# PhishDestroy threat dossier — balamut.rkvpn.tech ================================================================ Fetched: 2026-05-20 14:22:15 UTC Canonical: https://phishdestroy.io/domain/balamut.rkvpn.tech/ ## VERDICT ---------------------------------------------------------------- STATUS STALE — last probed 50 days ago, treat as ACTIVE until re-verified Composite threat score: 46/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 1/93 security vendors flagged this domain Flagging vendors: SOCRadar Public blocklists: listed on 1 independent blocklist Victim re-reports (public form): 1 ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 88.210.34.167 (RU, Moscow) ASN: ASAS48282 Hosting technology LTD Hosting org: AS48282 Hosting technology LTD Registrar: REGRU-RU Nameservers: ["ns1.reg.ru", "ns2.reg.ru"] Registered: 2026-02-21 Expires: 2026-04-26 Page title: Рейтинговая таблица HTTP response: 502 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: none Status: INVALID chain ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-02-21 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-02-25 02:39:27 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-02-06 21:01:32 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-03-31 01:19:44 UTC (STALE — 50 days ago, re-verify) Current status: UNCONFIRMED (our live-probe is 50 days stale) Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019c34ba-bec9-75b0-8b47-cc70aaed207a/ URLQuery: https://urlquery.net/report/4bd29bf7-ed1f-4804-bbec-e8da952f877a Wayback Machine: https://web.archive.org/web/*/balamut.rkvpn.tech crt.sh CT logs: https://crt.sh/?q=%25.balamut.rkvpn.tech Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=balamut.rkvpn.tech AlienVault OTX: https://otx.alienvault.com/indicator/domain/balamut.rkvpn.tech URLhaus: https://urlhaus.abuse.ch/host/balamut.rkvpn.tech/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-03-19 15:39:34 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] The domain balamut.rkvpn.tech poses a specific credential harvesting threat targeting VPN users through brand impersonation of legitimate VPN services. This phishing site was designed to steal login credentials and personal information from unsuspecting users. The domain is currently offline and no longer active. Evidence shows this domain was flagged by 1 out of 95 security vendors on VirusTotal and appears on 1 security blocklist. Registered through REGRU-RU on February 21, 2026, it resolved to IP 88.210.34.167 and utilized Ubuntu and Nginx technologies. PhishDestroy identified and blocked this domain as part of their security monitoring efforts. Users who visited this site should immediately change passwords for any VPN or online accounts where they entered credentials. Monitor accounts for unauthorized access and enable two-factor authentication where available. Since this was a credential harvesting operation, users should also be alert for phishing emails that may follow credential theft attempts. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260206-463CC1 Favicon SHA-256: e9639e3c4681ce85f852fbac48e2eeee5ba51296dbfec57c200d59b76237ab80 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/balamut.rkvpn.tech/ JSON API: https://api.destroy.tools/v1/check?domain=balamut.rkvpn.tech Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 152,024 domains (43,297 alive under monitoring, 108,447 confirmed takedowns/dead). Site: https://phishdestroy.io