# PhishDestroy threat dossier — flexiaccessb.site ================================================================ Fetched: 2026-05-06 09:28:38 UTC Canonical: https://phishdestroy.io/domain/flexiaccessb.site/ ## VERDICT ---------------------------------------------------------------- STATUS STALE — last probed 23 days ago, treat as ACTIVE until re-verified Composite threat score: 58/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/93 security vendors flagged this domain Public blocklists: listed on 1 independent blocklist ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 163.61.188.5 (US, New York City) ASN: ASAS153568 NEWDHAKAHARDWARE-AS-AP NEW DHAKA HARDWARE, BD Hosting org: AS153568 NEW DHAKA HARDWARE Registrar: NameCheap, Inc. Nameservers: ["dns1.lytehosting.com", "dns2.lytehosting.com", "dns3.lytehosting.com", "dns4.lytehosting.com"] Registered: 2026-02-21 Page title: Flexi Access ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R12 Expires: 2026-04-30 Status: INVALID chain Fingerprint: 951473cebe73fbc2a599cfe6f80e40810d3c368bab318dba8f4e36a7ce5b2ec3 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-02-21 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-02-26 23:19:49 UTC (by PhishDestroy tracker) Last verified: 2026-04-13 01:44:52 UTC (STALE — 23 days ago, re-verify) Flagged dead: 2026-03-15 06:15:37 UTC (NOT RE-VERIFIED IN 23 DAYS — treat as unconfirmed) Current status: UNCONFIRMED (our live-probe is 23 days stale) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/0198868e-37f6-73cf-8d9d-de93e6ffc24f/ Wayback Machine: https://web.archive.org/web/*/flexiaccessb.site crt.sh CT logs: https://crt.sh/?q=%25.flexiaccessb.site Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=flexiaccessb.site AlienVault OTX: https://otx.alienvault.com/indicator/domain/flexiaccessb.site URLhaus: https://urlhaus.abuse.ch/host/flexiaccessb.site/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-03-05 04:11:19 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies flexiaccessb.site as a generic phishing domain created on February 21, 2026. The domain is classified as a medium-risk threat due to its active use in deceptive campaigns aimed at harvesting sensitive user credentials. This classification is based on behavioral analysis and reported incidents involving phishing attempts tied to this domain. Technical indicators reveal that flexiaccessb.site currently appears on one security blocklist, suggesting initial detection by automated threat intelligence systems. The domain infrastructure shows signs of recent activation consistent with phishing operations, such as hosting fake login forms and mimicking legitimate services to lure victims. No advanced evasion techniques have been observed so far, but its continued activity warrants caution. As of now, flexiaccessb.site remains active and continues to pose a risk to internet users. Security researchers and organizations are advised to monitor this domain and update their blocklists accordingly. Users encountering this domain should avoid interaction and report any suspicious communications linked to it. PhishDestroy emphasizes the importance of ongoing vigilance and timely reporting to mitigate the impact of phishing threats from domains like flexiaccessb.site. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: 8445125df31824226efba2706a8f7e56 TLS cert SHA-256: 951473cebe73fbc2a599cfe6f80e40810d3c368bab318dba8f4e36a7ce5b2ec3 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/flexiaccessb.site/ JSON API: https://api.destroy.tools/v1/check?domain=flexiaccessb.site Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 146,066 domains (58,905 alive under monitoring, 86,708 confirmed takedowns/dead). Site: https://phishdestroy.io