# PhishDestroy threat dossier — jetsenddelivery.com ================================================================ Fetched: 2026-04-30 05:43:40 UTC Canonical: https://phishdestroy.io/domain/jetsenddelivery.com/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 12/91 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, BitDefender, CRDF, CyRadar, Forcepoint ThreatSeeker, Fortinet, G-Data, Gridinsoft, Lionic, Sophos, Webroot ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 163.61.188.9 (US, Staten Island) ASN: AS153568 NEW DHAKA HARDWARE Hosting org: MIT Registrar: NameSilo, LLC !!! REGISTRAR INTEGRITY ALERT — NameSilo !!! NameSilo is a registrar documented by PhishDestroy as (1) publicly lying about received abuse reports, (2) shielding a $20M+ Monero-theft operation (xmrwallet.com) for 10 continuous years, and (3) retaliating against PhishDestroy by getting our X/Twitter account @Phish_Destroy banned after we published the evidence. Researchers/victims must ALWAYS CC compliance@icann.org on every abuse ticket — NameSilo has a track record of later claiming reports were never received. Primary sources: https://phishdestroy.io/namesilo-killed-our-twitter https://phishdestroy.io/xmrwallet-namesilo-exposed Nameservers: ["dns1.lytehosting.com", "dns2.lytehosting.com"] Registered: 2026-04-26 Page title: Jetsenddelivery | Home HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R12 Expires: 2026-07-25 Status: INVALID chain Fingerprint: f20c4edd6de34f6ecab41f35832d83b1cb4a6b3e90f52cce42465462242d497e Subject Alternative Names (related infrastructure — often same operator): - jetsenddelivery.com.swiftoraluxe.org - www.jetsenddelivery.com.swiftoraluxe.org ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-26 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-26 11:34:55 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-04-26 08:35:49 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-04-30 03:06:11 UTC Current status: ACTIVE / observable Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dc8ec-52b5-74d6-8f16-a5b8d33569a6/ URLQuery: https://urlquery.net/report/9bcf1703-c33a-4f19-a080-ac1b86370dea Wayback Machine: https://web.archive.org/web/*/jetsenddelivery.com crt.sh CT logs: https://crt.sh/?q=%25.jetsenddelivery.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=jetsenddelivery.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/jetsenddelivery.com URLhaus: https://urlhaus.abuse.ch/host/jetsenddelivery.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-26 11:35:21 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] jetsenddelivery.com poses as a delivery service but is under investigation as a suspected delivery scam site. This domain tricks users into entering personal or financial details under false pretenses, potentially leading to identity theft or fraudulent charges. The site masquerades as a legitimate delivery portal but is designed to harvest sensitive data from unsuspecting visitors. Avoid engaging with this site or providing any information. PhishDestroy identifies this domain as a high-risk delivery scam currently active and unresolved. The site was registered on May 17, 2025, through NameSilo, LLC, a domain registrar frequently exploited for malicious purposes. VirusTotal scanners currently show zero detections out of 95 security tools, meaning mainstream antivirus systems have not yet flagged the threat—highlighting the need for caution. The domain resolves to the IP address 163.61.188.9, which is associated with suspicious web activity. If you visited jetsenddelivery.com, do not enter any personal or payment information. Clear your browser cache and cookies related to this site. Run a security scan on your device using trusted antivirus software. Report the domain to your browser’s safety team and consider filing a complaint with the Federal Trade Commission (FTC) or your local cybercrime unit. Avoid clicking on any links from emails or messages claiming to be from this service—always verify delivery notifications directly through official courier websites. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260426-E12946 Favicon MD5: 13d57dbd39c003e06c38fb8ef75ffe8c TLS cert SHA-256: f20c4edd6de34f6ecab41f35832d83b1cb4a6b3e90f52cce42465462242d497e ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/jetsenddelivery.com/ JSON API: https://api.destroy.tools/v1/check?domain=jetsenddelivery.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io