Trezor.io/start — Reported for potential phishing
This page is a safety notice. The site you attempted to visit may be impersonating an official service to steal sensitive information.
This website has been reported for potential phishing. Phishing is when a site attempts to steal sensitive information by falsely presenting as a safe source. Attackers create pages that look like official services — for example, hardware wallet setup pages, login portals, or support pages — and then trick visitors into entering seed phrases, passwords, recovery keys, or payment details. These sites may use convincing copy, copied assets, or near-identical domain names to cause confusion.
Always treat unexpected prompts for secret information as highly suspicious. Legitimate hardware wallet providers, like Trezor, will never ask you to share your recovery seed or private keys on a website or over email. If you see a page asking for such information, close the tab and navigate directly to the vendor's official domain using a link you trust or by typing the domain yourself into the address bar.
If you landed on a suspicious page, here are immediate steps to stay safe: stop interacting with the page, do not enter any passwords or wallet seeds, close the tab, and clear your browser cache. If you already entered secret information, assume it is compromised — move funds from any affected wallet to a new, secure wallet and contact official support channels. For account logins, change your passwords from a trusted device and enable two-factor authentication where available.
To check a site's authenticity, look for the exact official domain (e.g., trezor.io), inspect the TLS certificate (click the lock icon in the address bar), avoid misspellings or extra words in domains, and prefer bookmarks or typed navigation over links emailed to you. Report suspicious URLs to your browser provider and to the official vendor so they can take action. If you are unsure whether a communication is real, reach out only via contact info listed on the official vendor site.
Keeping software and firmware up to date, using hardware wallets correctly, and maintaining good password hygiene are the best defenses against phishing. If you need help verifying a domain or reporting a suspicious site, contact trusted support channels — but never share secrets through chat, email, or forms on unverified sites.