# dmpet.digital โ€” MALICIOUS > dmpet.digital impersonates DANA customer care and is flagged as high risk. Avoid interaction; domain is currently offline due to threats. ## Summary PhishDestroy identifies dmpet.digital as a high-risk brand impersonation domain targeting DANA customers. The siteโ€™s page title mimics official customer care branding to deceive users, posing significant risk of phishing or fraud. This impersonation tactic aims to exploit user trust in the legitimate DANA brand. Technically, dmpet.digital resolved to the IP address 188.114.96.3 and was registered through Cloudflare, Inc., a common registrar for both legitimate and malicious activities. The domain was flagged on one security blocklist and appeared in 16 AlienVault OTX threat intelligence pulses. VirusTotal scans detected malicious indicators from 18 out of 95 security vendors, highlighting its suspicious nature. The domain received a very low trust score of 1/100 from Scamadviser. Currently, dmpet.digital is offline, likely due to enforcement or proactive takedown efforts. Users are advised to avoid interactions with this domain or similar suspicious URLs impersonating known brands. Vigilance against unsolicited communication claiming to be from DANA is essential. PhishDestroy recommends maintaining updated security software and verifying URLs directly through official channels. ## Threat Details - Verdict: MALICIOUS - Site status: dead (HTTP 403) - Target brand: DANA - Page title: ๐——๐—”๐—ก๐—” | ๐—–๐˜‚๐˜€๐˜๐—ผ๐—บ๐—ฒ๐—ฟ ๐—–๐—ฎ๐—ฟ๐—ฒ ๐——๐—”๐—ก๐—” ## Domain Intelligence - Registrar: Cloudflare, Inc. - Country: US - IP: 188.114.96.3 - IP Country: US - IP City: San Francisco - IP Org: AS13335 Cloudflare, Inc. - Nameservers: josh.ns.cloudflare.com suzanne.ns.cloudflare.com - SSL Issuer: none ## Detection Status - VirusTotal: 18 vendors flagged Vendors: ["ADMINUSLabs", "alphaMountain.ai", "BitDefender", "CRDF", "CyRadar", "ESET", "Forcepoint ThreatSeeker", "Fortinet", "G-Data", "Gridinsoft", "Kaspersky", "Lionic", "Phishing Database", "Seclookup", "SOCRadar", "Sophos", "VIPRE", "Webroot"] - Google Safe Browsing: clean - Blocklists: 1 hits Lists: ["PhishDestroy"] ## Evidence - Screenshot: https://urlscan.io/screenshots/019aef3f-8082-77ba-83a2-004a2a0cf88b.png - Cloudflare Radar: https://radar.cloudflare.com/scan/0182f037-a999-4303-bef1-6dbe74a3ea35 - PhishDestroy: https://phishdestroy.io/domain/dmpet.digital/ - LLM endpoint: https://phishdestroy.io/domain/dmpet.digital/llm.txt ## If You Visited This Site 1. Change any passwords you may have entered 2. Enable 2FA on all related accounts 3. Monitor your accounts for unauthorized activity 4. Report to: FBI IC3, Europol, local authorities --- Report by PhishDestroy | https://phishdestroy.io/domain/dmpet.digital/ Last updated: 2026-03-19