# PhishDestroy threat dossier — camelotexchange-frontend.pages.dev ================================================================ Fetched: 2026-04-25 19:05:30 UTC Canonical: https://phishdestroy.io/domain/camelotexchange-frontend.pages.dev/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 82/100 (PhishDestroy scoring — see methodology below) Scam classification: Fake Exchange Targeted brand: Arbitrum ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/95 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 188.114.96.3 Registrar: Cloudflare, Inc. Nameservers: damiete.ns.cloudflare.com, evelyn.ns.cloudflare.com Registered: 2026-04-25 Page title: Camelot DEX | Arbitrum native Decentralized Exchange HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-06-09 Status: INVALID chain Fingerprint: de8fb252515a9806e968a074741309ba791ddf7dbc793e5f2eeee55446dd827a ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-25 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-25 15:43:45 UTC (by PhishDestroy tracker) Last verified: 2026-04-25 19:50:03 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dc4aa-23d6-7322-95ea-93a6c8c62c0c/ Wayback Machine: https://web.archive.org/web/*/camelotexchange-frontend.pages.dev crt.sh CT logs: https://crt.sh/?q=%25.camelotexchange-frontend.pages.dev Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=camelotexchange-frontend.pages.dev AlienVault OTX: https://otx.alienvault.com/indicator/domain/camelotexchange-frontend.pages.dev URLhaus: https://urlhaus.abuse.ch/host/camelotexchange-frontend.pages.dev/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-25 15:44:18 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] camelotexchange-frontend.pages.dev poses a brand impersonation threat targeting Arbitrum users by mimicking the official Camelot DEX interface. Security analysts flag this domain because it falsely presents itself as the native Arbitrum decentralized exchange, aiming to trick visitors into connecting wallets or signing malicious transactions. The copycat title ‘Camelot DEX | Arbitrum native Decentralized Exchange’ and domain structure are designed to deceive users who may mistake it for the genuine exchange at camelotdex.com. At least one known red flag is that this page is hosted on Cloudflare Pages at 188.114.96.3 with an SSL certificate issued by Google Trust Services, which adds superficial legitimacy but does not guarantee safety. PhishDestroy identifies this domain as actively engaged in brand impersonation with zero detections on VirusTotal as of the latest scan using 95 engines. The domain was registered through Cloudflare, Inc., and the page was created recently, though the exact date is still under investigation. Technical analysis ties it to IP 188.114.96.3, a Cloudflare edge node in the US, which is commonly used to hide origin servers in phishing campaigns. While no cryptocurrency drainers or malware payloads have been confirmed yet, the domain’s content and branding alignment with Arbitrum and Camelot strongly suggest intent to harvest funds or credentials via fake swap interfaces or malicious wallet connection prompts. If you visited camelotexchange-frontend.pages.dev, do not connect your wallet or enter any credentials. Disconnect immediately and clear your browser cache and cookies for camelotexchange-frontend.pages.dev. Check your wallet and revoke any suspicious permissions via tools like revoke.cash or Etherscan. Report the domain to Arbitrum’s security team at security@arbitrum.io and submit to PhishDestroy or VirusTotal for further analysis. Always verify URLs carefully and bookmark official sites directly from arbitrum.io or camelotdex.com to avoid similar traps in the future. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: 2f8170b87334d5ee9f3539d20fdd2343 TLS cert SHA-256: de8fb252515a9806e968a074741309ba791ddf7dbc793e5f2eeee55446dd827a ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/camelotexchange-frontend.pages.dev/ JSON API: https://api.destroy.tools/v1/check?domain=camelotexchange-frontend.pages.dev Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io