# PhishDestroy threat dossier — im-token-app.net ================================================================ Fetched: 2026-04-22 04:17:31 UTC Canonical: https://phishdestroy.io/domain/im-token-app.net/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: OKX Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: content_divergence) (score: 1/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 13/94 security vendors flagged this domain URLQuery: 2 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 177.211.126.5 (HK, Mong Kok) ASN: AS134175 SH2206-AP Hosting org: HongKong Service Registrar: Dominet (HK) Limited Nameservers: ns1.domainnamens.com, ns2.domainnamens.com Registered: 2026-03-19 Expires: 2027-03-19 Page title: 404 Not Found HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: TrustAsia Technologies, Inc. / LiteSSL RSA CA 2025 Expires: 2026-06-18 Status: INVALID chain Fingerprint: e861968d14016b75599f9c75a1c70f6e4465ff5ec9dfa2611020275743f7d82b Subject Alternative Names (related infrastructure — often same operator): - www.im-token-app.net ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-03-19 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-15 08:16:03 UTC (by PhishDestroy tracker) First reported: 2026-04-15 05:14:42 UTC (abuse notice filed) Last verified: 2026-04-22 05:19:26 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d8f8e-79ce-738f-9898-3aedab44db72/ URLQuery: https://urlquery.net/report/0328ec3e-bc1c-4f4c-81b2-e8d340b398e2 Wayback Machine: https://web.archive.org/web/*/im-token-app.net crt.sh CT logs: https://crt.sh/?q=%25.im-token-app.net Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=im-token-app.net AlienVault OTX: https://otx.alienvault.com/indicator/domain/im-token-app.net URLhaus: https://urlhaus.abuse.ch/host/im-token-app.net/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-15 08:18:21 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies the domain im-token-app.net as a brand impersonation threat actively targeting OKX users. The site mimics the legitimate OKX brand to deceive visitors into entering sensitive credentials or cryptocurrency wallet information. Despite using HTTPS with a TrustAsia Technologies, Inc. SSL certificate, the domain shows clear signs of malicious intent, including a default 404 ‘Not Found’ page that suggests it is either under rapid development or a placeholder for a fraudulent landing page. The domain’s registration details—created on March 19, 2026, through Dominet (HK) Limited—and its resolution to IP 177.211.126.5 further indicate a recently established infrastructure with minimal footprint, making it likely to evade early detection by security vendors. The domain im-token-app.net currently shows 0 detections out of 95 VirusTotal scans, indicating it has not yet been widely flagged by antivirus engines. This low detection rate is concerning, especially given its active status and the use of a legitimate-appearing SSL certificate to build trust. The combination of a newly registered domain (NRD), a Hong Kong-based registrar, and a low VT score suggests this threat is in the early stages of deployment, potentially targeting users in regions where regulatory oversight or brand awareness is limited. While the page title ‘404 Not Found’ may seem benign, it is likely a placeholder for a future phishing or crypto drainer interface designed to harvest login credentials or private keys. If you have visited im-token-app.net or interacted with its content, disconnect from the internet immediately and scan your device with a reputable antivirus tool. Do not enter any credentials, wallet addresses, or private keys on the site. If you provided sensitive information, change passwords immediately and consider transferring funds from any connected wallets to a newly generated address. Report the domain to your IT security team or to PhishDestroy for further investigation. Monitor financial accounts and cryptocurrency wallets for unauthorized transactions. Always verify the authenticity of domains by cross-referencing official brand websites or using secure bookmarks. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260415-F3E2E1 Favicon MD5: 44643b44c31d2abe2f72ba853a7de525 TLS cert SHA-256: e861968d14016b75599f9c75a1c70f6e4465ff5ec9dfa2611020275743f7d82b ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/im-token-app.net/ JSON API: https://api.destroy.tools/v1/check?domain=im-token-app.net Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io