Threat Intelligence Dashboard

Phishing Analytics

Monthly threat intelligence reports across 107,713+ monitored domains. Expert analysis of registrar abuse, drainer evolution, and brand targeting.

107,713Total Detected
92,561Taken Down
86.3%Kill Rate
94.3%VT Coverage
25,319Abuse Reports
Overview Mar 269,477 Feb 2618,204 Jan 268,931 Dec 2511,773 Nov 2512,579 Oct 258,841 Sep 257,307 Aug 253,788 Jul 25700 Jun 254

Monthly Intelligence Reports

Click any month for detailed report with domain cards, registrar analysis, and AI-generated expert assessment.

9,477
6,829
Dead
2,240
Alive
72.1%
Kill Rate
124h
Response

In March 2026, PhishDestroy detected 6,635 phishing domains, marking a 63.6% decrease from the previous month. Despite this reduction, 3,124 domains remain active, highlighting a takedown rate of only 52.6%. Attackers continue to focus on cryptocurrency platforms, with Coinbase and Exodus being the top targets. The operational impact is significant, as the takedown rate remains below the desired threshold, indicating a need for improved response times from registrars, particularly NICENIC INTERNATIONAL GROUP CO., LIMITED and Cloudflare, Inc..

18,204
17,721
Dead
483
Alive
97.3%
Kill Rate
452h
Response

In February 2026, PhishDestroy detected 18,204 phishing domains, marking a 103.8% increase from the previous month. The takedown rate was 68.2%, with 5,792 domains still active. Notably, NICENIC INTERNATIONAL GROUP CO., LIMITED emerged as the top registrar with 7,733 abusive domains. Targeting shifted towards Facebook Pixel and generic crypto brands, indicating a pivot in attacker focus. The operational impact shows a need for improved registrar response times, averaging 288.1 hours, to enhance takedown efficiency.

8,931
8,861
Dead
70
Alive
99.2%
Kill Rate
1015h
Response

The most significant finding for January 2026 is a 24.1% decrease in detected phishing domains compared to the previous month, totaling 8,932 domains. Despite this reduction, 1,823 domains remain active, indicating a need for improved takedown strategies. The takedown rate stands at 79.6%, showing effectiveness but also highlighting a gap in response times, with a mean registrar response time of 782.6 hours. Notably, there is a shift towards targeting crypto-related brands, with Crypto Scam domains leading at 792 detections, suggesting a change in attacker focus and potential vulnerabilities in the crypto sector.

11,773
11,317
Dead
456
Alive
96.1%
Kill Rate
1836h
Response

In December 2025, PhishDestroy detected 11,773 phishing domains, marking a 6.4% decrease from the previous month. The takedown rate was 76.3%, with 8,978 domains neutralized. Notably, Crypto Scam targeting remains prevalent with 820 domains, while NICENIC INTERNATIONAL GROUP CO., LIMITED emerged as the top registrar for abuse cases. The operational impact shows effective takedown efforts, though the mean registrar response time of 1452.7 hours indicates room for improvement in response speed.

12,579
12,381
Dead
198
Alive
98.4%
Kill Rate
2488h
Response

In November 2025, PhishDestroy detected 12,580 phishing domains, marking a 42.3% increase from the previous month. The takedown rate was 85.4%, with 1,842 domains still active. Notably, Crypto Scam targeting surged with 990 domains, reflecting a shift towards cryptocurrency-related phishing. The mean registrar response time remains a concern at 2189.3 hours, indicating potential delays in domain takedowns.

8,841
8,769
Dead
72
Alive
99.2%
Kill Rate
3204h
Response

In October 2025, PhishDestroy detected 8,841 phishing domains, marking a 21.0% increase from the previous month. Notably, NICENIC INTERNATIONAL GROUP CO., LIMITED emerged as the top abuse registrar with 1,206 domains, indicating a potential shift in attacker preferences for domain registration. The targeting of Generic Crypto brands remains prevalent, with 669 domains detected, while Angel Drainer kits were the most used, affecting victims through wallet drains. Despite an 85.7% takedown rate, the mean registrar response time of 2803.0 hours highlights a critical gap in rapid domain deactivation.

7,307
7,135
Dead
172
Alive
97.6%
Kill Rate
4154h
Response

In September 2025, PhishDestroy detected 7,307 phishing domains, marking a 92.9% increase from the previous month, with a significant surge in activity on September 20th. The operational impact was notable with a takedown rate of 82.2%, although the mean registrar response time remained high at 3,828.5 hours. Attackers continued to focus on the crypto sector, with Generic Crypto and SushiSwap as top targets, indicating a shift in targeting tactics. The dominance of the Angel Drainer kit suggests a persistent threat of wallet draining and seed theft for victims.

3,788
3,671
Dead
117
Alive
96.9%
Kill Rate
4686h
Response

August 2025 saw a dramatic surge in phishing domains with 3,788 detected, marking a 441.1% increase from the previous month. The takedown rate stood at 67.6%, indicating significant operational success, though the mean registrar response time remains critically high at 4426.9 hours. Notably, Kraken and Ledger were heavily targeted, reflecting a strategic focus on cryptocurrency brands. The prevalence of the Angel Drainer kit, implicated in 220 cases, underscores a persistent threat of wallet draining for victims.

July 2025 +17400%
700
697
Dead
3
Alive
99.6%
Kill Rate
5472h
Response

In July 2025, PhishDestroy detected 700 phishing domains, marking a 17400.0% increase from the previous month, with a takedown rate of 85.1%. Notably, Angel Drainer kits were identified on 183 domains, posing significant risks of wallet drains and seed theft. The mean registrar response time was a concerning 4981.9 hours, highlighting gaps in takedown efficiency. Despite the high volume, our operational impact remains strong with a substantial number of domains taken offline, though registrar responsiveness needs improvement.

4
Dead
0
Alive
100%
Kill Rate
6802h
Response

In June 2025, PhishDestroy detected 4 phishing domains, representing a 100.0% increase from the previous month. Despite the rise in detected domains, the takedown rate remained effective at 75.0%, with 3 domains neutralized. Notably, Infomaniak Network SA, NameSilo, LLC, and PDR Ltd. d/b/a PublicDomainRegistry.com emerged as top abuse registrars. The targeting of apple indicates a shift towards high-value technology brands. The operational impact is positive, with a strong takedown rate, but vigilance is needed for the remaining active domain.

Detection Trends

Monthly domain volume, kill rate, and live threats over time.

Monthly Detected Domains

Kill Rate %

Explore More

Related intelligence pages and data feeds.