# PhishDestroy threat dossier — drrdeesrfesr.top ================================================================ Fetched: 2026-04-22 17:51:08 UTC Canonical: https://phishdestroy.io/domain/drrdeesrfesr.top/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Google Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: bot_redirect_safe) (score: 4/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 1/94 security vendors flagged this domain Flagging vendors: SOCRadar ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.67.137.28 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Dynadot LLC Nameservers: ["jeremy.ns.cloudflare.com.", "nucum.ns.cloudflare.com."] Registered: 2026-04-14 Page title: Приложения в Google Play – Боги Олимпа (Gods of Olympus) ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E7 Expires: 2026-07-08 Status: INVALID chain Fingerprint: 39ce716954051a7d36ff0632f1a0b4a5aac03a407e5875bb3f3ad85652c51e70 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-14 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-14 17:36:56 UTC (by PhishDestroy tracker) Last verified: 2026-04-22 19:40:17 UTC Neutralised: 2026-04-22 00:25:10 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d8c67-3f7d-71cb-810d-c732750506a3/ Wayback Machine: https://web.archive.org/web/*/drrdeesrfesr.top crt.sh CT logs: https://crt.sh/?q=%25.drrdeesrfesr.top Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=drrdeesrfesr.top AlienVault OTX: https://otx.alienvault.com/indicator/domain/drrdeesrfesr.top URLhaus: https://urlhaus.abuse.ch/host/drrdeesrfesr.top/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-14 17:38:51 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies drrdeesrfesr.top as a newly registered crypto drainer domain designed to steal cryptocurrency or sensitive credentials from unsuspecting users. This domain poses a significant threat due to its targeted mimicry of legitimate crypto-related services, aiming to trick victims into connecting wallets or entering login credentials. The site leverages deceptive domain names and social engineering tactics to appear authentic, often shared in phishing campaigns or malicious advertisements. Once users interact with the site—such as linking a crypto wallet or entering private keys—malicious scripts execute to drain funds or harvest credentials for further exploitation. Early detection is critical to prevent financial loss or identity theft. This domain was flagged with 0/95 VirusTotal detections as of the latest scan, indicating no antivirus or security service has yet flagged its malicious activity. The domain was registered through Dynadot LLC on April 09, 2026, and resolves to IP address 172.67.137.28, which does not yet appear on widely used blocklists. The presence of a Let’s Encrypt SSL certificate further enhances its appearance of legitimacy, tricking users into trusting the site. Such indicators suggest the domain is either very new or carefully crafted to evade initial detection mechanisms. If you have visited drrdeesrfesr.top, immediately disconnect any connected wallets, revoke permissions granted to the site, and scan your device for malware. Do not enter any private keys, passwords, or cryptocurrency wallet information on this site. Report the domain to your security provider and consider using tools like Etherscan’s token approval revocation feature for Ethereum-based wallets. For future visits, use a blocklist extension like uBlock Origin or manually block the domain in your hosts file. Stay vigilant against crypto-related scams, as these often evolve quickly to avoid detection. [Updates since narrative was generated:] - VirusTotal detections: now 1/94 (narrative was written when count was lower) ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: a217f758efdfff14053678dbe58fa4d0 TLS cert SHA-256: 39ce716954051a7d36ff0632f1a0b4a5aac03a407e5875bb3f3ad85652c51e70 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/drrdeesrfesr.top/ JSON API: https://api.destroy.tools/v1/check?domain=drrdeesrfesr.top Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io