# PhishDestroy threat dossier — gamelive.fun ================================================================ Fetched: 2026-05-04 19:33:29 UTC Canonical: https://phishdestroy.io/domain/gamelive.fun/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: content_divergence) (score: 2/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 3/91 security vendors flagged this domain URLQuery: 2 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 104.21.52.130 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Registrar of Domain Names REG.RU LLC Nameservers: ezra.ns.cloudflare.com, jocelyn.ns.cloudflare.com Registered: 2026-03-30 Page title: Pump HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E7 Expires: 2026-07-31 Status: INVALID chain Fingerprint: b8bd4b896521f88ef9aaffa05a4fff2e8a78b7a61b310a1e9df22d63f0ba15bd ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-03-30 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-03 00:26:08 UTC (by PhishDestroy tracker) First reported: 2026-05-02 21:27:33 UTC (abuse notice filed) Last verified: 2026-05-04 20:04:27 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dea94-e1ba-73c8-9efe-b0c73a786d35/ URLQuery: https://urlquery.net/report/b49bd1c7-8236-47ca-93cc-c41800c4f579 Wayback Machine: https://web.archive.org/web/*/gamelive.fun crt.sh CT logs: https://crt.sh/?q=%25.gamelive.fun Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=gamelive.fun AlienVault OTX: https://otx.alienvault.com/indicator/domain/gamelive.fun URLhaus: https://urlhaus.abuse.ch/host/gamelive.fun/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-03 00:27:01 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy analysts have identified that gamelive.fun is a recently activated domain designed to steal user credentials under the guise of a gaming platform. Evidence suggests the operators are deploying generic phishing tactics to harvest usernames, passwords, and possibly payment details. This is not a legitimate gaming service—it is an active trap targeting unsuspecting visitors. This domain was flagged by PhishDestroy under investigation (risk level: under_investigation) with technical indicators including a creation date of March 30, 2026, zero detections on VirusTotal (0/95), and hosting on IP address 104.21.52.130. It is registered via REG.RU LLC and secured with a Let’s Encrypt SSL certificate, which are common tactics to appear legitimate. These factors combine to form a high-risk profile despite the recent deployment. If you visited gamelive.fun, do not enter any personal or financial information. Revoke any saved passwords used on the site, enable two-factor authentication on your accounts, and scan your devices for malware. Report the domain to your security team or platform provider. Do not click on any links or download files from this domain. Stay vigilant—this site is likely part of a broader phishing campaign detected through seed d70aa7. [Updates since narrative was generated:] - VirusTotal detections: now 3/91 (narrative was written when count was lower) ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260502-53909E Favicon MD5: fcfcdf1ad93d13a399e79dfbd14bf3c9 TLS cert SHA-256: b8bd4b896521f88ef9aaffa05a4fff2e8a78b7a61b310a1e9df22d63f0ba15bd ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/gamelive.fun/ JSON API: https://api.destroy.tools/v1/check?domain=gamelive.fun Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 145,648 domains (56,190 alive under monitoring, 89,198 confirmed takedowns/dead). Site: https://phishdestroy.io