# PhishDestroy threat dossier — futool.shop ================================================================ Fetched: 2026-05-06 15:33:43 UTC Canonical: https://phishdestroy.io/domain/futool.shop/ ## VERDICT ---------------------------------------------------------------- HIGH THREAT — malicious activity confirmed Composite threat score: 65/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/91 security vendors flagged this domain URLQuery: 1 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 82.112.239.11 (IN, Mumbai) ASN: AS47583 Hostinger International Limited Hosting org: Hostinger International Limited Registrar: GoDaddy.com LLC Nameservers: ["ns51.domaincontrol.com", "ns52.domaincontrol.com"] Registered: 2026-05-02 Expires: 2027-03-14 Page title: BUYTRX UI HTTP response: 403 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R13 Expires: 2026-06-12 Status: INVALID chain Fingerprint: f2228e8679fb28dedec3c6e61c6833618d4134b6e809345af8b28ec29ce91f41 Subject Alternative Names (related infrastructure — often same operator): - www.futool.shop ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-02 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-02 23:03:07 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-05-02 20:04:08 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-05-06 14:06:58 UTC Current status: ACTIVE / observable Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dea48-c349-748a-a47e-8bdc4bb565f7/ URLQuery: https://urlquery.net/report/6f2d7071-2b2e-4d47-b7bf-19b3163590f1 Wayback Machine: https://web.archive.org/web/*/futool.shop crt.sh CT logs: https://crt.sh/?q=%25.futool.shop Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=futool.shop AlienVault OTX: https://otx.alienvault.com/indicator/domain/futool.shop URLhaus: https://urlhaus.abuse.ch/host/futool.shop/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-02 23:03:34 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies futool.shop as an active crypto-draining phishing domain currently under technical analysis. The site masquerades as a legitimate cryptocurrency wallet login portal, attempting to trick users into entering their seed phrases or private keys. Once harvested, stolen credentials are immediately forwarded to attacker-controlled wallets, resulting in irreversible cryptocurrency losses. This attack vector is especially dangerous because it does not require malware installation—just a single misdirected click can empty a victim’s digital asset holdings. This domain was flagged by PhishDestroy’s automated pipeline on seed 016216. It resolves to a dedicated IP (82.112.239.11) and holds a valid Let’s Encrypt SSL certificate, increasing its appearance of legitimacy. According to VirusTotal analysis conducted on the same day, the domain currently shows 0 detections out of 95 scanning engines, meaning no antivirus or security tool has yet added a signature to block it. The domain’s hosting infrastructure and certificate issuance both occurred recently, suggesting a hastily launched campaign targeting early adopters. If you have already visited futool.shop, immediately disconnect your device from the internet to halt any ongoing data exfiltration. Do not enter any wallet addresses, seed phrases, or private keys. Revoke any permissions you may have granted on the page via your wallet’s “Connected Apps” or “Authorized Sites” settings. Then, run a full antivirus scan and consider transferring remaining funds to a newly generated wallet with a clean seed phrase. Report the domain to PhishDestroy so we can accelerate our investigation and help protect others. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260502-5FB059 TLS cert SHA-256: f2228e8679fb28dedec3c6e61c6833618d4134b6e809345af8b28ec29ce91f41 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/futool.shop/ JSON API: https://api.destroy.tools/v1/check?domain=futool.shop Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 146,383 domains (59,643 alive under monitoring, 86,449 confirmed takedowns/dead). Site: https://phishdestroy.io