⚠️
This domain has been flagged as malicious
Detected by 10 security vendors and listed in 3 public blocklists. Exercise extreme caution — do not enter personal information or connect wallets.

cboefewq[.]com

“Cboe”

10/95 VT URLQuery: 100 Active Feb 10, 2026 3 Blocklists Generic
100 Threat
PhishDestroy AI
HIGH
Ref
EF61CF2E
Score
100/100
Engine
PD-4 Turbo
cboefewq[.]com operates as a deceptive impersonation scam that mimics a legitimate service to conduct fraud. VirusTotal reports 10 out of 95 security vendor detections. The page mimics the appearance of Generic to trick visitors.

Infrastructure analysis reveals cboefewq[.]com is registered via Gname.com Pte. Ltd., created just 5 days ago. The resolved IP address is 172.67.167.40. The domain appears on 3 security blocklists.

The domain cboefewq[.]com is still operational at the time of this report. PhishDestroy's threat response team has submitted takedown requests to the registrar and relevant hosting providers. This page will be updated when the domain is taken offline.
VT
VirusTotal
10 Detections
UQ
URLQuery
100 detections
US
URLScan.io
Domain Age
5 days Brand New!
Site Status
Active HTTP 200
PD
DestroyList
Listed
User Reports
1 report

Threat Response Pipeline

Discovery
Submission
Legal
Takedown
16/17
Pre-emptive Discovery & Ingestion
30+ Proprietary Parsers · Infrastructure Analysis · Threat Ingested
3/3 ✓
30+ Proprietary Parsers
Distributed network scanning Google Ads (malvertising), SEO-manipulated results, Twitter/X, YouTube & Telegram campaigns
Infrastructure Analysis
dnstwist & typosquatting detection to catch look-alike domains targeting established brands
Threat Ingested
cboefewq.com detected and queued for full analysis
Feb 10, 2026
Global Ecosystem Submission
50+ Vendor Submissions · URLScan.io Snapshot · Cloudflare Radar · VirusTotal · Google Safe Browsing · Blocklist Detection · Brand Impersonation
7/7 ✓
50+ Vendor Submissions
Threat data submitted to 55 security vendors & threat intelligence platforms
Show all 55 vendors
CloudflareGoogle Safe BrowsingMicrosoft SmartScreenVirusTotalNetcraftESETBitdefenderNorton / SymantecAviraPhishTankDr.WebURLScan.ioPolySwarmKasperskyOpenPhishAPWG eCrimeComodo / XcitiumFortinet / FortiGuardPalo Alto NetworksSophosTrend MicroWebrootZeroFOXSURBLSpamhausAbusixCRDF LabsYandex Safe BrowsingQuad9CleanBrowsingCyRadarScumware.orgPhishing.DatabaseMalware PatrolANY.RUNHybrid AnalysisURLhausMalwareBazaarThreatFoxAbuse.chAbuseIPDBShodanGreyNoiseAlienVault OTXMISPIntelOwlCrowdStrike FalconRecorded FutureDomainToolsSecurityTrailsRiskIQ / PassiveTotalCensysBinaryEdgeCIRCLPhishStats
URLScan.io Snapshot
Submitted to urlscan.io — screenshot, DOM & HTTP transactions captured
Feb 10, 2026
Cloudflare Radar
Scanned via Cloudflare Radar — DNS, certificates & network data
VirusTotal
10 / 95 vendors flagged on VirusTotal
Feb 25, 2026
Google Safe Browsing
Feb 25, 2026
Blocklist Detection
Found in 3 blocklists: MetaMask, PhishDestroy, SEAL
Feb 25, 2026
Brand Impersonation
Impersonation of Generic
Legal Notifications & Reporting
Registrar & Hosting Notification · DestroyList Published · Abuse Reports Sent · Re-detection Logic
4/4 ✓
Registrar & Hosting Notification
Initial abuse reports sent to domain registrar (Gname.com Pte. Ltd.) and hosting provider with forensic evidence packages (metadata, screenshots, PDF)
ICANN Compliance Escalation — if registrar ignores within 24h, formal complaint to ICANN per RAA §3.18
DestroyList Published
Added to PhishDestroy/DestroyList — open-source blocklist for wallets & extensions
Feb 10, 2026
Abuse Reports Sent
Abuse report sent to registrar Gname.com Pte. Ltd., hosting provider, 1 abuse contact
Feb 10, 2026
Re-detection Logic
Follow-up alerts if threat remains active beyond 24 hours — automated re-reporting cycle
Public Transparency & Takedown
Open Threat Database · Social Broadcasting · Awaiting Takedown
2/3
Open Threat Database
Real-time commits to GitHub repository & live monitoring at phishdestroy.io/live
Social Broadcasting
Automated alerts on Twitter, Telegram & Mastodon channels
Awaiting Takedown
Domain still active — monitoring & re-reporting continues

Public Blocklist Status

Evidence Capture

Snapshot
2026-02-10 23:58 UTC
Malicious
Forensic screenshot of cboefewq.com
IP: 172.67.167.40
Gname.com Pte. Ltd.
5d

Domain Intelligence

Domaincboefewq.com
RegistrarGname.com Pte. Ltd. (US)
IP Address172.67.167.40
CreatedFeb 21, 2026 (5 days — Brand New!)
ExpiresJan 13, 2027
Nameservershenry.ns.cloudflare.com
sandra.ns.cloudflare.com
Page TitleCboe
Abuse Contactscomplaint@gname.com
First DetectedFeb 10, 2026
Case IDPD-20260210-65A43F
HTTP Status200
Report This Domain Submit evidence & help protect others

VirusTotal Analysis

10 / 95 security vendors flagged this domain
View on VT
ADMINUSLabs
ChainPatrol
alphaMountain.ai
CRDF
CyRadar
Forcepoint ThreatSeeker
Google Safebrowsing
Gridinsoft
Lionic
SOCRadar

Evidence & External Reports

Were You Affected by This Site?

You are not alone and there is nothing to be ashamed of. Scammers are sophisticated criminals who exploit trust. Reporting your experience is the most powerful weapon against fraud — your report can prevent others from becoming victims and help law enforcement take action. Silence is the scammer's greatest advantage. Break it.

If you have interacted with this domain, entered personal information, or connected a cryptocurrency wallet — take immediate action. Below are resources to help you report the incident and protect yourself.

Beware of recovery scammers! After being scammed, criminals may contact you again pretending to be "recovery agents," lawyers, or investigators who claim they can retrieve your lost funds — for a fee. This is a second scam. No legitimate service will ask for upfront payment to recover stolen crypto. Learn more about recovery fraud →

Report to Your Local Authorities

Select your country to see local cybercrime reporting contacts and complaint templates.

Select your country...

Related Domain Reports

cboebnvw.com
18 detections · Same kit
ig-crypto-dapp.us
15 detections · Same kit
cboeevcs.com
14 detections · Same kit
bny-exchange.com
14 detections · Taken down · Same kit
yrtbl.com
In DestroyList
qrandpashagiris.com
In DestroyList
casibom92454.com
In DestroyList
waowux.com
In DestroyList

More Domains at Gname.com Pte. Ltd.

admin.kraken-ni.vip yrtbl.com aihypeyp.one web3-defi28.icu j298l.xyz bozei.club 1

Other Generic Impersonation Domains

These domains also target Generic users. View all Generic threats →

scootwinner.com 23 shopgotk365.top 22 innmagalu.com 21 aliexpressgo.com 21 maga12u.com 21 krakens-pro.com 21 amz-sipv.icu 20 web.membersway.com 20

About This Report: cboefewq.com

This domain security report for cboefewq.com is maintained by PhishDestroy's automated threat intelligence pipeline. Our system continuously monitors this domain across 95 security vendors on VirusTotal, 3 public blocklists, URLScan.io, and Google Safe Browsing.

The site displays a page titled “Cboe”, which may be designed to impersonate Generic.

cboefewq.com has been flagged by 10 security vendors as of February 27, 2026.

If you believe this listing is inaccurate, you can submit an appeal. For more information about our methodology, visit our FAQ page.

Stay Informed, Stay Safe

Monitor live threats or contest this listing if you believe it's a false positive

Live Threat Feed Appeal This Listing