# PhishDestroy threat dossier — fairmts.top ================================================================ Fetched: 2026-04-25 14:04:53 UTC Canonical: https://phishdestroy.io/domain/fairmts.top/ ## VERDICT ---------------------------------------------------------------- HIGH THREAT — malicious activity confirmed Composite threat score: 65/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 2/94 security vendors flagged this domain Flagging vendors: Seclookup URLQuery: 2 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 46.202.156.6 (DE, Frankfurt am Main) ASN: AS47583 Hostinger International Limited Hosting org: HOSTINGER DE Registrar: NameSilo, LLC !!! REGISTRAR INTEGRITY ALERT — NameSilo !!! NameSilo is a registrar documented by PhishDestroy as (1) publicly lying about received abuse reports, (2) shielding a $20M+ Monero-theft operation (xmrwallet.com) for 10 continuous years, and (3) retaliating against PhishDestroy by getting our X/Twitter account @Phish_Destroy banned after we published the evidence. Researchers/victims must ALWAYS CC compliance@icann.org on every abuse ticket — NameSilo has a track record of later claiming reports were never received. Primary sources: https://phishdestroy.io/namesilo-killed-our-twitter https://phishdestroy.io/xmrwallet-namesilo-exposed Nameservers: ns1.dns-parking.com, ns2.dns-parking.com Registered: 2025-05-21 Page title: Fairmts HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R13 Expires: 2026-06-15 Status: INVALID chain Fingerprint: 2dba2e6a0ba5213e4f175866110590f19b3a9e280d58adc90c1935cb90aca094 Subject Alternative Names (related infrastructure — often same operator): - www.fairmts.top ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2025-05-21 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-23 18:56:54 UTC (by PhishDestroy tracker) First reported: 2026-04-23 16:00:17 UTC (abuse notice filed) Last verified: 2026-04-24 05:15:03 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dbb0d-42d4-74fa-a947-fe317e6387de/ URLQuery: https://urlquery.net/report/042d80f0-3ea4-48bd-9396-4ebc370bba15 Wayback Machine: https://web.archive.org/web/*/fairmts.top crt.sh CT logs: https://crt.sh/?q=%25.fairmts.top Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=fairmts.top AlienVault OTX: https://otx.alienvault.com/indicator/domain/fairmts.top URLhaus: https://urlhaus.abuse.ch/host/fairmts.top/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-23 18:57:54 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies fairmts.top as an active credential harvesting domain designed to trick users into surrendering sensitive login credentials under false pretenses. This site poses a significant risk to individuals and organizations by mimicking trusted services to capture usernames, passwords, and other personal data. The domain was flagged with a high-risk assessment due to its active phishing infrastructure and limited but concerning detection rate on VirusTotal, where only 1 out of 95 security vendors identified it as malicious at the time of analysis. This domain exhibits multiple red flags that confirm its malicious intent. fairmts.top was registered on May 21, 2025, through NameSilo, LLC, a domain registrar known for accommodating both legitimate and questionable domains. It resolves to the IP address 46.202.156.6, a hosting infrastructure frequently associated with phishing and malware campaigns. The presence of a Let's Encrypt SSL certificate is a tactic used to lend false legitimacy to the site, as attackers increasingly exploit free certificates to appear trustworthy. Critically, VirusTotal’s scan revealed that only 1 security vendor detected the threat, indicating either the sophistication of the phishing kit or the need for broader threat intelligence updates to catch such domains promptly. Users who have visited fairmts.top should immediately assess whether they entered any credentials or personal information. If so, change passwords immediately and enable multi-factor authentication on all potentially affected accounts. Use a trusted password manager to check for reused credentials across other services. Run a full antivirus scan on your device to rule out any malware that may have been downloaded during the visit. Consider reporting the domain to your email provider, browser, or organizations like PhishDestroy or Google Safe Browsing to help block future access. Avoid interacting with the site entirely, as it continues to operate as an active threat with minimal detection. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260423-0019D2 Favicon MD5: 8a47a934f526ee0143fc97352ff68c28 TLS cert SHA-256: 2dba2e6a0ba5213e4f175866110590f19b3a9e280d58adc90c1935cb90aca094 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/fairmts.top/ JSON API: https://api.destroy.tools/v1/check?domain=fairmts.top Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io