This domain has been flagged as malicious
Detected by 18 of 95 security vendors and listed in 1 public blocklists. Do not connect a wallet; do not paste a seed phrase.

adobe-ael.saliphaberylin.workers[.]dev

Domain Security & Threat Intelligence Report
18/95 VT Malicious 1 Blocklist ACTIVE THREAT HTTP 500
REF 888E5448 SCORE 100/100 ENGINE PD-4 Turbo Appeal listing
0 Risk Score
Data coverage VirusTotal 18 / 95 URLQuery no det. OTX no pulses CF Radar pending URLScan pending DNS blocks none SSL invalid WHOIS 18d old Screenshot not captured Redirect chain no redirect CDN bypass n/a
VirusTotal
18 det.
URLQuery
no det.
OTX
no pulses
CF Radar
pending
URLScan
DNS Security
no dets
Gridinsoft
SSL
Age
18d
Status
Live
DestroyList
Listed
Reports Sent
0
02

Forensic brief

auto-generated · PhishDestroy AI
PhishDestroy AI
probe: —
score: 100/100
vendors18/95
blocklists1
Analyst brief · auto-generated

Threat Overview The domain adobe-ael[.]saliphaberylin[.]workers[.]dev has been identified as a phishing website impersonating Adobe. This site was designed to steal login credentials and personal information from Adobe users. Risk Indicators - Impersonates Adobe brand - Domain registered on dev TLD - Domain length: 36 characters - Unusually long domain name — a common phishing technique - Uses multiple subdomains to appear more legitimate - Vt Detected Recommendations Always access Adobe through the official website.

Check the URL bar carefully before entering any credentials. Report suspicious sites to PhishDestroy.

Read full brief

Threat Overview The domain adobe-ael[.]saliphaberylin[.]workers[.]dev has been identified as a phishing website impersonating Adobe. This site was designed to steal login credentials and personal information from Adobe users. Risk Indicators - Impersonates Adobe brand - Domain registered on dev TLD - Domain length: 36 characters - Unusually long domain name — a common phishing technique - Uses multiple subdomains to appear more legitimate - Vt Detected Recommendations Always access Adobe through the official website.

Check the URL bar carefully before entering any credentials. Report suspicious sites to PhishDestroy.

Phishing
03

Threat response pipeline

0 reports submitted
Discovery
Submission
Legal
Takedown
7/19
30+ Proprietary Parsers
Distributed scanning of Google Ads, SEO-manipulated results, Twitter/X, YouTube & Telegram campaigns.
Infrastructure Analysis
dnstwist & typosquatting detection.
Community Intelligence
Real-time ingestion via Telegram Bot & partner intelligence feeds.
Threat Ingested
adobe-ael.saliphaberylin.workers.dev detected and queued for full analysis.
55+ Vendor Submissions
Threat data submitted to 55+ security vendors & threat-intel platforms.
VirusTotal
18 / 95 vendors flagged on VirusTotal.
Blocklist Detection
Found in 1 blocklists: PhishDestroy.
Open Threat Database
Real-time commits to GitHub repository & live monitoring at phishdestroy.io/live.
Social Broadcasting
Automated alerts on X, Telegram & Mastodon.
Awaiting Takedown
Domain still active — monitoring & re-reporting continues. 0h since first report.
08

Public blocklist status

cross-vendor confirmation
1
Listed in 1 public blocklist — confirmed by independent sources
Sources with no listing are omitted.
10

VirusTotal consensus

95 vendors · 3-col matrix
18/95
vendors flagging
Partial detection

Aggregated detection across 95 security vendors.

Per-vendor breakdown not available — view raw report on VirusTotal ↗
12

Evidence & external reports

cross-reference this domain
14

Were you affected by this site?

immediate response · authorities

Were You Affected?

You are not alone and there is nothing to be ashamed of. Reporting is the most powerful weapon against fraud — your report can prevent others from becoming victims.
Beware of recovery scammers! No legitimate service will ask for upfront payment to recover stolen crypto. Learn more about recovery fraud →

Recommendations & Advice for Victims

  1. Do not pay anything else. Recovery agents demanding upfront fees are a second-stage scam.
  2. Disconnect compromised wallets. Move remaining funds to a fresh seed phrase generated offline.
  3. Preserve evidence. Screenshot transactions, save URLs, archive emails — chain-of-custody matters for prosecution.
  4. Report to authorities (see section 15 below) — even small reports help build case patterns.
  5. Notify your bank/exchange. Some chargebacks may still be possible within 24-72h.
ICANN RAA §3.18 DMCA §512 GDPR Art.17 FBI guidelines SEAL-ISAC
15

Report to your local authorities

geo-aware · authorities · AI complaint
Your country (auto-detected)
Canada

  Email template — registrar abuse

To: abuse@cloudflare workers Registrar: Cloudflare Workers Case: PD-
Open in mail client Appeal (if false-positive)
16

Embed this report

iframe · sizer · CC-BY

Embed this report

Drop a live, self-updating risk widget anywhere — blog, DAO forum, Discord webhook, X post. Free, no API key, CC-BY.

adobe-ael[.]saliphaberylin[.]workers[.]dev 100/100 MALICIOUS · 18/95 VT · 0h View full report ↗
Live preview at 100% width
Canonical: https://phishdestroy.io/domain/adobe-ael.saliphaberylin.workers.dev/ JSON API llm.txt
17

About this report

methodology · appeals · API

About this report: adobe-ael.saliphaberylin.workers.dev

This domain security report is maintained by PhishDestroy's automated threat-intelligence pipeline. Our system continuously monitors this domain across 95 security vendors on VirusTotal and 1 public blocklists.

adobe-ael.saliphaberylin.workers.dev has been flagged by 18 security vendors as of today.

If you believe this listing is inaccurate, you can submit an appeal. For more information about our methodology, visit our FAQ page.