# geminieologin.gitbook.io — MALICIOUS > geminieologin.gitbook.io is a brand impersonation phishing site mimicking Gemini. This domain was flagged by 8/95 VirusTotal security vendors. ## Summary PhishDestroy identifies geminieologin.gitbook.io as an active brand impersonation phishing domain targeting Gemini users. The domain is hosted on Cloudflare’s infrastructure and leverages GitBook’s legitimate subdomain service (gitbook.io) to appear authentic, potentially tricking users into surrendering login credentials under the guise of a Gemini login portal. No known drainer kit is associated with this domain at the time of analysis, but its impersonation tactics suggest a focus on credential harvesting. The threat vector relies on visual deception rather than technical exploitation, relying on user trust in familiar brands and platforms. EXACT technical indicators for geminieologin.gitbook.io include a VirusTotal detection score of 8 out of 95 security vendors, a registration date of March 30, 2014, and resolution to IP address 104.18.40.47. The domain is registered through Cloudflare, Inc and utilizes a Google Trust Services SSL certificate, which may contribute to a false sense of legitimacy. This domain is currently marked as active in PhishDestroy’s threat database and has not been flagged by Google Safe Browsing (GSB) as of the latest scan. It has likely evaded automated detection due to its use of a reputable third-party platform (GitBook) and benign historical registration date. While no direct association with a drainer kit was observed, its impersonation of the Gemini brand makes it a high-risk vector for financial credential theft. This domain remains active and poses an elevated risk to users who may confuse it with official Gemini login pages. Immediate actions include updating browser blocklists and enterprise DNS filters to block 104.18.40.47 and geminieologin.gitbook.io at the network level. Users are advised to verify URLs via official channels and enable multi-factor authentication on all cryptocurrency accounts. While the SSL certificate and GitBook hosting complicate detection, the combination of brand impersonation and moderate VirusTotal detection indicates a credible ongoing threat. The risk remains elevated due to the plausibility of the deception and the potential for real user compromise. PhishDestroy recommends treating this domain as a confirmed phishing site and blocking all access until takedown or deactivation is confirmed. ## Threat Details - Verdict: MALICIOUS - Site status: unknown (HTTP ?) - Target brand: Gemini ## Domain Intelligence - Registered: 2014-03-30 06:09:09 - Registrar: Cloudflare, Inc - IP: 104.18.40.47 ## Detection Status - VirusTotal: 8 vendors flagged - Google Safe Browsing: clean - Blocklists: 0 hits ## Evidence - Cloudflare Radar: https://radar.cloudflare.com/scan/19608e4a-a488-45e8-9885-43068e619154 - PhishDestroy: https://phishdestroy.io/domain/geminieologin.gitbook.io/ - LLM endpoint: https://phishdestroy.io/domain/geminieologin.gitbook.io/llm.txt ## If You Visited This Site 1. Change any passwords you may have entered 2. Enable 2FA on all related accounts 3. Monitor your accounts for unauthorized activity 4. Report to: FBI IC3, Europol, local authorities --- Report by PhishDestroy | https://phishdestroy.io/domain/geminieologin.gitbook.io/ Last updated: 2026-03-26