# amlpepe.icu — SUSPICIOUS > amlpepe.icu identified hosting a Solana wallet drainer phishing campaign. VirusTotal scored it 1/95. Check the full report. ## Summary amlpepe.icu has been flagged as an active crypto drainer phishing domain, specifically targeting Solana wallet users through deceptive web interfaces designed to siphon digital assets. The infrastructure impersonates legitimate blockchain services, luring victims via social engineering tactics such as fake airdrop claims or fraudulent transaction prompts. Security telemetry confirms this domain is part of a broader campaign leveraging urgency-based manipulation to exploit user trust in decentralized finance ecosystems. No direct association with a major brand or known drainer kit family has been established at this stage, though the operational TTPs align with emergent strains observed in late 2025. This domain exhibits a sparse but concerning threat profile. VirusTotal analysis reveals a detection ratio of 1 out of 95 security vendors, indicating limited but present recognition within the threat intelligence community. Registered through PDR Ltd. d/b/a PublicDomainRegistry.com, the domain resolves to IP address 172.67.211.232 and was created on January 11, 2026. The SSL certificate is issued by Google Trust Services, which may lend superficial credibility to the site. However, no known presence on Google Safe Browsing (GSB) blacklists has been recorded at this time. Given its recent creation and low detection coverage, this domain poses an elevated risk due to the likelihood of rapid evolution in its malicious capabilities. The domain remains active as of the latest observation window. Immediate response actions include DNS-based blocking at the network perimeter and integration into firewall rules targeting IP 172.67.211.232. Users should avoid interaction with amlpepe.icu and report any suspicious activity to their security teams. While the current risk is elevated, the lack of widespread detection suggests potential for escalation. Organizations are advised to monitor for downstream compromise indicators, including unusual outbound connections to the resolved IP or wallet drainer artifacts. Proactive threat hunting for Solana-specific IOCs is strongly recommended to mitigate potential asset loss. ## Threat Details - Verdict: SUSPICIOUS - Site status: unknown (HTTP ?) ## Domain Intelligence - Registered: 2026-01-11 15:42:18 - Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com - IP: 172.67.211.232 ## Detection Status - VirusTotal: 1 vendors flagged - Google Safe Browsing: clean - Blocklists: 0 hits ## Evidence - Cloudflare Radar: https://radar.cloudflare.com/scan/1c5a0006-cfe1-4fe3-b667-f99edacd2e37 - PhishDestroy: https://phishdestroy.io/domain/amlpepe.icu/ - LLM endpoint: https://phishdestroy.io/domain/amlpepe.icu/llm.txt ## If You Visited This Site 1. Change any passwords you may have entered 2. Enable 2FA on all related accounts 3. Monitor your accounts for unauthorized activity 4. Report to: FBI IC3, Europol, local authorities --- Report by PhishDestroy | https://phishdestroy.io/domain/amlpepe.icu/ Last updated: 2026-03-21