# PhishDestroy threat dossier — fidato-paycore.com ================================================================ Fetched: 2026-05-07 15:57:50 UTC Canonical: https://phishdestroy.io/domain/fidato-paycore.com/ ## VERDICT ---------------------------------------------------------------- HIGH THREAT — malicious activity confirmed Composite threat score: 73/100 (PhishDestroy scoring — see methodology below) Targeted brand: argent (and: base, ethereum, paypal, reddit, sei) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 6/95 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, CRDF, CyRadar, Kaspersky, Netcraft URLQuery: 100 detections Public blocklists: listed on 1 independent blocklist Victim re-reports (public form): 1 ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 45.9.148.131 (NL, Dronten) ASN: ASAS49447 NICEIT Nice IT Services Group Inc., DM Hosting org: AS49447 Nice IT Services Group Inc. Registrar: NETIM SAS Nameservers: 1 Registered: 2025-07-30 Expires: 2025-08-03 Page title: Fidato Paycore | Sito Ufficiale del Italia 2025 HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R12 Expires: 2026-06-19 Status: INVALID chain Fingerprint: c75cd9da240c95f96bd2c4a8b630f24046f331556df2294c8c817bf1b4b89ee6 Subject Alternative Names (related infrastructure — often same operator): - www.fidato-paycore.com ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2025-07-30 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-02-25 02:39:27 UTC (by PhishDestroy tracker) First reported: 2025-08-02 00:53:29 UTC (abuse notice filed) Last verified: 2026-05-07 14:07:43 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019868e9-b859-724b-ade7-02f3ee01ce71/ Wayback Machine: https://web.archive.org/web/*/fidato-paycore.com crt.sh CT logs: https://crt.sh/?q=%25.fidato-paycore.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=fidato-paycore.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/fidato-paycore.com URLhaus: https://urlhaus.abuse.ch/host/fidato-paycore.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-03-19 02:32:45 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy has identified fidato-paycore.com as a medium-risk phishing domain impersonating Fidato Paycore, a payment service. Such attacks can lead to credential theft and financial loss. The domain was registered recently on July 30, 2025, through NETIM SAS and resolved to IP 45.9.148.131. It appeared on one security blocklist and was flagged by 6 out of 95 VirusTotal scanners before being taken offline. Users are advised to avoid interacting with this domain, refrain from submitting sensitive data, and ensure their devices have up-to-date security protections to prevent compromise. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon SHA-256: 69e0579c296b1c156822d90ef908542c650f9cdf33763d224065d044f991a0d2 TLS cert SHA-256: c75cd9da240c95f96bd2c4a8b630f24046f331556df2294c8c817bf1b4b89ee6 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/fidato-paycore.com/ JSON API: https://api.destroy.tools/v1/check?domain=fidato-paycore.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 146,942 domains (52,938 alive under monitoring, 93,733 confirmed takedowns/dead). Site: https://phishdestroy.io