# bitter-water-31ee.perlearbitrary.workers.dev — SUSPICIOUS > Potential Bitcoin wallet drainer attack detected on bitter-water-31ee.perlearbitrary.workers.dev. Check the full report for Verified 0/95 VirusTotal detections. ## Summary PhishDestroy identifies bitter-water-31ee.perlearbitrary.workers.dev as an active Bitcoin wallet drainer phishing domain. This Workers.dev subdomain is designed to impersonate cryptocurrency service interfaces, attempting to trick users into connecting malicious wallet drainers that silently transfer funds upon confirmation. No specific brand is being spoofed in this campaign; the domain appears to operate as a standalone drainer kit hosted under a Worker.dev subdomain. The infrastructure suggests a testing environment for cryptocurrency theft operations, leveraging Workers.dev for rapid deployment and abuse of Cloudflare’s legitimate domain infrastructure. This domain exhibits concerning technical indicators. Currently, it remains undetected with a 0/95 detection ratio on VirusTotal as of seed 833e6f, indicating a low but potentially emerging threat still under observation by the cybersecurity community. The domain resolves to IP address 172.67.217.44 via Cloudflare, Inc., demonstrating standard CDN-based hosting with anonymized infrastructure. The SSL certificate is issued by Google Trust Services, which is regularly abused by threat actors to lend false legitimacy to phishing pages. While creation date and blocklist counts were not provided, the use of a Workers.dev subdomain and Cloudflare hosting suggests recent deployment, likely within the past 30 days, which is typical for short-lived phishing operations. As of the latest threat assessment, this domain remains active and under investigation. Security teams are encouraged to block both the domain and its resolved IP address (172.67.217.44) via firewall rules and DNS sinkholing. Users are strongly advised to avoid interacting with any cryptocurrency-related prompts originating from unknown domains, especially those hosted on Workers.dev or similar rapid-deployment platforms. Although the current risk is classified as under_investigation, the combination of zero detections, drainer kit deployment, and active status suggests imminent expansion of detection signatures. Immediate monitoring and proactive blocking are recommended to prevent successful fund extraction. ## Threat Details - Verdict: SUSPICIOUS - Site status: unknown (HTTP ?) ## Domain Intelligence - Registrar: Cloudflare, Inc. - IP: 172.67.217.44 ## Detection Status - VirusTotal: 0 vendors flagged - Google Safe Browsing: clean - Blocklists: 0 hits ## Evidence - Cloudflare Radar: https://radar.cloudflare.com/scan/13fb880c-a16f-4589-90e0-6073b77a6073 - PhishDestroy: https://phishdestroy.io/domain/bitter-water-31ee.perlearbitrary.workers.dev/ - LLM endpoint: https://phishdestroy.io/domain/bitter-water-31ee.perlearbitrary.workers.dev/llm.txt ## If You Visited This Site 1. Change any passwords you may have entered 2. Enable 2FA on all related accounts 3. Monitor your accounts for unauthorized activity 4. Report to: FBI IC3, Europol, local authorities --- Report by PhishDestroy | https://phishdestroy.io/domain/bitter-water-31ee.perlearbitrary.workers.dev/ Last updated: 2026-03-21