# PhishDestroy threat dossier — espresso.builders ================================================================ Fetched: 2026-04-22 14:10:25 UTC Canonical: https://phishdestroy.io/domain/espresso.builders/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Generic Phishing Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: content_split) (score: 1/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 4/94 security vendors flagged this domain Flagging vendors: ChainPatrol, alphaMountain.ai, Seclookup, SOCRadar URLQuery: 2 detections Public blocklists: listed on 2 independent blocklists ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 216.150.1.1 (US, Walnut) ASN: AS16509 Amazon.com, Inc. Hosting org: Vercel, Inc Registrar: NameCheap, Inc. Nameservers: ["dns1.registrar-servers.com", "dns2.registrar-servers.com"] Registered: 2026-04-08 Expires: 2027-02-16 HTTP response: 402 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R12 Expires: 2026-06-22 Status: INVALID chain Fingerprint: 911a76961e0209fa3460b2273b1caa5b77f6cb58fb95e5ab0b0485bc2126b09d ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-08 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-08 15:11:32 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-04-08 12:11:51 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-04-21 16:09:11 UTC Neutralised: 2026-04-09 21:55:14 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d6cff-693d-76b8-8fc8-6755a10aa089/ URLQuery: https://urlquery.net/report/f34cae5c-96b2-4c14-937e-fe8eb2d06b8b Wayback Machine: https://web.archive.org/web/*/espresso.builders crt.sh CT logs: https://crt.sh/?q=%25.espresso.builders Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=espresso.builders AlienVault OTX: https://otx.alienvault.com/indicator/domain/espresso.builders URLhaus: https://urlhaus.abuse.ch/host/espresso.builders/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-08 15:15:19 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies that the domain espresso.builders is actively engaged in fake Web3 builder phishing activity. This site masquerades as a legitimate crypto-asset builder interface to trick users into connecting wallets and authorizing fraudulent transactions. No exact brand or drainer kit signatures match current public repositories at this time, but the site’s behavior closely aligns with known Web3 phishing toolkits targeting crypto wallet connections and digital asset theft. This domain was flagged by PhishDestroy with a confirmed elevated risk rating. Technical indicators include: VirusTotal detection score of 3 out of 95 security vendors as of seed 93a432, registered through NameCheap, Inc., resolving to IP address 216.150.1.1, domain creation date of February 16, 2022, SSL certificate issued by Let's Encrypt, Google Safe Browsing status marked as unsafe, and presence on 2 public blocklists. These metrics indicate a mature but low-signature phishing domain leveraging free certificates and low detection for evasion. As of the latest scan, espresso.builders remains active and is blocked by MetaMask and SEAL security extensions. The site continues to pose an elevated risk to users engaging with crypto-related interfaces. PhishDestroy recommends immediate avoidance of this domain and any associated URLs. Users are advised to verify destination domains via official sources, use hardware wallets for sensitive operations, and consult their browser’s security extensions before entering wallet credentials. Remaining risk level is elevated due to ongoing lures and evasion techniques observed in similar Web3 phishing campaigns. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260408-DEA76C Favicon MD5: a92c85a0b719bae52240d81e53c917e5 TLS cert SHA-256: 911a76961e0209fa3460b2273b1caa5b77f6cb58fb95e5ab0b0485bc2126b09d ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/espresso.builders/ JSON API: https://api.destroy.tools/v1/check?domain=espresso.builders Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io