# forcedoop.com — SUSPICIOUS > forcedoop.com presents a low-level phishing risk. Users should remain cautious and avoid sharing sensitive info on this site. ## Summary PhishDestroy identifies forcedoop.com as an active domain associated with a generic phishing threat classified at a low risk level. This assessment reflects the domain's recent creation and limited evidence of widespread malicious activity. The threat type suggests potential attempts to deceive users into disclosing sensitive information. The domain forcedoop.com was registered on April 13, 2025, through NICENIC INTERNATIONAL GROUP CO., LIMITED and resolves to IP address 104.21.78.161. VirusTotal analysis reveals minimal detection, with only one out of 95 security vendors flagging the domain, indicating a low but present suspicion. The combination of its recent registration and hosting infrastructure suggests it may be used opportunistically in phishing campaigns rather than representing a sophisticated or widespread threat. Given its active status and association with phishing, users are advised to exercise caution when interacting with forcedoop.com. Avoid providing personal or financial details through this site. Security teams should monitor the domain for evolving activity, while end users can mitigate risk by employing updated security solutions and verifying URLs before engagement. The domain remains under observation as part of ongoing threat intelligence efforts. ## Threat Details - Verdict: SUSPICIOUS - Site status: alive (HTTP 526) - Page title: forcedoop.com | 526: Invalid SSL certificate ## Domain Intelligence - Registered: 2025-04-13 02:27:28 - Registrar: NICENIC INTERNATIONAL GROUP CO., LIMITED - Country: HK - IP: 104.21.78.161 - IP Country: US - IP City: San Francisco - IP Org: AS13335 Cloudflare, Inc. - Nameservers: adi.ns.cloudflare.com peyton.ns.cloudflare.com - SSL Issuer: Google Trust Services / WE1 ## Detection Status - VirusTotal: 2 vendors flagged Vendors: ["Fortinet"] - Google Safe Browsing: clean - Blocklists: 1 hits Lists: ["PhishDestroy"] ## Live Page Content ### Page Text forcedoop.com | 526: Invalid SSL certificate Invalid SSL certificate Error code 526 Visit cloudflare.com for more information. 2026-03-15 05:00:47 UTC You Browser Working Milan Cloudflare Working forcedoop.com Host Error What happened? The origin web server does not have a valid SSL certificate. What can I do? If you're a visitor of this website: Please try again in a few minutes. If you're the owner of this website: The SSL certificate presented by the server did not pass validation. This could indicate an expired SSL certificate or a certificate that does not include the requested domain name. Please contact your hosting provider to ensure that an up-to-date and valid SSL certificate issued by a Certificate Authority is configured for this domain name on the origin server. Additional troubleshooting information here. Cloudflare Ray ID: 9dc8f4dccb380e62 • Your IP: Click to reveal 104.28.155.148 • Performance & security by Cloudflare ### External Links - https://developers.cloudflare.com/support/troubleshooting/http-status-codes/cloudflare-5xx-errors/error-526/ - https://www.cloudflare.com/5xx-error-landing?utm_source=errorcode_526&utm_campaign=forcedoop.com ## Evidence - Screenshot: https://urlscan.io/screenshots/019cd940-4697-71ec-8dcf-c34e403b3e9d.png - Cloudflare Radar: https://radar.cloudflare.com/scan/4be9fcf7-d645-432e-bf57-3efcfa0b525b - PhishDestroy: https://phishdestroy.io/domain/forcedoop.com/ - LLM endpoint: https://phishdestroy.io/domain/forcedoop.com/llm.txt ## If You Visited This Site 1. Change any passwords you may have entered 2. Enable 2FA on all related accounts 3. Monitor your accounts for unauthorized activity 4. Report to: FBI IC3, Europol, local authorities --- Report by PhishDestroy | https://phishdestroy.io/domain/forcedoop.com/ Last updated: 2026-03-15