# PhishDestroy threat dossier — krukanloqin.webflow.io ================================================================ Fetched: 2026-05-07 14:17:44 UTC Canonical: https://phishdestroy.io/domain/krukanloqin.webflow.io/ ## VERDICT ---------------------------------------------------------------- ACTIVE THREAT — multiple warning signs Composite threat score: 40/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 5/92 security vendors flagged this domain Flagging vendors: ChainPatrol, Fortinet, Kaspersky, LevelBlue, Webroot ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.64.151.8 Registrar: REGISTRAR_NOT_FOUND Nameservers: NS_NOT_FOUND Registered: 2026-05-07 Page title: Kɾαƙҽɳ® Lσɠιɳ - Lσɠ Iɳ ƚσ Mყ - Aƈƈσυɳƚ (σϝϝιƈιαʅ WҽႦʂιƚҽ) HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-06-27 Status: INVALID chain Fingerprint: 7a69dbcd62ed8b1fd312c31d15eac89dd681ec97a720d4fee29acafa644c63a9 Subject Alternative Names (related infrastructure — often same operator): - webflow.io ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-07 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-07 14:15:04 UTC (by PhishDestroy tracker) Last verified: 2026-05-07 17:15:14 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e0223-4543-77a8-b979-45c494d41171/ Wayback Machine: https://web.archive.org/web/*/krukanloqin.webflow.io crt.sh CT logs: https://crt.sh/?q=%25.krukanloqin.webflow.io Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=krukanloqin.webflow.io AlienVault OTX: https://otx.alienvault.com/indicator/domain/krukanloqin.webflow.io URLhaus: https://urlhaus.abuse.ch/host/krukanloqin.webflow.io/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-07 14:15:25 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies krukanloqin.webflow.io as an active crypto drainer domain currently under investigation. This Webflow-hosted page mimics legitimate services to siphon cryptocurrency from unsuspecting users. The infrastructure leverages Google Trust Services for SSL validation while resolving to IP 172.64.151.8 — a known dynamic hosting range. This domain presents minimal detection on VirusTotal with 0/95 security engines flagging it at the time of analysis. The associated SSL certificate, issued by Google Trust Services, shows no anomalies in trust scores, complicating initial detection. Active resolution points to 172.64.151.8, a Cloudflare-owned IP often used for fast-flux service delivery. While creation details remain unlisted in public WHOIS records, the zero detection rate suggests either recent deployment or highly evasive tactics. Mitigation requires immediate verification through PhishDestroy’s crawlers. Users who encounter this domain should avoid interaction entirely and report it via PhishDestroy’s portal. Blocking 172.64.151.8 at the network perimeter can prevent further exploitation. Webflow administrators should be notified to suspend the subdomain if malicious content is confirmed. [Updates since narrative was generated:] - VirusTotal detections: now 5/92 (narrative was written when count was lower) ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: 93e027afcac0d648c068444f8944526b TLS cert SHA-256: 7a69dbcd62ed8b1fd312c31d15eac89dd681ec97a720d4fee29acafa644c63a9 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/krukanloqin.webflow.io/ JSON API: https://api.destroy.tools/v1/check?domain=krukanloqin.webflow.io Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 146,925 domains (52,557 alive under monitoring, 94,029 confirmed takedowns/dead). Site: https://phishdestroy.io