# elclay7.github.io — MALICIOUS > elclay7.github.io hosts a high-risk social engineering scam flagged by 10/95 antivirus engines. Check the full report for detailed analysis. ## Summary PhishDestroy identifies elclay7.github.io as an active high-risk domain engaged in social engineering scams, a specific form of phishing designed to manipulate users into divulging sensitive information. Although no explicit brand impersonation or known drainer kits have been detected on this domain, its use as a social engineering vector places it in a critical threat category that targets unsuspecting victims through deceptive tactics. Technical analysis reveals that elclay7.github.io has been flagged by 10 out of 95 security vendors on VirusTotal, indicating a consensus of malicious intent but with some variance in detection coverage. The domain is registered through GitHub, Inc. and secured with a Let's Encrypt SSL certificate, which may lend a false sense of security to potential victims. It resolves to the IP address 185.199.108.153 and appears on one security blocklist. Furthermore, Google Safe Browsing categorizes it under the 'SOCIAL_ENGINEERING' warning and it is actively blocked by OpenPhish, a reputable threat intelligence platform. Currently, elclay7.github.io remains active and poses a significant threat due to its social engineering tactics. Immediate blocking by major security vendors and platforms is in place; however, users should exercise heightened caution and avoid interacting with content hosted on this domain. Organizations are advised to update their security filters to include this domain and educate end-users about recognizing social engineering scam indicators. The residual risk remains high until the domain is taken down or ceases malicious activity. ## Threat Details - Verdict: MALICIOUS - Site status: unknown (HTTP ?) ## Domain Intelligence - Registrar: GitHub, Inc. - IP: 185.199.108.153 ## Detection Status - VirusTotal: 10 vendors flagged - Google Safe Browsing: FLAGGED - Blocklists: 1 hits Lists: ["OpenPhish"] ## Evidence - Cloudflare Radar: https://radar.cloudflare.com/scan/698e2280-9def-41fb-83e3-a9e9f53ebf88 - PhishDestroy: https://phishdestroy.io/domain/elclay7.github.io/ - LLM endpoint: https://phishdestroy.io/domain/elclay7.github.io/llm.txt ## If You Visited This Site 1. Change any passwords you may have entered 2. Enable 2FA on all related accounts 3. Monitor your accounts for unauthorized activity 4. Report to: FBI IC3, Europol, local authorities --- Report by PhishDestroy | https://phishdestroy.io/domain/elclay7.github.io/ Last updated: 2026-03-29