In September 2025, PhishDestroy detected 7,307 phishing domains, marking a 92.9% increase from the previous month, with a significant surge in activity on September 20th. The operational impact was notable with a takedown rate of 82.2%, although the mean registrar response time remained high at 3,828.5 hours. Attackers continued to focus on the crypto sector, with Generic Crypto and SushiSwap as top targets, indicating a shift in targeting tactics. The dominance of the Angel Drainer kit suggests a persistent threat of wallet draining and seed theft for victims.
- N/A leads in registrar abuse with 819 domains, followed closely by NICENIC INTERNATIONAL GROUP CO., LIMITED with 721 domains.
- Crypto brands like Generic Crypto and SushiSwap were heavily targeted, overshadowing traditional sectors like banking.
- The .com TLD remains the most weaponized with 2,561 domains, while .xyz and .live show growing abuse.
- The Angel Drainer kit was used in 1,120 incidents, indicating a focus on wallet draining and seed theft.
- The US hosts the majority of phishing infrastructure with 5,931 domains, but there is notable activity in Germany and Netherlands.
- Detection-to-takedown efficiency remains challenged with a mean response time of 3,828.5 hours, necessitating faster registrar actions.
Top Registrars
| Registrar | Domains |
|---|---|
| NiceNIC International Group Co., Limited | 748 |
| Web Commerce Communications Limited | 675 |
| PDR Ltd. d/b/a PublicDomainRegistry.com | 572 |
| Dynadot LLC | 549 |
| NameSilo, LLC | 504 |
| OwnRegistrar, Inc. | 362 |
| NameCheap, Inc. | 358 |
| Cloudflare, Inc. | 325 |
Active Drainer Kits
September 2025 Domains (7,307)
Sorted by VirusTotal detections. Click any domain for full security report.
Detection Trends
Monthly domain volume, kill rate, and live threats over time.
Monthly Detected Domains
Kill Rate %
Explore More
Related intelligence pages and data feeds.



























































