
Is mercuryo.io Safe? Security Analysis for Mercuryo
Check if mercuryo.io is a scam or legitimate. Free security scan and reviews.
AI Summary
Mercuryo is a fintech company specializing in providing seamless payment gateway solutions tailored for the web3 and cryptocurrency ecosystem. Established in 2018, it has grown to serve over 200 leading web3 companies globally, offering services such as crypto on-ramp, off-ramp, and co-branded crypto spending cards. The company operates multiple registered entities across Canada, Croatia, Spain, the UK, and the US, demonstrating strong regulatory compliance and a global footprint. Their platform supports over 30 cryptocurrencies and multiple blockchains, positioning them as a versatile player in the crypto payments space. From a technical perspective, Mercuryo employs modern web technologies including React and Next.js, hosted on AWS infrastructure, ensuring fast performance and excellent mobile optimization. The website is well-structured with comprehensive legal and product information, reflecting a mature digital presence. Analytics and marketing tools like Google Tag Manager are used responsibly with privacy compliance in mind. Security-wise, the site enforces HTTPS and domain registration protections, though it lacks some advanced security headers and published security policies. No vulnerabilities or exposed sensitive data were detected. The domain WHOIS is privacy protected but consistent with the company's business profile and history, supporting legitimacy. Overall, Mercuryo demonstrates a solid security posture with room for improvement in transparency and security policy publication. The overall risk assessment is low, with the company showing strong business credibility and technical maturity. Strategic recommendations include enabling DNSSEC, publishing a formal security policy and incident response contacts, and establishing a vulnerability disclosure program to enhance trust and security culture further.
Detected Technologies
🧠AI Business Intelligence
Technology stack, business insights, and market analysis powered by AI.
Business Intelligence
Market & Strategic Analysis
Mercuryo occupies a strong position in the fintech and crypto payment gateway market, targeting web3 companies and crypto users worldwide. Its business model combines B2B and B2C services, including on-ramp crypto purchases, virtual co-branded cards, and multi-chain payment processing. Revenue streams include transaction fees and partner revenue sharing. The company’s partnership ecosystem includes regulatory bodies and global offices, supporting scalability and compliance. Growth indicators such as 7 million users onboarded and 15 million revenue generated for partners highlight operational success. Mercuryo’s strategic focus on multi-chain support and developer tools positions it well for future web3 expansion.
Extracted Contact Information
Marketing Intelligence Data
Email Addresses (1)
Physical Addresses (5)
Company Registration
MONEYMAPLE TECH LTD
BC1306168
Security Posture Analysis
Comprehensive Security Assessment
Mercuryo exhibits a mature security posture with mandatory HTTPS, domain status protections, and no visible security flaws in the website content. Regulatory registrations with FCA, FINTRAC, and HANFA indicate compliance with financial security standards. However, the absence of published security policies, incident response contacts, and vulnerability disclosure mechanisms represents gaps in transparency and readiness. The lack of DNSSEC and security headers like CSP or X-Frame-Options suggests opportunities to strengthen defenses against DNS attacks and clickjacking. Overall, the security culture appears solid but could benefit from enhanced communication and formalized security governance.
Strategic Recommendations
Priority Actions for Security Improvement
Enable DNSSEC on the domain to protect against DNS spoofing and improve overall DNS security.
✨Observations
AI-powered comprehensive website and business analysis.
AI-Enhanced Website Analysis
Business Insights
Mercuryo
Mercuryo provides seamless enterprise payment gateway solutions focused on web3 businesses, enabling crypto payments, on-ramp and off-ramp services, co-branded crypto spending cards, and multi-chain support.
excellent
consistent
Technical Stack
fast
excellent
good
good
Security Assessment
- HTTPS enforced
- Domain status includes clientDeleteProhibited etc to prevent unauthorized changes
- No exposed sensitive data in HTML
- No visible vulnerable libraries
Analytics & Tracking
Advertising & Marketing
Website Quality Assessment
Key Observations
Website is a professional fintech payment gateway focused on web3 and crypto.
🛡️Security Headers
HTTP security headers analysis and recommendations.
Security Headers
HTTP security headers analysis
Weak X-Frame-Options configuration
LOWCurrent value: "DENY, DENY"
Weak X-Content-Type-Options configuration
LOWCurrent value: "nosniff, nosniff"
Missing X-XSS-Protection header
MEDIUMLegacy XSS protection (deprecated but still recommended)
Missing Referrer-Policy header
LOWControls referrer information sent with requests
Missing Permissions-Policy header
MEDIUMControls browser features and APIs
Sensitive data may be cached
LOWCache-Control header should include "no-store" for sensitive pages
👤GDPR Compliance
Privacy and data protection assessment under GDPR regulations.
GDPR Compliance
Privacy and data protection assessment
No Cookie Consent Banner found
HIGHGDPR requires explicit consent for non-essential cookies
No Data Protection Officer mentioned
LOWLarge organizations may need to designate a DPO under GDPR
Privacy policy may not be GDPR compliant
MEDIUMPrivacy policy lacks explicit GDPR compliance elements
GDPR Compliance Analysis
🛡️NIS2 Compliance
Network & Information Security Directive compliance assessment.
NIS2 Compliance
Network & Information Security Directive
No information security framework found
HIGHNIS2 requires documented cybersecurity and information security measures
No vulnerability disclosure policy
MEDIUMNIS2 encourages coordinated vulnerability disclosure
No security policy documentation found
HIGHNIS2 requires documented cybersecurity governance and risk management
No incident response procedures found
HIGHNIS2 requires documented incident response and business continuity plans
No business continuity planning found
MEDIUMNIS2 emphasizes operational resilience and business continuity
No security contact information
HIGHNIS2 requires clear incident reporting channels
No vulnerability reporting mechanism
MEDIUMClear vulnerability reporting supports coordinated disclosure
No NIS2 reference found
LOWConsider explicitly mentioning NIS2 compliance efforts
Critical sector without clear security compliance
HIGHDetected sectors: energy, transport, banking, digital
📧Email Security
SPF, DKIM, and DMARC validation and email security assessment.
Email Security
SPF, DKIM, and DMARC validation
No BIMI Record
LOWBIMI displays brand logos in email clients
No TLS-RPT Record
LOWTLS-RPT provides reporting for email TLS issues
SPF Details
DKIM Selectors Found
DMARC Details
MTA-STS Details
🏆SSL/TLS Security
Certificate validity and encryption analysis.
SSL/TLS Security
Certificate validity and encryption analysis
Weak Protocols Supported
HIGHServer supports weak protocols: TLSv1.1
OCSP Stapling Not Enabled
LOWOCSP stapling improves performance and privacy
Certificate Transparency Not Implemented
LOWCertificate is not logged in Certificate Transparency logs
Partial SSL/TLS Assessment
LOWCompleted 3 of 4 security checks due to time constraints
Protocol Support
OCSP Status
📊DNS Health
DNS configuration and security assessment.
DNS Health
DNS configuration and security assessment
DNSSEC Not Enabled
MEDIUMDNSSEC is not configured for this domain
Domain Registration Details
- •Privacy/proxy registration detected
DNS Records
DNSSEC Status
DNS Performance
SPF Analysis
⚡Network Security
Port scanning and network exposure analysis.
Network Security
Port scanning and network exposure analysis
Good Network Security Posture
LOWNo unnecessary services detected on common risky ports
🔧Technical Analysis
Detailed technical findings and analysis from AI assessment.
Technical Analysis
Comprehensive security assessment findings