This phishing domain has been taken down
Confirmed dead — kept on record for forensic reference and similar-pattern matching.

auth-office-device-com.dporozok.workers[.]dev

Domain Security & Threat Intelligence Report
“Suspected phishing site | Cloudflare”
19/19 VT Taken Down 1 Blocklist Taken Down HTTP 403
REF DC130F58 SCORE 100/100 ENGINE PD-4 Turbo Appeal listing
0 Risk Score
Data coverage VirusTotal 19 / 19 URLQuery no det. OTX no pulses CF Radar pending URLScan pending DNS blocks none SSL invalid WHOIS 36d old Screenshot captured Redirect chain no redirect CDN bypass n/a
VirusTotal
19 det.
URLQuery
no det.
OTX
no pulses
CF Radar
pending
URLScan
DNS Security
no dets
Gridinsoft
SSL
Age
36d
Status
Dead
DestroyList
Listed
Reports Sent
0
02

Forensic brief

auto-generated · PhishDestroy AI
PhishDestroy AI
probe: —
score: 100/100
vendors19/19
blocklists1
Analyst brief · auto-generated

Threat Overview The domain auth-office-device-com[.]dporozok[.]workers[.]dev has been flagged as a phishing threat. PhishDestroy's automated scanning systems detected multiple risk indicators associated with this domain. Detection Details This domain was identified through a combination of automated analysis, community reports, and cross-referencing with global threat intelligence feeds including VirusTotal, Google Safe Browsing, and 50+ specialized blocklists.

Risk Indicators - Domain registered on dev TLD - Domain length: 43 characters - Unusually long domain name — a common phishing technique - Uses multiple subdomains to appear more legitimate - Vt Detected Stay Safe Always verify URLs before entering credentials. Use a password manager to avoid typing passwords on fake sites. Enable two-factor authentication wherever possible.

Read full brief

Threat Overview The domain auth-office-device-com[.]dporozok[.]workers[.]dev has been flagged as a phishing threat. PhishDestroy's automated scanning systems detected multiple risk indicators associated with this domain. Detection Details This domain was identified through a combination of automated analysis, community reports, and cross-referencing with global threat intelligence feeds including VirusTotal, Google Safe Browsing, and 50+ specialized blocklists.

Risk Indicators - Domain registered on dev TLD - Domain length: 43 characters - Unusually long domain name — a common phishing technique - Uses multiple subdomains to appear more legitimate - Vt Detected Stay Safe Always verify URLs before entering credentials. Use a password manager to avoid typing passwords on fake sites. Enable two-factor authentication wherever possible.

Phishing
03

Threat response pipeline

0 reports submitted
Discovery
Submission
Legal
Takedown
10/19
30+ Proprietary Parsers
Distributed scanning of Google Ads, SEO-manipulated results, Twitter/X, YouTube & Telegram campaigns.
Infrastructure Analysis
dnstwist & typosquatting detection.
Community Intelligence
Real-time ingestion via Telegram Bot & partner intelligence feeds.
Threat Ingested
auth-office-device-com.dporozok.workers.dev detected and queued for full analysis.
63+ Vendor Submissions
Threat data submitted to 63+ security vendors & threat-intel platforms. 19 flagged this domain.
VirusTotal
19 / 19 vendors flagged on VirusTotal.
Blocklist Detection
Found in 1 blocklists: PhishDestroy.
Forensic Evidence Collection
URLScan.io, URLQuery & Cloudflare Radar — DOM snapshots, HTTP transactions, DNS & certificate data.
Open Threat Database
Real-time commits to GitHub repository & live monitoring at phishdestroy.io/live.
Social Broadcasting
Automated alerts on X, Telegram & Mastodon.
Confirmed dead
Domain confirmed taken down.
May 17, 2026
04

Evidence capture

urlscan snapshot · domain intelligence

Domain Intelligence

Domainauth-office-device-com.dporozok.workers.dev
Registrar Cloudflare Workers
IP Address 188.114.96.3
ASN 13335 · Cloudflare, Inc.
Registration Created 2026-04-11 02:07:01
Hosting CA Toronto , CA · CloudFlare, Inc.
Page title “Suspected phishing site | Cloudflare”
HTTP status 403
Technical details DNS, hashes, case ID
SSL fingerprint04038d0d56bdda53a3ae35de542282436fd23f63b7359a68999f06ffd4468377
08

Public blocklist status

cross-vendor confirmation
1
Listed in 1 public blocklist — confirmed by independent sources
Sources with no listing are omitted.
10

VirusTotal consensus

19 vendors · 3-col matrix
19/19
vendors flagging
Unanimous malicious verdict

Aggregated detection across 19 security vendors.

Per-vendor breakdown not available — view raw report on VirusTotal ↗
11

Site performance

PageSpeed Insights · mobile
Site performance analysis

Google PageSpeed Insights — mobile audit of auth-office-device-com.dporozok.workers.dev

100
Good
Performance
FCP
0.78
First Contentful Paint
LCP
1.83
Largest Contentful Paint
CLS
0.001
Cumulative Layout Shift
TBT
0
Total Blocking Time
SI
0.78
Speed Index
12

Evidence & external reports

cross-reference this domain
14

Were you affected by this site?

immediate response · authorities

Were You Affected?

You are not alone and there is nothing to be ashamed of. Reporting is the most powerful weapon against fraud — your report can prevent others from becoming victims.
Beware of recovery scammers! No legitimate service will ask for upfront payment to recover stolen crypto. Learn more about recovery fraud →

Recommendations & Advice for Victims

  1. Do not pay anything else. Recovery agents demanding upfront fees are a second-stage scam.
  2. Disconnect compromised wallets. Move remaining funds to a fresh seed phrase generated offline.
  3. Preserve evidence. Screenshot transactions, save URLs, archive emails — chain-of-custody matters for prosecution.
  4. Report to authorities (see section 15 below) — even small reports help build case patterns.
  5. Notify your bank/exchange. Some chargebacks may still be possible within 24-72h.
ICANN RAA §3.18 DMCA §512 GDPR Art.17 FBI guidelines SEAL-ISAC
15

Report to your local authorities

geo-aware · authorities · AI complaint
Your country (auto-detected)
Canada

  Email template — registrar abuse

To: abuse@cloudflare workers Registrar: Cloudflare Workers Case: PD-
Open in mail client Appeal (if false-positive)
16

Embed this report

iframe · sizer · CC-BY

Embed this report

Drop a live, self-updating risk widget anywhere — blog, DAO forum, Discord webhook, X post. Free, no API key, CC-BY.

auth-office-device-com[.]dporozok[.]workers[.]dev 100/100 TAKEN DOWN · 19/19 VT · 0h View full report ↗
Live preview at 100% width
Canonical: https://phishdestroy.io/domain/auth-office-device-com.dporozok.workers.dev/ JSON API llm.txt
17

About this report

methodology · appeals · API

About this report: auth-office-device-com.dporozok.workers.dev

This domain security report is maintained by PhishDestroy's automated threat-intelligence pipeline. Our system continuously monitors this domain across 19 security vendors on VirusTotal and 1 public blocklists.

The site displays a page titled “Suspected phishing site | Cloudflare”.

auth-office-device-com.dporozok.workers.dev has been flagged by 19 security vendors as of today.

If you believe this listing is inaccurate, you can submit an appeal. For more information about our methodology, visit our FAQ page.