# PhishDestroy threat dossier — igxmhys.com ================================================================ Fetched: 2026-05-01 15:34:21 UTC Canonical: https://phishdestroy.io/domain/igxmhys.com/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 59/100 (PhishDestroy scoring — see methodology below) Scam classification: Generic Phishing ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 1/94 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 154.26.192.23 (US, Los Angeles) ASN: AS18186 Nebula Global LLC Hosting org: FSC NETWORK LTD Registrar: Gname.com Pte. Ltd. Nameservers: ["a5.share-dns.com", "b5.share-dns.net"] Registered: 2026-03-28 Page title: IGX ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R12 Expires: 2026-05-12 Status: INVALID chain Fingerprint: e70b2b93b78cacb66c52af713a036e0260135b1fc82816b8258000d34f7175c9 Subject Alternative Names (related infrastructure — often same operator): - cliffexmeats.com - igxim.com - igxqs.com - igxvbp.com - igxvbp.net ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-03-28 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-03-28 17:52:36 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-03-28 14:53:16 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-04-28 19:40:28 UTC Neutralised: 2026-04-23 00:27:42 UTC Current status: taken down (registrar suspended or DNS dead) Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d34ed-c98f-75a9-a014-dc6d399476a8/ URLQuery: https://urlquery.net/report/c9e455df-b688-4c3b-919c-9051ce53d664 Wayback Machine: https://web.archive.org/web/*/igxmhys.com crt.sh CT logs: https://crt.sh/?q=%25.igxmhys.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=igxmhys.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/igxmhys.com URLhaus: https://urlhaus.abuse.ch/host/igxmhys.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-03-28 17:54:15 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies igxmhys.com as an active credential-harvesting phishing domain. This domain is designed to mimic legitimate login portals and trick users into submitting sensitive credentials such as usernames, passwords, or payment details. The infrastructure behind igxmhys.com is hosted on IP address 154.26.192.23, with an SSL certificate issued by Let’s Encrypt to appear trustworthy. The domain was registered through Gname.com Pte. Ltd. on November 11, 2025, indicating recent and opportunistic deployment. This domain poses an elevated risk due to its active use in phishing campaigns. Intelligence confirms that only 1 out of 95 security vendors currently detect igxmhys.com, leaving most users vulnerable to exposure. The low detection rate highlights the stealthy nature of this campaign, which likely targets unsuspecting victims through social engineering tactics such as deceptive emails or fake websites. Given the domain’s recent creation and minimal blocklist presence, it is likely part of a rapidly evolving campaign aimed at harvesting credentials across multiple sectors. Users who have visited igxmhys.com should immediately cease any interaction and avoid entering credentials. If credentials were entered, users must change passwords on all related accounts and enable multi-factor authentication where available. Organizations should block the domain and IP address (154.26.192.23) at the network perimeter. Security teams should also scan for lateral movement or data exfiltration if the domain was accessed from internal systems. Report the domain to your security provider and relevant threat intelligence platforms to improve detection coverage. This domain should be treated as hostile until further analysis confirms otherwise. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260328-0ACDCD Favicon MD5: 1ba2ae710d927f13d483fd5d1e548c9b TLS cert SHA-256: e70b2b93b78cacb66c52af713a036e0260135b1fc82816b8258000d34f7175c9 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/igxmhys.com/ JSON API: https://api.destroy.tools/v1/check?domain=igxmhys.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io