# PhishDestroy threat dossier — delulu69.site ================================================================ Fetched: 2026-05-20 16:05:42 UTC Canonical: https://phishdestroy.io/domain/delulu69.site/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 69/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 1/95 security vendors flagged this domain Flagging vendors: Bfore.Ai PreCrime ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 188.114.96.3 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: CloudFlare, Inc. Registrar: HOSTINGER operations, UAB Nameservers: ollie.ns.cloudflare.com, vern.ns.cloudflare.com Registered: 2026-05-02 Page title: DELULU69 - Link Situs Online Resmi HTTP response: 530 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: none Status: INVALID chain ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-02 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-02 05:51:29 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-05-02 02:52:23 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-05-20 19:00:14 UTC Neutralised: 2026-05-11 21:04:08 UTC Current status: taken down (registrar suspended or DNS dead) Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019de697-491d-71fd-a951-1ec7421fc4ea/ URLQuery: https://urlquery.net/report/e8cf2739-9334-4d67-8d27-8568395ec5b9 Wayback Machine: https://web.archive.org/web/*/delulu69.site crt.sh CT logs: https://crt.sh/?q=%25.delulu69.site Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=delulu69.site AlienVault OTX: https://otx.alienvault.com/indicator/domain/delulu69.site URLhaus: https://urlhaus.abuse.ch/host/delulu69.site/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-02 05:52:02 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy analysts have identified delulu69.site as an active generic phishing domain hosting a crypto-asset drainer kit. The site was created on February 23, 2026, and is currently resolving to IPv4 address 188.114.96.3. Domain registration was processed through HOSTINGER operations, UAB, using a Let’s Encrypt SSL certificate to enhance perceived legitimacy. No direct brand impersonation has been observed in available samples, indicating a generic but targeted lure likely circulated via social engineering campaigns. The drainer kit is designed to siphon cryptocurrency from victim wallets upon transaction signing or wallet connection, and may include clipboard hijacking, fake transaction prompts, or malicious smart contract interactions. This represents a high-impact threat to users engaging with decentralized finance platforms or crypto services. This domain exhibits clear technical indicators of compromise. VirusTotal analysis (as of seed f0721b) returned a detection score of 1 out of 95 security vendors, suggesting low but present recognition in the threat intelligence ecosystem. The domain was registered through HOSTINGER operations, UAB, and resolves to IP 188.114.96.3, a range historically associated with hosting providers in Lithuania. The domain was created on February 23, 2026, indicating a very recent threat actor deployment. Google Safe Browsing (GSB) status is currently unlisted, and no public blocklist count is available beyond the single VT detection. These factors suggest a newly activated campaign with limited but growing exposure in security tools. The current operational status of delulu69.site is active, with no evidence of takedown or sinkholing at this time. Users should immediately block access to the domain at network and endpoint levels, and avoid any interaction including wallet connections or transaction signing. Security teams are advised to append the IP 188.114.96.3 and domain to firewall rules, DNS blocklists, and EDR exclusions. Remaining risk is elevated due to the domain’s fresh registration, partial detection coverage, and the presence of a functional drainer kit. PhishDestroy continues to monitor this domain for infrastructure shifts or new IOCs. Users interacting with crypto services are urged to verify URLs out-of-band, use hardware wallets, and disable auto-connect features. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260502-83F8CF Favicon MD5: 5c25dc4385fe5963f245c0f0dc98b4ca ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/delulu69.site/ JSON API: https://api.destroy.tools/v1/check?domain=delulu69.site Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 152,097 domains (43,122 alive under monitoring, 108,620 confirmed takedowns/dead). Site: https://phishdestroy.io