# PhishDestroy threat dossier — az.fortset.info ================================================================ Fetched: 2026-05-15 15:03:13 UTC Canonical: https://phishdestroy.io/domain/az.fortset.info/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: investment_scam Targeted brand: epic games Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: content_divergence) (score: 1/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 13/92 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, CRDF, CyRadar, Emsisoft, Fortinet, G-Data, Gridinsoft, LevelBlue, Lionic, Netcraft, Sophos, Webroot ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 104.21.22.212 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Web Commerce Communications Limited dba WebNic.cc Nameservers: ["anuj.ns.cloudflare.com", "penny.ns.cloudflare.com"] Registered: 2026-05-12 Page title: Fortnite Wealth Leaderboard | Epic Games HTTP response: 503 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E7 Expires: 2026-07-09 Status: INVALID chain Fingerprint: 48268ec5112086ffb727b2f39558c536b5c1eb7cc15e50ff2660d18f01ccd5dc Subject Alternative Names (related infrastructure — often same operator): - fortset.info ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-12 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-12 18:40:10 UTC (by PhishDestroy tracker) Last verified: 2026-05-15 08:05:57 UTC Neutralised: 2026-05-13 00:29:09 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e1cd6-cf95-71e1-8a53-ce642ec0ae88/ Wayback Machine: https://web.archive.org/web/*/az.fortset.info crt.sh CT logs: https://crt.sh/?q=%25.az.fortset.info Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=az.fortset.info AlienVault OTX: https://otx.alienvault.com/indicator/domain/az.fortset.info URLhaus: https://urlhaus.abuse.ch/host/az.fortset.info/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-12 18:41:24 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies az.fortset.info as an active credential-phishing domain masquerading as a legitimate service, specifically targeting users with a generic login-theft scheme. The domain leverages a spoofed interface to harvest entered credentials, with no direct association to a branded entity or known drainer kit, suggesting a low-cost, opportunistic campaign. This domain was flagged by VirusTotal with 4/95 security vendors detecting malicious activity, indicating limited but present coverage. Resolving to 104.21.22.212 and issued a Let's Encrypt SSL certificate, it was registered with privacy protection obscuring ownership details. Public blocklist aggregators currently record 0 detections, while Google Safe Browsing (GSB) status remains unclassified. The domain’s creation date falls within the last 90 days, though exact registration data remains obscured by registrar privacy measures. As of the latest scan, az.fortset.info remains actively hosted and accessible, with no evidence of takedown. Users interacting with this domain risk immediate credential compromise and potential follow-on identity theft. PhishDestroy recommends immediate network-level blocking of 104.21.22.212 and domain-wide DNS filtering. Exercise caution when encountering this domain—validate all login prompts through official, verified channels and report any incidents to your security team. ## EVIDENCE HASHES ---------------------------------------------------------------- TLS cert SHA-256: 48268ec5112086ffb727b2f39558c536b5c1eb7cc15e50ff2660d18f01ccd5dc ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/az.fortset.info/ JSON API: https://api.destroy.tools/v1/check?domain=az.fortset.info Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 149,827 domains (36,935 alive under monitoring, 112,570 confirmed takedowns/dead). Site: https://phishdestroy.io