# PhishDestroy threat dossier — guide--trezer-bridgge.pages.dev ================================================================ Fetched: 2026-05-01 14:57:02 UTC Canonical: https://phishdestroy.io/domain/guide--trezer-bridgge.pages.dev/ ## VERDICT ---------------------------------------------------------------- ACTIVE THREAT — multiple warning signs Composite threat score: 57/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Trezor ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/95 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.66.47.191 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Cloudflare, Inc. Nameservers: evangeline.ns.cloudflare.com, koa.ns.cloudflare.com Registered: 2026-05-01 Page title: Trezor Bridge — Secure Wallet Communication Layer App HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-07-30 Status: INVALID chain Fingerprint: 5351faec9d02d5a7da02e45d806c1134abeb053a6da59dd2762c870cb756ec4a ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-01 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-01 12:51:12 UTC (by PhishDestroy tracker) Last verified: 2026-05-01 17:15:43 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019de2f1-8ab2-741d-b16a-0cb788062c31/ Wayback Machine: https://web.archive.org/web/*/guide--trezer-bridgge.pages.dev crt.sh CT logs: https://crt.sh/?q=%25.guide--trezer-bridgge.pages.dev Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=guide--trezer-bridgge.pages.dev AlienVault OTX: https://otx.alienvault.com/indicator/domain/guide--trezer-bridgge.pages.dev URLhaus: https://urlhaus.abuse.ch/host/guide--trezer-bridgge.pages.dev/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-01 12:52:40 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies guide--trezer-bridgge.pages.dev as an active phishing domain designed to harvest user credentials under the guise of a generic portal. This impersonation leverages Cloudflare’s Pages.dev infrastructure to lend superficial legitimacy while hosting fraudulent content. The domain currently resolves to IP 172.66.47.191 and operates with an SSL certificate issued by Google Trust Services, which may deceive users expecting encrypted connections. The threat actor’s goal appears to be the capture of login credentials or sensitive input through a convincing facsimile of a legitimate service. This domain exhibits concerning technical indicators that warrant heightened scrutiny. As of the latest assessment, VirusTotal reports zero detections across 95 scanning engines, indicating that traditional signature-based defenses have not yet flagged the infrastructure. The domain was registered through Cloudflare, Inc., which obscures true ownership and hosting details, a common tactic in phishing campaigns. While specific creation dates and blocklist counts are not publicly available at this time, the absence of detections despite active hosting suggests either a recently deployed operation or one employing evasive techniques such as fast-flux DNS or dynamic IP rotation. The use of a Google-issued SSL certificate further complicates detection, as users may uncritically trust the padlock icon in their browser. Users who have interacted with guide--trezer-bridgge.pages.dev are advised to immediately change any passwords entered on the site and enable multi-factor authentication wherever possible. Monitor financial accounts and email inboxes for signs of credential misuse or phishing follow-ups. If suspicious activity is detected, revoke access to any services tied to the compromised credentials and report the incident to your organization’s security team or relevant abuse channels. Do not attempt to re-engage with the domain, as further exposure may lead to additional compromise. Consider blocking the domain and its associated IP (172.66.47.191) at the network perimeter to prevent accidental access. This domain remains under active investigation, and security teams should treat it as a high-risk indicator of compromise until conclusive evidence of remediation is available. ## EVIDENCE HASHES ---------------------------------------------------------------- TLS cert SHA-256: 5351faec9d02d5a7da02e45d806c1134abeb053a6da59dd2762c870cb756ec4a ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/guide--trezer-bridgge.pages.dev/ JSON API: https://api.destroy.tools/v1/check?domain=guide--trezer-bridgge.pages.dev Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io