# PhishDestroy threat dossier — automatic-treasury-machine.ai-cryptolist.net ================================================================ Fetched: 2026-04-22 13:50:53 UTC Canonical: https://phishdestroy.io/domain/automatic-treasury-machine.ai-cryptolist.net/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 81/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Polygon ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 1/94 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.67.198.248 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Key-Systems GmbH Nameservers: melissa.ns.cloudflare.com, miles.ns.cloudflare.com Registered: 2025-11-05 HTTP response: 403 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-06-01 Status: INVALID chain Fingerprint: 18dfe24639ec60ba5c881e9c2c4cdd0fcaa48735bc5fdb859e2feada71784596 Subject Alternative Names (related infrastructure — often same operator): - ai-cryptolist.net ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2025-11-05 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-11 03:26:00 UTC (by PhishDestroy tracker) Last verified: 2026-04-21 16:11:45 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d79eb-6536-7355-97a4-9300348e2e4b/ Wayback Machine: https://web.archive.org/web/*/automatic-treasury-machine.ai-cryptolist.net crt.sh CT logs: https://crt.sh/?q=%25.automatic-treasury-machine.ai-cryptolist.net Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=automatic-treasury-machine.ai-cryptolist.net AlienVault OTX: https://otx.alienvault.com/indicator/domain/automatic-treasury-machine.ai-cryptolist.net URLhaus: https://urlhaus.abuse.ch/host/automatic-treasury-machine.ai-cryptolist.net/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-11 03:27:56 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies automatic-treasury-machine.ai-cryptolist.net as a newly registered domain engaged in brand impersonation targeting Polygon, a leading blockchain platform. The site leverages a deceptive name combining 'automatic treasury machine' with cryptocurrency-related keywords to create a false sense of legitimacy. This domain is part of an ongoing campaign likely designed to trick users into connecting wallets or submitting sensitive information under the guise of Polygon-related services or rewards. Security researchers note that drainer kits are often deployed on such domains to siphon cryptocurrency assets once victim interaction occurs. This domain was flagged with a VirusTotal detection score of 0/95, indicating no antivirus or security vendors have yet flagged it as malicious as of this assessment. Registered through Key-Systems GmbH on November 05, 2024, the domain resolves to IP address 172.67.198.248 and holds a valid SSL certificate issued by Google Trust Services, which may contribute to user trust despite its fraudulent nature. As of now, the domain has not been added to major blocklists, leaving it accessible to potential victims and posing a latent threat to cryptocurrency users seeking Polygon-related services. As of this report, the domain remains active and unblocked, with PhishDestroy maintaining an 'under_investigation' status for this threat. While the immediate risk is assessed as latent due to low detection rates and absence from blocklists, the potential for financial harm to users who interact with the site is high. Security teams recommend immediate action: block the domain and IP at the network level, report the domain to hosting providers and security vendors to increase detection coverage, and alert users within Polygon communities to exercise heightened caution. Until blocklist coverage improves and user awareness increases, the risk of successful exploitation remains significant, particularly given the domain's deceptive naming and valid SSL credentials. [Updates since narrative was generated:] - VirusTotal detections: now 1/94 (narrative was written when count was lower) ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: df514a3d619cf73e361b6a3194d9c80b TLS cert SHA-256: 18dfe24639ec60ba5c881e9c2c4cdd0fcaa48735bc5fdb859e2feada71784596 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/automatic-treasury-machine.ai-cryptolist.net/ JSON API: https://api.destroy.tools/v1/check?domain=automatic-treasury-machine.ai-cryptolist.net Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io