Domain Security Reports

Search our database of flagged domains. Check if a website is a scam, phishing, or legitimate.

0
Total Tracked
0
Detected
0
Content Alive
0
Content Dead
0
VT Pending

VirusTotal Analysis

Every domain is checked against 95 security vendors including Kaspersky, BitDefender, ESET, Sophos, and more.

Website Screenshots

Automated screenshots captured by URLScan.io help you see what a suspicious website looks like without visiting it.

Domain Intelligence

WHOIS data, IP addresses, DNS records, registrar info, and domain age — everything you need to assess a domain.

Public Blocklist Check

Each domain is cross-referenced against 11 community blocklists: MetaMask, ScamSniffer, Polkadot, SEAL, OpenPhish, and more.

Evidence Archival

We preserve Wayback Machine snapshots and screenshots before scam sites are taken down — evidence is never lost.

Victim Resources

If you were scammed, our reports include links to report the incident to FBI IC3, Europol, Action Fraud, and more.

CRITICAL THREAT

Angel Drainer Threats: A Deep Dive into Crypto Phishing Scams

Angel Drainer is a notorious crypto phishing toolkit targeting Web3 users, draining wallets through malicious smart contracts. PhishDestroy has tracked 4,385 domains associated with this threat, with 431 currently active as of our latest scans. This critical threat exploits trust in popular platforms, often using domains mimicking legitimate services like OpenSea or Vercel.

4,388
Domains Detected
CRITICAL
Threat Level

How This Attack Works

Angel Drainer operates by luring victims into interacting with malicious websites that appear legitimate. The attack unfolds in a series of deceptive steps designed to steal cryptocurrency assets.

STEP 1
Baiting with Fake Offers
Attackers create phishing sites mimicking trusted platforms like NFT marketplaces or DeFi protocols, often using domains like opensea.com.offer-proposal.com to appear authentic. Victims are enticed with fake airdrops, giveaways, or urgent account verification prompts.
STEP 2
Wallet Connection Request
Once on the site, users are prompted to connect their crypto wallets (e.g., MetaMask) to 'claim' rewards or 'verify' their accounts. This step often bypasses user suspicion by mimicking standard Web3 interactions.
STEP 3
Malicious Smart Contract Execution
Upon connection, the site triggers a malicious smart contract that requests sweeping permissions, allowing attackers to drain funds or NFTs from the wallet. Victims often don’t realize they’ve approved a transaction that compromises their assets.
STEP 4
Asset Drainage and Laundering
Stolen funds are quickly transferred to attacker-controlled wallets and laundered through mixers like Tornado Cash or cross-chain bridges, making recovery nearly impossible.

Technical Analysis

Angel Drainer is a sophisticated phishing-as-a-service (PhaaS) toolkit that emerged in late 2022, primarily targeting cryptocurrency users. It leverages malicious JavaScript embedded in phishing websites to interact with victims’ wallets. The core mechanism involves tricking users into signing transactions that call functions like 'approve()' or 'transferFrom()' on ERC-20 tokens or NFTs, granting attackers full control over assets. These scripts are often obfuscated to evade detection by antivirus software or browser security extensions. Infrastructure-wise, attackers rely on cheap or compromised domain registrars—PhishDestroy data shows NICENIC INTERNATIONAL GROUP CO., LIMITED (1,173 domains) and Cloudflare, Inc. (434 domains) as top choices for hosting these threats. Common TLDs include .com (1,212 domains), .xyz (712), and .app (290), often paired with free hosting on platforms like Vercel, as seen in examples like mysteryclaims6345-live.vercel.app.

The toolkit also employs advanced evasion techniques, such as IP-based redirects to show benign content to bots or security researchers while serving malicious payloads to real users. Angel Drainer campaigns frequently clone legitimate Web3 interfaces, using typosquatting or subdomain tricks (e.g., opensea.com.offer-proposal.com) to deceive users. On the blockchain side, stolen assets are often routed through intermediary wallets before being mixed, with on-chain analysis revealing connections to known money laundering services. This combination of social engineering and technical exploitation makes Angel Drainer a persistent and evolving threat in the Web3 ecosystem.

Additionally, attackers customize their campaigns based on trending topics in the crypto space, such as new token launches or NFT drops, to maximize victim engagement. The use of decentralized hosting and domain privacy services further complicates takedown efforts, as seen with the 431 active domains still operational in PhishDestroy’s database. This infrastructure resilience, paired with the toolkit’s low barrier to entry for cybercriminals, underscores why Angel Drainer remains a critical risk.

Real Cases

ParaSpace NFT Exploit (2023)
$5 million stolen
In March 2023, attackers used Angel Drainer to target users of the ParaSpace NFT lending platform, tricking them into signing malicious transactions via a fake update prompt, resulting in $5 million in stolen assets.
Fake OpenSea Campaign (2023)
$1.7 million stolen
A widespread phishing campaign in late 2023 mimicked OpenSea’s interface, using domains similar to opensea.com.offer-proposal.com, draining $1.7 million in NFTs and tokens from unsuspecting users.
Blur Marketplace Scam (2024)
$2.3 million stolen
Early 2024 saw Angel Drainer used in a fake Blur marketplace airdrop scam, where users connected wallets to claim 'free tokens,' losing $2.3 million in assets to malicious smart contracts.

How to Detect

Unsolicited offers or urgent prompts for wallet connection on websites mimicking platforms like OpenSea or Vercel, often using domains tracked by PhishDestroy such as mysteryclaims6345-live.vercel.app.
Suspicious domain structures, especially subdomains or unusual TLDs like .xyz or .app, which account for a significant portion of the 4,385 domains in our database.
Transaction requests that ask for broad permissions or unlimited token approvals when connecting a wallet to a site.
Lack of HTTPS or mixed content warnings on supposed Web3 platforms, often a sign of hastily deployed phishing pages.
Unexpected wallet activity or pop-ups prompting signature approvals without clear explanations of the transaction purpose.

How to Protect Yourself

1 Always verify the URL of Web3 platforms before connecting your wallet—avoid clicking links from unsolicited emails or social media, as PhishDestroy has identified 4,385 Angel Drainer-related domains.
2 Use hardware wallets or wallet extensions with transaction simulation features to preview smart contract interactions before signing.
3 Enable two-factor authentication (2FA) and set spending limits on your crypto wallets to minimize potential losses.
4 Regularly monitor your wallet for unauthorized transactions using blockchain explorers and revoke permissions for unused dApps.
5 Leverage PhishDestroy’s threat database to check suspicious domains or report potential Angel Drainer phishing sites for community protection.

Frequently Asked Questions

What is Angel Drainer?
Angel Drainer is a phishing toolkit used by cybercriminals to steal cryptocurrency and NFTs by tricking users into connecting their wallets to malicious websites. It exploits trust in Web3 platforms through fake offers or urgent prompts, executing harmful smart contracts to drain assets. PhishDestroy has identified 4,385 domains linked to this threat.
How much money has been stolen through Angel Drainer?
Angel Drainer has facilitated significant financial losses, with documented cases like the 2023 ParaSpace exploit ($5 million), the 2023 fake OpenSea campaign ($1.7 million), and the 2024 Blur marketplace scam ($2.3 million). Total losses tracked across various incidents exceed $9 million in stolen assets.
How do I protect myself from Angel Drainer?
Protect yourself by verifying URLs before connecting your wallet, avoiding unsolicited links, and using hardware wallets with transaction previews. Monitor wallet activity, revoke unnecessary dApp permissions, and check suspicious domains against PhishDestroy’s database of 4,385 tracked Angel Drainer threats.
What should I do if I'm a victim of Angel Drainer?
If you’re a victim, immediately disconnect your wallet from the malicious site and revoke all permissions via a blockchain explorer or wallet interface. Report the incident to authorities, file a report on PhishDestroy.io to alert the community, and contact your wallet provider for assistance. Unfortunately, recovering stolen crypto is often difficult due to the nature of blockchain transactions.
Data sourced from PhishDestroy threat intelligence database — 4,388 domains tracked for this threat type

Latest Wallet & Drainer Threat News

Live Feed
Bitcoinist · Feb 20 HIGH
Change Of Heart? Hacker Returns $21M Stolen Bitcoin To South Korean Prosecutors
A hacker has returned 320 Bitcoin (BTC) stolen from South Korean prosecutors throughout a phishing scam last year. As authorities face ba...
phishing hack scam
BleepingComputer · Feb 28 HIGH
If You�ve Been Scammed in Crypto, Read This Immediately
If You’ve Been Scammed in Crypto, Read This Immediately - posted in Windows Crashes and Blue Screen of Death (BSOD) Help and Support: If ...
wallet phishing scam
BleepingComputer · Feb 28 HIGH
Crypto Scam Recovery: Real Steps and Realistic Hope in 2026
Crypto Scam Recovery: Real Steps and Realistic Hope in 2026 - posted in Windows 10 Support: Discovering youve been scammed in crypto hits...
phishing scam
Cointelegraph · Feb 23 HIGH
How pig-butchering crypto scams turn trust into a financial weapon
Learn how pig-butchering crypto scams exploit emotional trust, fake profits and social engineering to drain millions from victims worldwide.
wallet hack scam
Help Net Security · Feb 25 HIGH
Airline brands become launchpads for phishing, crypto fraud
Airline brands sit at the center of peak travel booking cycles, loyalty programs, and high value transactions. Criminal groups continue t...
phishing scam
Cointelegraph · Feb 25
US seizes $61M in USDT linked to ‘pig butchering’ crypto fraud scheme
The $61 million USDT seizure in North Carolina shows how US authorities can trace and freeze stablecoin flows tied to pig butchering scam...
phishing scam

Recent Reports

Browse by Registrar

Select a registrar to see all flagged domains registered through them.

NICENIC INTERNATIONAL ... 13,226 Cloudflare, Inc. 10,035 PDR Ltd. d/b/a PublicD... 3,683 DYNADOT LLC 3,255 Gname.com Pte. Ltd. 3,109 NameSilo, LLC 2,762 WEBCC 2,506 GoDaddy.com, LLC 2,430 NAMECHEAP INC 1,974 REGISTRAR_NOT_FOUND 1,959 Dynadot Inc 1,720 HOSTINGER operations, UAB 1,528 Tucows Domains Inc (Ve... 1,408 N/A 1,310 OwnRegistrar, Inc. 1,038 Dominet (HK) Limited 999 MarkMonitor, Inc. 939 MAT BAO CORPORATION 924 Global Domain Group LLC 879 TUCOWS DOMAINS, INC. 842 CSC Corporate Domains,... 821 REGRU-RU 767 Web Commerce Communica... 643 Global Domain Group Inc 625 Hosting Concepts B.V. ... 571 NameCheap, Inc. 564 Vercel Inc. 542 Name SRS AB 508 Squarespace Domains II... 470 Cosmotown, Inc. 463

Browse by Drainer Type

Wallet drainer kits detected on phishing domains.

Angel Drainer 4,388 Wallet Connect Abuse 1,666 Solana Drainer 1,322 solana_drainer 569 Ice Phishing 42 Inferno Drainer 13 unknown_drainer 8 MS Drainer 1
Angel Drainer 4,388 domains
app-goodvibesclub.com 9 app-kernel-dao-v1.com 9 Generic Crypto app-lido-v9.com 9 Lido app-maiga-ai.lat 9 Generic Crypto app-mantle.icu 9 Mantle app-polymarket-v1.com 9 Generic Crypto app-stargate-v1.com 9 Stargate app-uni-sw-v6.com 9 Generic Crypto app.merkl.finance 9 Generic Crypto app.tech-resolverdapps.live 9 app.webauthresolver.xyz 9 apps-usuol.money 9 aster-chain.net 9 Generic Crypto aster-investing.info 9 aster-promotion.com 9 Generic Crypto asterclaims.com 9 Generic Crypto aztec.saie.network 9 blockfixedrectify.firebaseapp.com 9 blockfixedrectify.web.app 9 boisterousrab.top 9 Generic Crypto bsc-launchpad.com 9 Generic Crypto bullishdegens.net 9 bullishdegensolana.net 9 Solana chainsupports.web.app 9 Generic Crypto checker-brevis.network 9 claim-alphabot.app 9 Generic Crypto claim-hyperwavefi.com 9 Generic Crypto claim-midnight.network 9 Generic Crypto claim-stbl.app 9 Generic Crypto claim-yepe.fun 9 Generic Crypto claim.asterdex-treasury.com 9 Generic Crypto claim.piasma.app 9 Generic Crypto claims-unibase.com 9 claimwindow-asterdex.com 9 clalm-hyperlane.com 9 Generic Crypto coinmarketcap.mom 9 Generic Crypto commondrop.xyz 9 Generic Crypto coreumrewards.com 9 Generic Crypto dapp-asterdex.com 9 dashb0ard-littlepepe.com 9 Generic Crypto dashboard-plasma.app 9 dashboard-plasma.to 9 Generic Crypto datadapp-manualdex.xyz 9 Generic Crypto dbk.mint-badge.com 9 Generic Crypto defixenchainv3.online 9 doyr-drop.top 9 drops.rest 9 Generic Crypto earn-asterdex.com 9 earn-pendle.app 9 Pendle eigencloud-reward.network 9 Generic Crypto eligible-hyperliquid.xyz 9 Generic Crypto errenase.com 9 figmetn.com 9 Generic Crypto forge.bittensor-en.app 9 Tensor fuel-register.quest 9 gitcoin-grants.com 9 Generic Crypto graph.airdropsalert.xyz 9 Generic Crypto helporevohelp.icu 9 hyperliquid-tracking.xyz 9 hypersswaps.exchange 9 Generic Crypto icopaxtoken-webclaim.world 9 Generic Crypto info-humidifi.app 9 interest-hyperfoundation.org 9 jitoyieldboost.click 9 join-hyperliquid.app 9 Generic Crypto jtosubmtcheck.click 9 kamino-swap.com 9 kitkat-allocations.xyz 9 lad21.top 9 Generic Crypto lad70.top 9 lewvk.app 9 lewwk.xyz 9 lightairdrops.xyz 9 Generic Crypto limitiess.xyz 9 linea-allocation.com 9 Linea litliepepe.com 9 Generic Crypto lldo-appfl.com 9 llinea-drops.net 9 Linea lnq-sushi.cfd 9 SushiSwap m-saylor.com 9 mail.jupiterag.org 9 Jupiter manthle.org 9 mantlesxyz.org 9 Mantle mantra-mobile-migration.top 9 masterbot.claims 9 matchmadeforyou.com 9 matthys-api.conversietools.be 9 Opensea maxidoge.info 9 mebitnestvalidate.xyz 9 Generic Crypto migrate-trustwallet.com 9 TrustWallet migration-trustwallet.com 9 TrustWallet migrationmyro-migrate.fun 9 monad-signup.app 9 moonshol.xyz 9 Moonshot moonshot-trending.xyz 9 Moonshot moonsshots.xyz 9 Moonshot multifixapps.xyz 9 multifixdapp.xyz 9 nalplity.xyz 9 Generic Crypto nansenai-secure.tech 9
« Prev 11 12 13 14 15 16 17 Next » Page 14 of 44

Browse by Scam Kit

Common scam campaign types detected by page title analysis.

Gambler Scam 3,837 Airdrop Scam 238 Token Presale 33 Giveaway Scam 15 Recovery Scam 5 Staking Scam 3 Verification Scam 3 NFT Mint 1

Browse by Target Brand

Legitimate brands being impersonated by phishing sites.

Crypto Scam 3,343 Generic Crypto 2,454 Coinbase 1,540 Generic Gambling 1,296 Facebook Pixel 1,020 Ledger 914 Kraken 821 Generic Cloudflare 727 Metamask 556 SushiSwap 516 Moonshot 426 Generic 353 Trezor 343 Generic Banking 310 Bet365 290 Solana 261 Phantom 259 Facebook 195 Linea 193 Steam 180

Browse All Domains A-Z

Browse all flagged domains alphabetically.

0 1 2 3 4 5 6 7 8 9 a b c d e f g h i j k l m n o p q r s t u v w x y z