# PhishDestroy threat dossier — imtokensite.net ================================================================ Fetched: 2026-04-22 10:20:23 UTC Canonical: https://phishdestroy.io/domain/imtokensite.net/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: OKX Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: content_divergence) (score: 1/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 2/94 security vendors flagged this domain Flagging vendors: Gridinsoft, Sophos ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 177.211.126.52 (HK, Mong Kok) ASN: AS134175 SH2206-AP Hosting org: HongKong Service Registrar: Dominet (HK) Limited Nameservers: ["ns1.domainnamens.com", "ns2.domainnamens.com"] Registered: 2026-04-21 HTTP response: 200 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-21 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-21 19:45:53 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-04-21 16:46:40 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-04-22 13:00:54 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019db0ee-38a4-7638-8ae0-5e8f0d38ba9a/ URLQuery: https://urlquery.net/report/4caf41ab-956a-4104-abc9-27595a7e9c77 Wayback Machine: https://web.archive.org/web/*/imtokensite.net crt.sh CT logs: https://crt.sh/?q=%25.imtokensite.net Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=imtokensite.net AlienVault OTX: https://otx.alienvault.com/indicator/domain/imtokensite.net URLhaus: https://urlhaus.abuse.ch/host/imtokensite.net/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-21 19:46:27 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies imtokensite.net as a live OKX wallet impersonation site designed to trick users into entering their private keys or seed phrases. The page closely mimics the real OKX wallet interface to harvest login credentials and digital assets. This domain was flagged as an active brand impersonation campaign on March 21, 2026, with no detections on VirusTotal as of the latest scan (0/95 engines). This domain resolves to IP 177.211.126.52 and uses a TrustAsia Technologies SSL certificate, which does not belong to OKX. It was registered through Dominet (HK) Limited just days ago, a red flag for newly created impersonation sites. The combination of fresh registration, low detection rate, and direct OKX branding makes this a high-risk trap for cryptocurrency users. If you visited imtokensite.net, do not enter any passwords, seed phrases, or wallet details. Disconnect from the site immediately and revoke any credentials you may have shared. Run a malware scan on your device and monitor your crypto wallets for unauthorized transactions. Report the domain to OKX support and your browser’s safe browsing team to help block future access. [Updates since narrative was generated:] - VirusTotal detections: now 2/94 (narrative was written when count was lower) ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260421-5891C5 Favicon MD5: 3dcba5e423cd000a9de2bbe73b39af78 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/imtokensite.net/ JSON API: https://api.destroy.tools/v1/check?domain=imtokensite.net Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io