⚠️
This domain has been flagged as malicious
Detected by 16 security vendors. Exercise extreme caution — do not enter personal information or connect wallets.

haedal[.]airdrpsalerts[.]click

Domain Security & Threat Intelligence Report

16/95 VT Taken Down Nov 13, 2025 Angel Drainer
79 Threat
PhishDestroy AI
HIGH
Ref
C2310B07
Score
79/100
Engine
PD-4 Turbo
The domain haedal.airdrpsalerts.click has been identified as a phishing site that impersonates legitimate services to deceive users. It has a VirusTotal detection score of 16 out of 95, indicating a significant level of malicious activity. The phishing campaign involved an 'Angel Drainer' designed to extract sensitive information from victims.

This domain was registered with Dynadot, LLC, and it is relatively new, having been active for just 112 days. It is associated with the IP address 198.18.1.71. The domain has been flagged for its association with phishing activities and is currently blocklisted. Its recent activity suggests that it was likely used for malicious purposes just prior to being taken down.

haedal.airdrpsalerts.click has been successfully taken down by PhishDestroy, which has reported the site and placed it on a monitoring list to prevent future reactivation. The proactive measures taken help mitigate further risk associated with this phishing domain.
VirusTotal
16 Detections
URLScan.io
Domain Age
113 days New
Site Status
Taken Down HTTP 403
DestroyList
Listed
User Reports
1 report

Threat Response Pipeline

Discovery
Submission
Legal
Takedown
12/13
Pre-emptive Discovery & Ingestion
30+ Proprietary Parsers · Infrastructure Analysis · Threat Ingested
3/3 ✓
30+ Proprietary Parsers
Distributed network scanning Google Ads (malvertising), SEO-manipulated results, Twitter/X, YouTube & Telegram campaigns
Infrastructure Analysis
dnstwist & typosquatting detection to catch look-alike domains targeting established brands
Threat Ingested
haedal.airdrpsalerts.click detected and queued for full analysis
Nov 13, 2025
Global Ecosystem Submission
50+ Vendor Submissions · VirusTotal · Drainer Identified
3/3 ✓
50+ Vendor Submissions
Data submitted to Cloudflare, Google Safe Browsing, Microsoft, VirusTotal, Netcraft, ESET, Bitdefender, Norton, Avira, PhishTank, Dr.Web, URLScan.io, PolySwarm & more
VirusTotal
16 / 95 vendors flagged on VirusTotal
Feb 23, 2026
Drainer Identified
Angel Drainer wallet drainer
Legal Notifications & Reporting
ICANN Compliance Reports · DestroyList Published · Abuse Report Pending · Re-detection Logic
3/4
ICANN Compliance Reports
Formal abuse notifications aligned with ICANN standards, including forensic evidence packages (metadata, screenshots, PDF)
DestroyList Published
Added to PhishDestroy/DestroyList — open-source blocklist for wallets & extensions
Nov 13, 2025
Abuse Report Pending
Will be sent to registrar (Dynadot, LLC) & hosting
Re-detection Logic
Follow-up alerts if threat remains active beyond 24 hours — automated re-reporting cycle
Public Transparency & Takedown
Open Threat Database · Social Broadcasting · Domain Taken Down
3/3 ✓
Open Threat Database
Real-time commits to GitHub repository & live monitoring at phishdestroy.io/live
Social Broadcasting
Automated alerts on Twitter, Telegram & Mastodon channels
Domain Taken Down
Phishing site is offline — no longer serving malicious content

Public Blocklist Status

Evidence Capture

Snapshot
2025-11-13 16:39 UTC
Malicious
Forensic screenshot of haedal.airdrpsalerts.click
IP: 198.18.1.71
Dynadot, LLC
113d

Domain Intelligence

Domainhaedal.airdrpsalerts.click
RegistrarDynadot, LLC (USA)
IP Address198.18.1.71
CreatedNov 04, 2025 (113 days — New)
ExpiresNov 04, 2026
Nameserversbrenna.ns.cloudflare.com
hassan.ns.cloudflare.com
Abuse Contactsabuse@dynadot.com
First DetectedNov 13, 2025
Registrar Response0h
HTTP Status403
Report This Domain Submit evidence & help protect others

VirusTotal Analysis

16 / 95 security vendors flagged this domain
View on VT
ADMINUSLabs
ChainPatrol
alphaMountain.ai
BitDefender
CRDF
CyRadar
ESET
Forcepoint ThreatSeeker
Fortinet
G-Data
Lionic
Seclookup
SOCRadar
Sophos
VIPRE
Webroot

Evidence & External Reports

Were You Affected by This Site?

You are not alone and there is nothing to be ashamed of. Scammers are sophisticated criminals who exploit trust. Reporting your experience is the most powerful weapon against fraud — your report can prevent others from becoming victims and help law enforcement take action. Silence is the scammer's greatest advantage. Break it.

If you have interacted with this domain, entered personal information, or connected a cryptocurrency wallet — take immediate action. Below are resources to help you report the incident and protect yourself.

Beware of recovery scammers! After being scammed, criminals may contact you again pretending to be "recovery agents," lawyers, or investigators who claim they can retrieve your lost funds — for a fee. This is a second scam. No legitimate service will ask for upfront payment to recover stolen crypto. Learn more about recovery fraud →

Report to Your Local Authorities

Select your country to see local cybercrime reporting contacts and complaint templates.

Select your country...

Related Domain Reports

pedagiomotiva.click
8 detections
bitfinexs.click
1 detections
pol-usdc.skydao.click
2 detections
contentstatus-x.click
2 detections
hetalis-vita.click
2 detections
guideviolation-x.click
3 detections
appealportal-x.click
10 detections
mexo.click
1 detections

Other Domains on 198.18.1.71

zircuit.airdropsalert.life 16 sl-web.fr 14 sonami-so.info 14 kernel-waveform-nexus.com 10 paydax.store 10 lidofidesktop.com 9

More Domains at Dynadot, LLC

mete-ora.my 1 coin-strike.eu 1 www.diskgas-entregas.click 2 cricfytv.com.in 7 imtoken.bot 18 atom.27836.click 17

Stay Informed, Stay Safe

Monitor live threats or contest this listing if you believe it's a false positive

Live Threat Feed Appeal This Listing