# PhishDestroy threat dossier — app.apyxfi.com ================================================================ Fetched: 2026-05-16 21:07:49 UTC Canonical: https://phishdestroy.io/domain/app.apyxfi.com/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Google Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: bot_redirect_safe) (score: 3/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 13/91 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 104.21.79.140 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: NAMECHEAP INC Nameservers: hank.ns.cloudflare.com, karina.ns.cloudflare.com Registered: 2026-03-12 Page title: Google ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E7 Expires: 2026-06-16 Status: INVALID chain Fingerprint: 2e65ea49b2e220911005923a992aa4fe401639c9b5679a50c166a94be4a440e4 Subject Alternative Names (related infrastructure — often same operator): - apyxfi.com ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-03-12 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-05 06:13:16 UTC (by PhishDestroy tracker) First reported: 2026-05-05 03:15:11 UTC (abuse notice filed) Last verified: 2026-05-16 21:10:09 UTC Neutralised: 2026-05-12 00:06:55 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019df61e-e893-7234-aaf3-d96f1cc8dd0e/ URLQuery: https://urlquery.net/report/6c30d858-1e2d-4b1d-aebe-122a07bc5e21 Wayback Machine: https://web.archive.org/web/*/app.apyxfi.com crt.sh CT logs: https://crt.sh/?q=%25.app.apyxfi.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=app.apyxfi.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/app.apyxfi.com URLhaus: https://urlhaus.abuse.ch/host/app.apyxfi.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-05 06:14:29 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy has flagged app.apyxfi.com as an active crypto drainer under investigation, posing as a legitimate DeFi platform to steal cryptocurrency assets. This domain is specifically designed to deceive users into connecting their wallets, resulting in unauthorized fund transfers. The threat level remains under_investigation due to ongoing analysis, but the presence of a crypto drainer mechanism elevates the risk to critical levels for unsuspecting users. This domain was registered through NAMECHEAP INC on March 12, 2026, and currently resolves to the IP address 104.21.79.140. The SSL certificate is issued by Let's Encrypt, which does not inherently indicate legitimacy. VirusTotal currently shows 0/95 detections, meaning it has not yet been flagged by security vendors, likely due to its recent creation. The domain's age and lack of historical data contribute to its stealthy nature, making it harder to detect through traditional means. The absence of blocklist entries further underscores the need for proactive monitoring and user awareness. To mitigate the risk posed by app.apyxfi.com, users should refrain from visiting or interacting with the domain, especially avoiding any wallet connection prompts. Organizations and security teams should block the domain and IP address (104.21.79.140) at the network level to prevent accidental exposure. Implementing browser-based protections, such as DNS filtering or security extensions that detect crypto drainer domains, is strongly recommended. Additionally, users should verify the authenticity of DeFi platforms through official channels before engaging in any transactions. Immediate reporting of this domain to security vendors and platforms like VirusTotal can help increase its detection rate and protect the broader community from potential attacks. [Updates since narrative was generated:] - VirusTotal detections: now 13/91 (narrative was written when count was lower) ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260505-0E17DA Favicon MD5: f3418a443e7d841097c714d69ec4bcb8 TLS cert SHA-256: 2e65ea49b2e220911005923a992aa4fe401639c9b5679a50c166a94be4a440e4 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/app.apyxfi.com/ JSON API: https://api.destroy.tools/v1/check?domain=app.apyxfi.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 150,320 domains (30,766 alive under monitoring, 118,107 confirmed takedowns/dead). Site: https://phishdestroy.io