centurionblockapps[.]online
Forensic brief
PhishDestroy identifies centurionblockapps.online as a high-risk phishing domain designed to deceive users into divulging sensitive information. Phishing threats pose significant dangers including identity theft and financial loss, making awareness and caution critical for online safety. This domain was registered on February 21, 2026, through a defunct or dead domain registrar, which is often indicative of fraudulent intent. It appeared on seven security blocklists and was flagged by multiple security vendors on VirusTotal. The domain has since been taken offline, mitigating immediate risk; however, its previous activity highlights a persistent threat landscape where attackers use newly created, short-lived domains to evade detection. Users are strongly advised to avoid visiting centurionblockapps.online or interacting with any related links or communications. It is essential to maintain updated security software, verify the authenticity of websites before entering personal information, and report suspicious domains to security platforms like PhishDestroy. Staying informed and cautious remains the best defense against phishing scams.
Threat response pipeline
VirusTotal
Forensic Evidence CollectionEvidence capture
Domain Intelligence
Technical details
Public blocklist status
VirusTotal consensus
Aggregated detection across 95 security vendors.
Evidence & external reports
Were you affected by this site?
Were You Affected?
Report to your local authorities
Email template — registrar abuse
abuse@
Case: PD-
Embed this report
About this report
About this report: centurionblockapps.online
This domain security report is maintained by PhishDestroy's automated threat-intelligence pipeline. Our system continuously monitors this domain across 95 security vendors on VirusTotal and 5 public blocklists.
centurionblockapps.online has been flagged by 12 security vendors as of May 17, 2026.
If you believe this listing is inaccurate, you can submit an appeal. For more information about our methodology, visit our FAQ page.