# PhishDestroy threat dossier — emondplumblng.net ================================================================ Fetched: 2026-05-12 15:28:26 UTC Canonical: https://phishdestroy.io/domain/emondplumblng.net/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 6/95 security vendors flagged this domain Flagging vendors: BitDefender, CRDF, Emsisoft, G-Data, Netcraft, Webroot Public blocklists: listed on 1 independent blocklist ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 130.49.219.120 (RU, Moscow) ASN: AS215540 GLOBAL CONNECTIVITY SOLUTIONS LLP Hosting org: LLC Vpsville Registrar: NameCheap, Inc. Nameservers: ["dns1.registrar-servers.com", "dns2.registrar-servers.com"] Registered: 2026-05-08 Page title: Adobe Acrobat Sign HTTP response: 530 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R12 Expires: 2026-07-27 Status: INVALID chain Fingerprint: 96659d15030b5f7e9ac0a8ce776c5b98d53239c5bd40c870d623af598f180a26 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-08 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-08 17:12:55 UTC (by PhishDestroy tracker) First reported: 2026-05-08 14:12:52 UTC (abuse notice filed) Last verified: 2026-05-12 13:05:22 UTC Neutralised: 2026-05-10 02:59:42 UTC Current status: taken down (registrar suspended or DNS dead) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e07ec-818d-7627-9e73-798ccf35d9e6/ URLQuery: https://urlquery.net/report/433a9bca-7be4-4795-8dde-97a0e518c954 Wayback Machine: https://web.archive.org/web/*/emondplumblng.net crt.sh CT logs: https://crt.sh/?q=%25.emondplumblng.net Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=emondplumblng.net AlienVault OTX: https://otx.alienvault.com/indicator/domain/emondplumblng.net URLhaus: https://urlhaus.abuse.ch/host/emondplumblng.net/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-08 17:13:20 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies emondplumblng.net as an active Adobe Acrobat Sign phishing domain with an elevated risk level. This malicious site impersonates Adobe’s legitimate document-signing service to deceive users into entering sensitive credentials or downloading malware. The fraudulent page title, 'Adobe Acrobat Sign,' is a direct attempt to exploit brand recognition and bypass user suspicion. This domain is currently unresolved and poses a credible threat to individuals and organizations relying on Adobe’s services. This domain was flagged by OpenPhish and detected by 9 out of 95 VirusTotal security vendors, indicating widespread recognition of its malicious nature. It was registered through NAMECHEAP INC on August 27, 2025, and resolves to IP address 130.49.219.120. The domain appears on 1 security blocklist and utilizes a Let's Encrypt SSL certificate, which may falsely enhance its perceived legitimacy. The registration date suggests this campaign is in its early stages, but its use of Adobe’s branding makes it particularly dangerous, as users are more likely to trust familiar interfaces during urgent interactions like document signing. To mitigate the threat posed by this Adobe Acrobat Sign phishing domain, users should verify the sender’s email address and domain in all document-signing requests. Adobe documents should only be accessed through official Adobe domains (e.g., adobe.com or acrobat.com). Organizations should implement email filtering rules to block emails originating from emondplumblng.net and educate employees about the risks of unsolicited document-signing requests. Additionally, users should avoid interacting with links or attachments in unexpected emails, even if they appear legitimate. If credentials are entered on this domain, users should immediately change their Adobe passwords and enable two-factor authentication. Reporting this domain to security teams or blocklist services helps protect others from falling victim to this scam. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260508-E2819E Favicon MD5: df91da90905d1aab41f61d702225468b TLS cert SHA-256: 96659d15030b5f7e9ac0a8ce776c5b98d53239c5bd40c870d623af598f180a26 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/emondplumblng.net/ JSON API: https://api.destroy.tools/v1/check?domain=emondplumblng.net Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 148,514 domains (37,014 alive under monitoring, 111,191 confirmed takedowns/dead). Site: https://phishdestroy.io