# PhishDestroy threat dossier — bs1.cbserv202.xyz ================================================================ Fetched: 2026-04-30 04:49:41 UTC Canonical: https://phishdestroy.io/domain/bs1.cbserv202.xyz/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 96/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 15/94 security vendors flagged this domain Flagging vendors: alphaMountain.ai, Forcepoint ThreatSeeker ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 188.114.97.3 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: CloudFlare, Inc. Registrar: NameSilo, LLC !!! REGISTRAR INTEGRITY ALERT — NameSilo !!! NameSilo is a registrar documented by PhishDestroy as (1) publicly lying about received abuse reports, (2) shielding a $20M+ Monero-theft operation (xmrwallet.com) for 10 continuous years, and (3) retaliating against PhishDestroy by getting our X/Twitter account @Phish_Destroy banned after we published the evidence. Researchers/victims must ALWAYS CC compliance@icann.org on every abuse ticket — NameSilo has a track record of later claiming reports were never received. Primary sources: https://phishdestroy.io/namesilo-killed-our-twitter https://phishdestroy.io/xmrwallet-namesilo-exposed Nameservers: opal.ns.cloudflare.com, vicky.ns.cloudflare.com Registered: 2025-12-08 HTTP response: 530 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-07-04 Status: INVALID chain Fingerprint: 5ca176aaad0d340659689f0cc5b7a740176f6db4f29a3eda1aff78f5769b7a12 Subject Alternative Names (related infrastructure — often same operator): - cbserv202.xyz ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2025-12-08 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-23 03:10:40 UTC (by PhishDestroy tracker) Last verified: 2026-04-30 07:40:04 UTC Neutralised: 2026-04-24 09:16:05 UTC Current status: taken down (registrar suspended or DNS dead) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019db7ab-cb93-7277-8ebb-6bf6b2d32dc1/ Wayback Machine: https://web.archive.org/web/*/bs1.cbserv202.xyz crt.sh CT logs: https://crt.sh/?q=%25.bs1.cbserv202.xyz Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=bs1.cbserv202.xyz AlienVault OTX: https://otx.alienvault.com/indicator/domain/bs1.cbserv202.xyz URLhaus: https://urlhaus.abuse.ch/host/bs1.cbserv202.xyz/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-23 03:11:08 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies bs1.cbserv202.xyz as an active phishing domain designed to harvest user credentials and sensitive data. This domain leverages a recently registered web address (December 08, 2025) and resolves to a suspicious IP address (188.114.97.3) associated with multiple fraudulent campaigns. The presence of a Google Trust Services SSL certificate does not validate legitimacy, as threat actors frequently abuse trusted issuers to establish false credibility. Analysis reveals this domain is currently operational and distributing malicious payloads, indicating an elevated risk to unsuspecting visitors. This domain has been confirmed by 2 of 95 participating VirusTotal security vendors, suggesting limited but significant detection coverage. It was registered through NameSilo, LLC—a registrar often exploited by cybercriminals due to lax oversight—and entered circulation mere days ago, yet is already being weaponized. The combination of a fresh domain age, elevated VirusTotal score, and hosting on a high-risk IP underscores its malicious intent. Blocklists and threat intelligence feeds are beginning to flag this domain, reinforcing its classification as an active phishing scam. Users who have visited bs1.cbserv202.xyz should immediately scan their device for malware using reputable antivirus software such as Malwarebytes or Windows Defender. Avoid entering any credentials or personal information on this site. If you’ve used the same login credentials elsewhere, change those passwords immediately and enable two-factor authentication. Report the domain to your cybersecurity team or via platforms like Google Safe Browsing to help block further distribution. Monitor financial accounts for unauthorized activity and consider revoking browser permissions or clearing cached data associated with this domain. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: 2cc41790ef81b3ad77d17412bd7697b9 TLS cert SHA-256: 5ca176aaad0d340659689f0cc5b7a740176f6db4f29a3eda1aff78f5769b7a12 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/bs1.cbserv202.xyz/ JSON API: https://api.destroy.tools/v1/check?domain=bs1.cbserv202.xyz Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io