# dep65t.net — SUSPICIOUS > dep65t.net is a credential harvesting phishing domain detected March 27, 2026. Resolves to 162.255.119.38. Check the full report. ## Summary PhishDestroy identifies dep65t.net as an active credential harvesting phishing domain under active investigation. This domain poses a significant risk due to its recent creation and previously undetected status across threat intelligence platforms. Users are strongly advised to avoid interacting with this domain pending further analysis. This domain was flagged on March 27, 2026, and resolves to IP address 162.255.119.38. It is registered through NAMECHEAP INC and currently shows 0 detections out of 95 on VirusTotal, indicating it has not yet been widely recognized as malicious. No blocklist entries or trust score data are available at this time, placing this domain in a high-risk category requiring immediate scrutiny. The lack of prior detections suggests this may be a newly deployed phishing campaign. To mitigate risks associated with credential harvesting domains like dep65t.net, users should avoid clicking links or providing login credentials on unfamiliar domains. Organizations should implement DNS filtering to block access to this domain and monitor network traffic for connections to 162.255.119.38. Security teams are advised to update threat intelligence feeds and conduct user awareness training on recognizing phishing attempts. Immediate blocking at the firewall and DNS level is recommended to prevent potential credential theft. ## Threat Details - Verdict: SUSPICIOUS - Site status: unknown (HTTP ?) ## Domain Intelligence - Registered: 2026-03-27 21:00:57 - Registrar: NAMECHEAP INC - IP: 162.255.119.38 ## Detection Status - VirusTotal: 0 vendors flagged - Google Safe Browsing: clean - Blocklists: 0 hits ## Evidence - Cloudflare Radar: https://radar.cloudflare.com/domains/dep65t.net - PhishDestroy: https://phishdestroy.io/domain/dep65t.net/ - LLM endpoint: https://phishdestroy.io/domain/dep65t.net/llm.txt ## If You Visited This Site 1. Change any passwords you may have entered 2. Enable 2FA on all related accounts 3. Monitor your accounts for unauthorized activity 4. Report to: FBI IC3, Europol, local authorities --- Report by PhishDestroy | https://phishdestroy.io/domain/dep65t.net/ Last updated: 2026-03-29