# PhishDestroy threat dossier — amusing-command-177425.framer.app ================================================================ Fetched: 2026-04-24 20:14:30 UTC Canonical: https://phishdestroy.io/domain/amusing-command-177425.framer.app/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 79/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 13/94 security vendors flagged this domain Flagging vendors: Forcepoint ThreatSeeker, LevelBlue, Phishtank URLQuery: 2 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 31.43.161.6 (NL, Amsterdam) ASN: AS16509 Amazon.com, Inc. Hosting org: Framer B.V Registrar: REGISTRAR_NOT_FOUND Nameservers: NS_NOT_FOUND Registered: 2026-04-15 Page title: My Framer Site ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E8 Expires: 2026-07-06 Status: INVALID chain Fingerprint: a56001ff73b2e769ad9c3294e0330f0155d40d0a6c11de79e1b100ffba8ac44c ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-15 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-15 15:25:16 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-04-15 12:47:57 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-04-23 03:15:16 UTC Neutralised: 2026-04-15 19:47:23 UTC Current status: taken down (registrar suspended or DNS dead) Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d9117-99e5-72e3-b9da-8729e3bb1997/ URLQuery: https://urlquery.net/report/98100263-1406-4dad-8e77-9ba96b6bfeb7 Wayback Machine: https://web.archive.org/web/*/amusing-command-177425.framer.app crt.sh CT logs: https://crt.sh/?q=%25.amusing-command-177425.framer.app Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=amusing-command-177425.framer.app AlienVault OTX: https://otx.alienvault.com/indicator/domain/amusing-command-177425.framer.app URLhaus: https://urlhaus.abuse.ch/host/amusing-command-177425.framer.app/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-15 15:26:35 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies the domain amusing-command-177425.framer.app as an active credential harvesting campaign. This domain is currently leveraging a Framer.app subdomain to impersonate legitimate login portals, tricking users into submitting sensitive credentials under false pretenses. This domain resolves to IP address 31.43.161.6 and was flagged by 3 of 95 VirusTotal security vendors. The domain utilizes a Let’s Encrypt SSL certificate, indicating an attempt to appear legitimate. No additional blocklist data or registrar details are publicly available at this time, but the low detection rate across multiple security engines suggests a recently deployed or evolving threat. Given the elevated risk level and active status, PhishDestroy advises immediate caution when encountering this domain or any associated links. Users are strongly encouraged to verify the authenticity of any login prompts originating from this domain. Organizations should consider blocking this domain at the network level and inspecting DNS logs for related activity. If compromised, passwords should be rotated immediately, and multi-factor authentication should be enforced to mitigate credential theft. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260415-B254A3 Favicon MD5: 810193ede98443698ba6b54575e9cf3c TLS cert SHA-256: a56001ff73b2e769ad9c3294e0330f0155d40d0a6c11de79e1b100ffba8ac44c ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/amusing-command-177425.framer.app/ JSON API: https://api.destroy.tools/v1/check?domain=amusing-command-177425.framer.app Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io