Domain Security Reports
Search our database of flagged domains. Check if a website is a scam, phishing, or legitimate.
VirusTotal Analysis
Every domain is checked against 95 security vendors including Kaspersky, BitDefender, ESET, Sophos, and more.
Website Screenshots
Automated screenshots captured by URLScan.io help you see what a suspicious website looks like without visiting it.
Domain Intelligence
WHOIS data, IP addresses, DNS records, registrar info, and domain age — everything you need to assess a domain.
Public Blocklist Check
Each domain is cross-referenced against 11 community blocklists: MetaMask, ScamSniffer, Polkadot, SEAL, OpenPhish, and more.
Evidence Archival
We preserve Wayback Machine snapshots and screenshots before scam sites are taken down — evidence is never lost.
Victim Resources
If you were scammed, our reports include links to report the incident to FBI IC3, Europol, Action Fraud, and more.
How This Attack Works
Angel Drainer operates by luring victims into interacting with malicious websites that appear legitimate. The attack unfolds in a series of deceptive steps designed to steal cryptocurrency assets.
Technical Analysis
The toolkit also employs advanced evasion techniques, such as IP-based redirects to show benign content to bots or security researchers while serving malicious payloads to real users. Angel Drainer campaigns frequently clone legitimate Web3 interfaces, using typosquatting or subdomain tricks (e.g., opensea.com.offer-proposal.com) to deceive users. On the blockchain side, stolen assets are often routed through intermediary wallets before being mixed, with on-chain analysis revealing connections to known money laundering services. This combination of social engineering and technical exploitation makes Angel Drainer a persistent and evolving threat in the Web3 ecosystem.
Additionally, attackers customize their campaigns based on trending topics in the crypto space, such as new token launches or NFT drops, to maximize victim engagement. The use of decentralized hosting and domain privacy services further complicates takedown efforts, as seen with the 431 active domains still operational in PhishDestroy’s database. This infrastructure resilience, paired with the toolkit’s low barrier to entry for cybercriminals, underscores why Angel Drainer remains a critical risk.
Real Cases
How to Detect
How to Protect Yourself
Frequently Asked Questions
Latest Wallet & Drainer Threat News
Live FeedRecent Reports
Browse by Registrar
Select a registrar to see all flagged domains registered through them.
Browse by Drainer Type
Wallet drainer kits detected on phishing domains.
Browse by Scam Kit
Common scam campaign types detected by page title analysis.
Browse by Target Brand
Legitimate brands being impersonated by phishing sites.
Browse All Domains A-Z
Browse all flagged domains alphabetically.