# PhishDestroy threat dossier — japamexc.one ================================================================ Fetched: 2026-04-22 20:33:03 UTC Canonical: https://phishdestroy.io/domain/japamexc.one/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 78/100 (PhishDestroy scoring — see methodology below) Targeted brand: MEXC ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 6/95 security vendors flagged this domain Flagging vendors: Forcepoint ThreatSeeker, Fortinet, Google Safebrowsing, Kaspersky, LevelBlue, Seclookup URLQuery: 1 detections Public blocklists: listed on 1 independent blocklist Google Safe Browsing: FLAGGED ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 137.220.131.177 (JP, Tokyo) ASN: AS152194 CTG Server Limited Hosting org: Rackip Consultancy Pte. LTD Registrar: Gname.com Pte. Ltd. Nameservers: a.share-dns.com, a9.share-dns.com, b.share-dns.net, b9.share-dns.net Registered: 2026-03-13 Page title: MEXC ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R13 Expires: 2026-07-07 Status: INVALID chain Fingerprint: 690021f215935e1d49ea3811457f065ef68e07f47b21182cd0bf2dece4497b79 Subject Alternative Names (related infrastructure — often same operator): - cndzmexc.one - cndzmexc.shop - gnamexc.bond - gnamexc.cyou - japamexc.cyou - outmexc.cyou - outmexc.shop - searmexc.cyou - searmexc.shop - usamexc.icu - usamexc.shop - www.cndzmexc.one - www.cndzmexc.shop - www.gnamexc.bond - www.gnamexc.cyou ... +8 more ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-03-13 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-22 20:40:10 UTC (by PhishDestroy tracker) First reported: 2026-04-22 17:43:03 UTC (abuse notice filed) Last verified: 2026-04-22 22:59:53 UTC Neutralised: 2026-04-22 21:59:48 UTC Current status: taken down (registrar suspended or DNS dead) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019db645-70e7-7289-a328-b6db49f8a80b/ URLQuery: https://urlquery.net/report/38453baf-7b71-4330-a7a5-a0c37843563a Wayback Machine: https://web.archive.org/web/*/japamexc.one crt.sh CT logs: https://crt.sh/?q=%25.japamexc.one Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=japamexc.one AlienVault OTX: https://otx.alienvault.com/indicator/domain/japamexc.one URLhaus: https://urlhaus.abuse.ch/host/japamexc.one/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-22 20:41:49 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy has identified japamexc.one as an active phishing domain designed to impersonate the legitimate MEXC cryptocurrency exchange. This site mimics the real platform to trick users into entering login credentials or payment details, which are then harvested by attackers for fraud or resale on dark web markets. The domain’s primary threat is credential theft via brand impersonation, targeting users who may mistake it for the official MEXC website. This domain was flagged by 6 out of 95 VirusTotal security vendors and is blocked by InversionDNS. It was registered on March 13, 2026, through Gname.com Pte. Ltd., and resolves to the IP address 137.220.131.177. Its SSL certificate is issued by Let’s Encrypt, a common tactic to appear legitimate. Google Safe Browsing classifies it under SOCIAL_ENGINEERING, indicating deceptive practices aimed at manipulating users. If you visited japamexc.one, avoid entering any personal information, including usernames, passwords, or payment details. Disconnect from the site immediately and scan your device for malware using reputable antivirus software. If you reused passwords from this site elsewhere, change them on all accounts and enable two-factor authentication where possible. Report the domain to your organization’s security team or through platforms like PhishDestroy to help block it for others. Never rely solely on SSL certificates or domain age as indicators of safety—always verify URLs through official channels before interacting with financial platforms. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260422-698A90 Favicon MD5: 3618d84719a0fc7ff3936e24530d23af TLS cert SHA-256: 690021f215935e1d49ea3811457f065ef68e07f47b21182cd0bf2dece4497b79 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/japamexc.one/ JSON API: https://api.destroy.tools/v1/check?domain=japamexc.one Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io