scams and is high risk for token loss.
Reported Content
The chat widget captures user messages and POSTs them to an external Cloudflare webhook without any user-facing disclosure. The request includes a custom 'creepy' header and transmits free-text user input, which creates a realistic risk of covert data exfiltration of sensitive user content.
Reported Content
This page fetches and injects remote HTML into a same-origin blank tab, which allows that remote content to run with the page’s privileges and potentially access or exfiltrate cookies/localStorage or call protected endpoints without clear user consent. The pattern is a high-risk content-injection vector and should be removed or sandboxed.