# PhishDestroy threat dossier — bafybeibp22amvhhrdkiajahcte2faf5d3vecbroua5yhnhk76jnpibn4de.ipfs.dweb.link ================================================================ Fetched: 2026-04-30 20:46:07 UTC Canonical: https://phishdestroy.io/domain/bafybeibp22amvhhrdkiajahcte2faf5d3vecbroua5yhnhk76jnpibn4de.ipfs.dweb.link/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 61/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 1/95 security vendors flagged this domain Flagging vendors: alphaMountain.ai Public blocklists: listed on 4 independent blocklists Victim re-reports (public form): 1 ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 209.94.90.3 (US, San Francisco) ASN: ASAS40680 PROTOCOL, US Hosting org: AS40680 Protocol Labs Registrar: CSC Corporate Domains, Inc. Nameservers: clarissa.ns.cloudflare.com, tate.ns.cloudflare.com Registered: 2017-02-24 Expires: 2026-02-24 Page title: Particle Network - The L1 Unifying All Chains Through Universal Accounts HTTP response: 504 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E7 Expires: 2026-04-25 Status: INVALID chain Fingerprint: b0f8011326dd0e8a1ae8481540208adfc888bb71273b3bd3bc56e92749f9f5db Subject Alternative Names (related infrastructure — often same operator): - dweb.link ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2017-02-24 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-02-25 02:39:27 UTC (by PhishDestroy tracker) First reported: 2025-08-09 14:05:28 UTC (abuse notice filed) Last verified: 2026-04-23 22:57:09 UTC Neutralised: 2026-04-23 15:22:40 UTC Current status: taken down (registrar suspended or DNS dead) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/01988fcb-4df3-750c-94ed-8112b9aa0592/ Wayback Machine: https://web.archive.org/web/*/bafybeibp22amvhhrdkiajahcte2faf5d3vecbroua5yhnhk76jnpibn4de.ipfs.dweb.link crt.sh CT logs: https://crt.sh/?q=%25.bafybeibp22amvhhrdkiajahcte2faf5d3vecbroua5yhnhk76jnpibn4de.ipfs.dweb.link Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=bafybeibp22amvhhrdkiajahcte2faf5d3vecbroua5yhnhk76jnpibn4de.ipfs.dweb.link AlienVault OTX: https://otx.alienvault.com/indicator/domain/bafybeibp22amvhhrdkiajahcte2faf5d3vecbroua5yhnhk76jnpibn4de.ipfs.dweb.link URLhaus: https://urlhaus.abuse.ch/host/bafybeibp22amvhhrdkiajahcte2faf5d3vecbroua5yhnhk76jnpibn4de.ipfs.dweb.link/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-03-24 00:36:11 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies bafybeibp22amvhhrdkiajahcte2faf5d3vecbroua5yhnhk76jnpibn4de.ipfs.dweb.link as a domain associated with a generic phishing threat. This classification stems from its use to impersonate a blockchain-related service, specifically titled "Particle Network - The L1 Unifying All Chains Through Universal Accounts," a lure to entice users into divulging sensitive information. The campaign is categorized as low risk based on observed indicators. The domain resolved to the IP address 209.94.90.3 and was registered on February 24, 2017, through CSC Corporate Domains, Inc. It has appeared on four separate security blocklists and was flagged by only one out of 95 antivirus engines on VirusTotal, suggesting limited but credible suspicion of phishing activity. The infrastructure leveraged the IPFS dweb.link gateway, likely aiming for decentralized content hosting to evade takedown efforts and increase availability. Currently, the domain is offline, indicating a takedown or voluntary suspension of phishing content. PhishDestroy advises users and security teams to remain vigilant for any mirror sites or similar domains that might emerge, especially given the decentralized nature of IPFS-hosted content. Immediate avoidance and blocking of this domain reduce risk exposure while ongoing monitoring is recommended. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon SHA-256: 35103787e155b729bd189b26fcd6b042a07020d0cffe8db6435292b2a56c30bc TLS cert SHA-256: b0f8011326dd0e8a1ae8481540208adfc888bb71273b3bd3bc56e92749f9f5db ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/bafybeibp22amvhhrdkiajahcte2faf5d3vecbroua5yhnhk76jnpibn4de.ipfs.dweb.link/ JSON API: https://api.destroy.tools/v1/check?domain=bafybeibp22amvhhrdkiajahcte2faf5d3vecbroua5yhnhk76jnpibn4de.ipfs.dweb.link Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io