# PhishDestroy threat dossier — flare-9ed7e60ab7a5069ce-voting.web.app ================================================================ Fetched: 2026-05-15 00:41:37 UTC Canonical: https://phishdestroy.io/domain/flare-9ed7e60ab7a5069ce-voting.web.app/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 13/92 security vendors flagged this domain Flagging vendors: ADMINUSLabs, ChainPatrol, alphaMountain.ai, BitDefender, CyRadar, ESET, Forcepoint ThreatSeeker, Fortinet, G-Data, Kaspersky, Lionic, Sophos, URLQuery Public blocklists: listed on 2 independent blocklists ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 199.36.158.100 (US, Mountain View) ASN: AS54113 Fastly, Inc. Hosting org: Google LLC Registrar: Google LLC Nameservers: NS_NOT_FOUND Registered: 2026-05-11 Page title: Flare: The blockchain for data HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WR4 Expires: 2026-06-18 Status: INVALID chain Fingerprint: 38e3c92d485d84e61795f095cb3c5f8db07098cd4faa453f265668221022a6fc Subject Alternative Names (related infrastructure — often same operator): - web.app ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-11 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-11 03:50:10 UTC (by PhishDestroy tracker) Last verified: 2026-05-12 08:45:30 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e1481-4e71-728b-8caa-fb603173c55e/ Wayback Machine: https://web.archive.org/web/*/flare-9ed7e60ab7a5069ce-voting.web.app crt.sh CT logs: https://crt.sh/?q=%25.flare-9ed7e60ab7a5069ce-voting.web.app Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=flare-9ed7e60ab7a5069ce-voting.web.app AlienVault OTX: https://otx.alienvault.com/indicator/domain/flare-9ed7e60ab7a5069ce-voting.web.app URLhaus: https://urlhaus.abuse.ch/host/flare-9ed7e60ab7a5069ce-voting.web.app/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-11 03:50:51 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies flare-9ed7e60ab7a5069ce-voting.web.app as an active phishing domain impersonating Flare: The blockchain for data. The campaign is currently live and leverages a fraudulent webpage designed to deceive users into disclosing sensitive credentials or cryptocurrency wallet information under the guise of participating in Flare’s blockchain ecosystem. This domain specifically targets individuals interested in blockchain technology by mimicking legitimate infrastructure to exploit trust and deliver payloads including credential harvesting or cryptocurrency theft. This domain was flagged by 1 of 95 VirusTotal security vendors and is currently blocked by MetaMask and SEAL. It resolves to IP address 199.36.158.100 and is registered through Google LLC via Google Trust Services. The SSL certificate is issued by Google Trust Services, adding superficial legitimacy. The domain has appeared on 2 active security blocklists, indicating prior detection by community defense mechanisms. While the registration path appears legitimate due to Google’s infrastructure, the presence of a single VirusTotal detection suggests low initial visibility, emphasizing the need for real-time monitoring. The current status of flare-9ed7e60ab7a5069ce-voting.web.app remains active as of the latest intelligence. Users are strongly advised not to interact with this domain or any associated links. Organizations should block the domain at network and endpoint levels and monitor for outbound connections to IP 199.36.158.100. Security teams should conduct immediate threat hunting using IOCs (domain, IP, and SSL issuer) to identify potential compromise. For individuals, verify all blockchain-related URLs through official Flare documentation or verified social channels. Report any suspected exposure or incident to cybersecurity incident response teams and update browser and wallet security extensions to include this domain in active blocklists. Staying informed through threat intelligence feeds will help prevent future engagement with similar campaigns. The seed identifier d5ec62 confirms this domain as a repeat target in ongoing surveillance. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: eae3a8e9d75cbdb2cf40c26d84b477ef TLS cert SHA-256: 38e3c92d485d84e61795f095cb3c5f8db07098cd4faa453f265668221022a6fc ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/flare-9ed7e60ab7a5069ce-voting.web.app/ JSON API: https://api.destroy.tools/v1/check?domain=flare-9ed7e60ab7a5069ce-voting.web.app Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 149,462 domains (28,332 alive under monitoring, 119,595 confirmed takedowns/dead). Site: https://phishdestroy.io