# PhishDestroy threat dossier — discordseacs.pro ================================================================ Fetched: 2026-05-19 02:23:35 UTC Canonical: https://phishdestroy.io/domain/discordseacs.pro/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: content_divergence) (score: 2/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 2/95 security vendors flagged this domain Flagging vendors: ADMINUSLabs, Kaspersky ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 5.253.61.77 (RU, Moscow) ASN: AS211642 AdminVPS OOO Hosting org: Adminvps Registrar: NICENIC INTERNATIONAL GROUP CO., LIMITED !!! REGISTRAR INTEGRITY ALERT — NiceNIC !!! NiceNIC International: over 90% of its registered domains are associated with illegal content; documented systematic abuse-report non-response. Primary sources: https://phishdestroy.io/nicenic-real https://phishdestroy.io/nicenic-verdict Nameservers: ns1.adminvps.ru, ns2.adminvps.net, ns3.adminvps.ru, ns4.adminvps.net Registered: 2026-05-18 Expires: 2027-05-13 Page title: GO VERIFY YOURSELF HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R13 Expires: 2026-08-11 Status: INVALID chain Fingerprint: 3bb1a74f31dd3b3a8f5e456ed13f5613744173f605885ae0854a812d2d6a97ca Subject Alternative Names (related infrastructure — often same operator): - faceit.discordseacs.pro - www.discordseacs.pro ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-18 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-18 22:37:35 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-05-18 19:40:07 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-05-19 03:19:54 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e3c96-f03b-741b-abab-6812d1591caa/ URLQuery: https://urlquery.net/report/06180c45-54b3-491d-8186-9f6b36fde676 Wayback Machine: https://web.archive.org/web/*/discordseacs.pro crt.sh CT logs: https://crt.sh/?q=%25.discordseacs.pro Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=discordseacs.pro AlienVault OTX: https://otx.alienvault.com/indicator/domain/discordseacs.pro URLhaus: https://urlhaus.abuse.ch/host/discordseacs.pro/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-18 22:38:10 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies an active phishing campaign targeting Discord users via the domain discordseacs.pro. This domain is currently hosting a generic phishing page designed to harvest Discord credentials under the guise of a legitimate login portal. The campaign is classified as an active credential theft operation, with no known brand impersonation beyond Discord’s authentication framework. Users interacting with this domain risk unauthorized access to their Discord accounts and potential secondary compromise of linked services. This domain was flagged by 3 of 95 VirusTotal security vendors at the time of analysis, indicating low but present detection across major threat intelligence platforms. The domain discordseacs.pro was registered on May 13, 2026 through NICENIC INTERNATIONAL GROUP CO., LIMITED, resolving to a dedicated IP address (5.253.61.77). The SSL certificate is issued by Let’s Encrypt, a common practice among malicious domains to establish false legitimacy. As of now, this domain remains unlisted on major blocklists such as Google Safe Browsing, PhishTank, or OpenPhish, suggesting either a newly deployed campaign or one operating below established detection thresholds. Given the elevated risk level and active status of this campaign, immediate action is required to mitigate exposure. Discord users are advised to avoid accessing discordseacs.pro and to report any suspicious login prompts or unexpected redirects. Organizations should consider blocking this domain at the network level using DNS filtering or firewall rules targeting 5.253.61.77. The low VirusTotal detection rate underscores the need for proactive monitoring, as traditional signature-based defenses may not yet recognize this threat. Users who may have entered credentials on this domain should reset their Discord password immediately and enable two-factor authentication (2FA) to prevent account takeover. Further intelligence and indicators of compromise (IOCs) are available via threat intelligence platforms under seed identifier 9acdf1. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260518-4F78A3 Favicon MD5: bb8c9f6acc36c8f783e0e78911bb000c TLS cert SHA-256: 3bb1a74f31dd3b3a8f5e456ed13f5613744173f605885ae0854a812d2d6a97ca ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/discordseacs.pro/ JSON API: https://api.destroy.tools/v1/check?domain=discordseacs.pro Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 151,317 domains (36,676 alive under monitoring, 114,289 confirmed takedowns/dead). Site: https://phishdestroy.io