# PhishDestroy threat dossier — baseapp.dev ================================================================ Fetched: 2026-05-03 18:30:36 UTC Canonical: https://phishdestroy.io/domain/baseapp.dev/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 81/100 (PhishDestroy scoring — see methodology below) Scam classification: Crypto Scam Targeted brand: Base ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 4/95 security vendors flagged this domain Flagging vendors: ChainPatrol, alphaMountain.ai, Seclookup, SOCRadar Public blocklists: listed on 2 independent blocklists Victim re-reports (public form): 1 ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 2620:1ec:46::40 (US, Redmond) ASN: ASAS8075 MICROSOFT-CORP-MSN-AS-BLOCK, US Hosting org: AS8075 Microsoft Corporation Registrar: ENOM, INC. Nameservers: ns1.dreamhost.com, ns2.dreamhost.com, ns3.dreamhost.com Registered: 2025-07-13 Expires: 2026-07-13 Page title: BaseApp HTTP response: 404 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: DigiCert Inc / GeoTrust TLS RSA CA G1 Expires: 2026-09-10 Status: INVALID chain Fingerprint: ca246a4c13261da7b8d367f62e054896ae175ad2ddcf40168410df935b8496c8 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2025-07-13 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-02-25 02:39:27 UTC (by PhishDestroy tracker) First reported: 2025-12-05 18:05:08 UTC (abuse notice filed) Last verified: 2026-04-23 08:03:35 UTC Neutralised: 2026-02-27 06:00:38 UTC Current status: taken down (registrar suspended or DNS dead) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019aefaf-c07c-73bc-9cd6-98b900cbe68d/ Wayback Machine: https://web.archive.org/web/*/baseapp.dev crt.sh CT logs: https://crt.sh/?q=%25.baseapp.dev Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=baseapp.dev AlienVault OTX: https://otx.alienvault.com/indicator/domain/baseapp.dev URLhaus: https://urlhaus.abuse.ch/host/baseapp.dev/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-03-19 05:18:38 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies baseapp.dev as a medium-risk phishing domain that was designed to deceive users and steal sensitive information. Although the site is currently offline, its presence on multiple security blocklists and flags by several antivirus vendors highlight the potential risk it posed. Users encountering this domain should understand that phishing sites often mimic legitimate services to trick victims into divulging personal credentials or financial details. This phishing attempt likely operated by presenting a fake login or app interface under the guise of "BaseApp," attempting to lure users into submitting their private data. The domain’s registration through ENOM, INC. and its association with an IPv6 address suggest it was set up specifically for malicious purposes. The limited detection by security vendors indicates some evasion tactics, making user caution essential. The site’s removal from active status helps reduce the immediate threat but does not erase the risk for those previously exposed. If you visited baseapp.dev, it is advisable to immediately change any passwords or credentials that might have been entered on the site. Monitor your accounts for unusual activity and consider enabling two-factor authentication wherever possible. Running a comprehensive antivirus and anti-malware scan on your device is also recommended to detect any potential threats. Staying informed and cautious about suspicious domains helps prevent phishing attacks and protects your personal information. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon SHA-256: 3d10f7da6c603178340081668c4ac5b3ae9743ca9a262ab0fcd312fbb9f48bdd TLS cert SHA-256: ca246a4c13261da7b8d367f62e054896ae175ad2ddcf40168410df935b8496c8 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/baseapp.dev/ JSON API: https://api.destroy.tools/v1/check?domain=baseapp.dev Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 145,232 domains (56,085 alive under monitoring, 88,846 confirmed takedowns/dead). Site: https://phishdestroy.io