# PhishDestroy threat dossier — bafkreihbey5pmomcuv4rlptqhi6ikjgkrksr62fxsmt2svmfvhqi4sygvy.ipfs.dweb.link ================================================================ Fetched: 2026-05-02 16:11:10 UTC Canonical: https://phishdestroy.io/domain/bafkreihbey5pmomcuv4rlptqhi6ikjgkrksr62fxsmt2svmfvhqi4sygvy.ipfs.dweb.link/ ## VERDICT ---------------------------------------------------------------- HIGH THREAT — malicious activity confirmed Composite threat score: 76/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 20/95 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, BitDefender, CRDF, CyRadar, ESET, Emsisoft, Forcepoint ThreatSeeker, Fortinet, G-Data, Gridinsoft, Kaspersky, LevelBlue, Lionic, Netcraft, OpenPhish, Sophos, URLQuery, VIPRE, Webroot Public blocklists: listed on 2 independent blocklists ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 209.94.90.2 (US, San Francisco) ASN: AS40680 Protocol Labs Hosting org: Protocol Labs Registrar: CSC Corporate Domains, Inc. Nameservers: clarissa.ns.cloudflare.com, tate.ns.cloudflare.com Registered: 2017-02-24 Page title: Sign in - Professional Email HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E8 Expires: 2026-06-23 Status: INVALID chain Fingerprint: e64bf46ff6fb738674ebc57eefbea1a255bf1294f88a254e67547fc25971cf0e Subject Alternative Names (related infrastructure — often same operator): - dweb.link ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2017-02-24 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-02 15:35:03 UTC (by PhishDestroy tracker) Last verified: 2026-05-02 18:09:18 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019de8ad-6f68-70af-93f0-7cc7b3a40ec1/ Wayback Machine: https://web.archive.org/web/*/bafkreihbey5pmomcuv4rlptqhi6ikjgkrksr62fxsmt2svmfvhqi4sygvy.ipfs.dweb.link crt.sh CT logs: https://crt.sh/?q=%25.bafkreihbey5pmomcuv4rlptqhi6ikjgkrksr62fxsmt2svmfvhqi4sygvy.ipfs.dweb.link Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=bafkreihbey5pmomcuv4rlptqhi6ikjgkrksr62fxsmt2svmfvhqi4sygvy.ipfs.dweb.link AlienVault OTX: https://otx.alienvault.com/indicator/domain/bafkreihbey5pmomcuv4rlptqhi6ikjgkrksr62fxsmt2svmfvhqi4sygvy.ipfs.dweb.link URLhaus: https://urlhaus.abuse.ch/host/bafkreihbey5pmomcuv4rlptqhi6ikjgkrksr62fxsmt2svmfvhqi4sygvy.ipfs.dweb.link/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-02 15:36:27 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies bafkreihbey5pmomcuv4rlptqhi6ikjgkrksr62fxsmt2svmfvhqi4sygvy.ipfs.dweb.link as an active generic phishing domain with a high risk level. This domain has been flagged for generic phishing activities and is associated with potential credential harvesting or fraudulent transactions. No specific brand or drainer kit has been directly linked to this domain in open-source intelligence, though its configuration suggests it may be used in broader phishing campaigns targeting unsuspecting users under the guise of legitimate services. This domain exhibits multiple indicators of compromise, including a VirusTotal detection score of 20/95 security vendors, indicating significant but not universal recognition of its malicious nature. It was registered on February 24, 2017, through CSC Corporate Domains, Inc., and resolves to the IP address 209.94.90.2. The domain is currently flagged in Google Safe Browsing (GSB) and is blocked by two major security platforms, OpenPhish and OISD, as well as hosting on the IPFS decentralized web platform. These factors underscore its long-standing presence and ongoing malicious operations in the threat landscape. Despite active blocking by multiple security vendors and blocklists, bafkreihbey5pmomcuv4rlptqhi6ikjgkrksr62fxsmt2svmfvhqi4sygvy.ipfs.dweb.link remains operational and poses a high-risk threat. Users are advised to avoid interacting with this domain or any associated URLs. Organizations should ensure their security solutions are updated to block access to this domain and its IP address. The persistent activity of this domain, despite its age, highlights the ongoing challenge of combating long-lived phishing infrastructure and the necessity for continuous vigilance and proactive threat intelligence sharing. [Updates since narrative was generated:] - VirusTotal detections: now 20/95 (narrative was written when count was lower) ## EVIDENCE HASHES ---------------------------------------------------------------- TLS cert SHA-256: e64bf46ff6fb738674ebc57eefbea1a255bf1294f88a254e67547fc25971cf0e ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/bafkreihbey5pmomcuv4rlptqhi6ikjgkrksr62fxsmt2svmfvhqi4sygvy.ipfs.dweb.link/ JSON API: https://api.destroy.tools/v1/check?domain=bafkreihbey5pmomcuv4rlptqhi6ikjgkrksr62fxsmt2svmfvhqi4sygvy.ipfs.dweb.link Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io