chalngpt-pad[.]org
Domain Security & Threat Intelligence Report
3/95 VT
Taken Down
Oct 27, 2025
3 Blocklists
Wallet Connect Abuse
37
Threat
PhishDestroy AI
MEDIUM
The domain chalngpt-pad.org was identified as a phishing site associated with Wallet Connect abuse. It impersonated legitimate services to deceive users, resulting in a low VirusTotal score of 3/95. The site was flagged for its malicious intent, making it imperative for users to be aware of such threats.
Registered with CNOBIN INFORMATION TECHNOLOGY LIMITED, this domain was relatively new, having been active for 121 days. It was hosted on IP address 172.67.137.240 and has been blocklisted on three occasions. Its deceptive nature and recent registration raise red flags regarding its legitimacy and intent to exploit users.
As of now, chalngpt-pad.org has been taken down following detection by PhishDestroy, which reported and blocklisted the domain to prevent further user exploitation. Continuous monitoring ensures that similar threats are mitigated effectively.
Registered with CNOBIN INFORMATION TECHNOLOGY LIMITED, this domain was relatively new, having been active for 121 days. It was hosted on IP address 172.67.137.240 and has been blocklisted on three occasions. Its deceptive nature and recent registration raise red flags regarding its legitimacy and intent to exploit users.
As of now, chalngpt-pad.org has been taken down following detection by PhishDestroy, which reported and blocklisted the domain to prevent further user exploitation. Continuous monitoring ensures that similar threats are mitigated effectively.
VirusTotal
3 Detections
URLScan.io
Domain Age
123 days New
Site Status
Taken Down HTTP 403
DestroyList
Listed
User Reports
1 report
Threat Response Pipeline
Discovery
Submission
Legal
Takedown
14/15
Pre-emptive Discovery & Ingestion
Global Ecosystem Submission
Legal Notifications & Reporting
Public Transparency & Takedown
Public Blocklist Status
Evidence Capture
Domain Intelligence
Domainchalngpt-pad.org
RegistrarCNOBIN INFORMATION TECHNOLOGY LIMITED (China)
IP Address172.67.137.240
CreatedOct 26, 2025 (123 days — New)
ExpiresOct 26, 2026
Nameserversgraham.ns.cloudflare.com
tegan.ns.cloudflare.com
tegan.ns.cloudflare.com
Page TitleJoin KGeN Giveaway $KGEN Giveaway on ChainGPT Launchpad
Abuse Contactsabuse@cloudflare.com
abuse@ordertld.com
abuse@ordertld.com
First DetectedOct 27, 2025
Registrar Response0h
HTTP Status403
Report This Domain
Submit evidence & help protect others
VirusTotal Analysis
3 / 95 security vendors flagged this domain
View on VT
CRDF
Gridinsoft
SOCRadar
Evidence & External Reports
Were You Affected by This Site?
You are not alone and there is nothing to be ashamed of. Scammers are sophisticated criminals who exploit trust. Reporting your experience is the most powerful weapon against fraud — your report can prevent others from becoming victims and help law enforcement take action. Silence is the scammer's greatest advantage. Break it.
If you have interacted with this domain, entered personal information, or connected a cryptocurrency wallet — take immediate action. Below are resources to help you report the incident and protect yourself.
Chainabuse
Report crypto wallet address, transaction, or phishing URL
FBI IC3
Report internet crime (US)
Europol
Report cybercrime (EU)
Action Fraud
Report fraud & cyber crime (UK)
SEAL-ISAC
Security Alliance — crypto threat intelligence
Domain Appeal
Contest this listing if false positive
Beware of recovery scammers! After being scammed, criminals may contact you again pretending to be "recovery agents," lawyers, or investigators who claim they can retrieve your lost funds — for a fee. This is a second scam. No legitimate service will ask for upfront payment to recover stolen crypto. Learn more about recovery fraud →
Report to Your Local Authorities
Select your country to see local cybercrime reporting contacts and complaint templates.
Select your country...
Related Domain Reports
More Domains at CNOBIN INFORMATION TECHNOLOGY LIMITED
Stay Informed, Stay Safe
Monitor live threats or contest this listing if you believe it's a false positive
URLScan Report