# PhishDestroy threat dossier — keodax.win ================================================================ Fetched: 2026-04-30 18:38:50 UTC Canonical: https://phishdestroy.io/domain/keodax.win/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Crypto Casino / Gambling Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: content_divergence) (score: 1/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 11/94 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, Bfore.Ai PreCrime, BitDefender, CRDF, Forcepoint ThreatSeeker, Fortinet, G-Data, Kaspersky, Netcraft, SOCRadar URLQuery: 2 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.67.164.185 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Gname.com Pte. Ltd. Nameservers: ["art.ns.cloudflare.com", "lady.ns.cloudflare.com"] Registered: 2026-04-13 Page title: Keodax: Elon Musk’s Official Crypto Casino Powered by Blockchain HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E8 Expires: 2026-06-07 Status: INVALID chain Fingerprint: c054a8ced1e7fde387fc681dc9d17cb3cc0044241b1ec4df34f8cbf530c130d4 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-13 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-13 16:26:39 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-04-13 13:29:06 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-04-30 18:06:19 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d8703-30fe-7459-b109-b84a4176ef71/ URLQuery: https://urlquery.net/report/912421f3-2199-4195-a2ce-4050b14adaa6 Wayback Machine: https://web.archive.org/web/*/keodax.win crt.sh CT logs: https://crt.sh/?q=%25.keodax.win Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=keodax.win AlienVault OTX: https://otx.alienvault.com/indicator/domain/keodax.win URLhaus: https://urlhaus.abuse.ch/host/keodax.win/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-13 16:29:01 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies keodax.win as an active generic phishing domain targeting unsuspecting users with deceptive lures. The domain exhibits no affiliation with legitimate brands, suggesting opportunistic malicious activity aimed at harvesting credentials or personal information. No known drainer kit signatures or brand impersonation tactics are currently attributed to this Infrastructure, indicating a potentially adaptive or evolving threat actor leveraging generic phishing templates. The absence of specific brand targeting may broaden its victim pool but also signals a less sophisticated operation compared to highly customized phishing campaigns. keodax.win was registered on March 09, 2026, through Gname.com Pte. Ltd., a registrar frequently observed in malicious domain registrations. The domain resolves to IP address 172.67.164.185 and employs a Let’s Encrypt SSL certificate to enhance perceived legitimacy. According to VirusTotal, the domain is flagged by 6 out of 95 security vendors, placing it in a statistically elevated risk category. Google Safe Browsing (GSB) data indicates this domain has been added to multiple blocklists, though the exact count is not specified. The recent domain creation date and low but non-zero detection rate suggest this phishing operation may still be in its early stages, with potential for escalation as more users encounter the site. At present, keodax.win remains active and accessible, currently unresolved for takedown or remediation by authoritative sources. Users should avoid interacting with this domain entirely, as even passive exposure may expose them to credential theft or malware. Actionable safety guidance includes blocking the domain at the network level, updating local blacklists, and reporting the domain to security vendors for proactive blocking. While the immediate risk is elevated due to its active status and low detection rate, the long-term persistence of this domain remains uncertain. Continued monitoring is warranted due to its potential to expand into more sophisticated campaigns or affiliate with larger phishing ecosystems. PhishDestroy advises heightened vigilance against similar newly registered domains flagged by minority detection engines, as these often represent emerging threats before achieving widespread recognition. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260413-1EFCEB Favicon MD5: 936386e361020ac6bcebbcc772491fbb TLS cert SHA-256: c054a8ced1e7fde387fc681dc9d17cb3cc0044241b1ec4df34f8cbf530c130d4 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/keodax.win/ JSON API: https://api.destroy.tools/v1/check?domain=keodax.win Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io