# PhishDestroy threat dossier — connect-app.center ================================================================ Fetched: 2026-04-25 15:42:42 UTC Canonical: https://phishdestroy.io/domain/connect-app.center/ ## VERDICT ---------------------------------------------------------------- STATUS STALE — last probed 25 days ago, treat as ACTIVE until re-verified Composite threat score: 48/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 3/95 security vendors flagged this domain Flagging vendors: Fortinet, Gridinsoft, SOCRadar Public blocklists: listed on 1 independent blocklist Victim re-reports (public form): 1 ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 198.177.125.196 (US, Phoenix) ASN: ASAS22612 Namecheap, Inc. Hosting org: AS22612 Namecheap, Inc. Registrar: NiceNIC International Group Co., Limited !!! REGISTRAR INTEGRITY ALERT — NiceNIC !!! NiceNIC International: over 90% of its registered domains are associated with illegal content; documented systematic abuse-report non-response. Primary sources: https://phishdestroy.io/nicenic-real https://phishdestroy.io/nicenic-verdict Nameservers: ["ns3.my-ndns.com", "ns4.my-ndns.com"] Registered: 2026-02-22 Page title: Just Pomodoro HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R13 Expires: 2026-04-29 Status: INVALID chain Fingerprint: f14b6b431f71c01841be073302d96dbcd6fc2eedcd23396cb3a25fdca1c3d9c9 Subject Alternative Names (related infrastructure — often same operator): - www.connect-app.center ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-02-22 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-02-25 02:39:27 UTC (by PhishDestroy tracker) First reported: 2026-02-22 17:52:52 UTC (abuse notice filed) Last verified: 2026-03-31 01:28:34 UTC (STALE — 25 days ago, re-verify) Flagged dead: 2026-02-28 00:49:19 UTC (NOT RE-VERIFIED IN 25 DAYS — treat as unconfirmed) Current status: UNCONFIRMED (our live-probe is 25 days stale) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019c85d4-ef26-755b-bcd2-4f5eb30b776a/ Wayback Machine: https://web.archive.org/web/*/connect-app.center crt.sh CT logs: https://crt.sh/?q=%25.connect-app.center Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=connect-app.center AlienVault OTX: https://otx.alienvault.com/indicator/domain/connect-app.center URLhaus: https://urlhaus.abuse.ch/host/connect-app.center/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-03-03 16:09:58 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy has identified connect-app.center as a domain involved in generic phishing operations. Although the page displayed a seemingly innocuous title, "Just Pomodoro," the domain was classified under phishing threats intended to deceive users and capture sensitive information. This case highlights the ongoing use of low-profile domain titles to mask malicious intentions. The domain connect-app.center was registered recently, on February 22, 2026, and was associated with the IP address 198.177.125.196. It appeared on one known security blocklist and was detected by three out of ninety-five antivirus engines on VirusTotal, signaling its suspicious nature. The domain was registered through a dead domain service, which often hints at less reputable or temporary domain usage, commonly seen in phishing infrastructure. Currently, connect-app.center has been taken offline, mitigating further risk to potential victims. PhishDestroy advises continued vigilance as such domains can quickly reappear under new addresses or infrastructure. Users and security teams should monitor for related threats and maintain updated blocklists to prevent exposure to ongoing phishing campaigns. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: dfedbf33c63b4419f09e1a67dc8a8046 TLS cert SHA-256: f14b6b431f71c01841be073302d96dbcd6fc2eedcd23396cb3a25fdca1c3d9c9 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/connect-app.center/ JSON API: https://api.destroy.tools/v1/check?domain=connect-app.center Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io