# lbgo373.live — SUSPICIOUS > lbgo373.live is a newly registered phishing domain (Jan 22, 2026) hosting a fake login page to steal credentials; users should avoid it despite the Let's. ## Summary lbgo373.live is a recently activated generic phishing domain actively distributing credential-harvesting pages designed to mimic legitimate login portals. Security researchers assess this domain as a high-risk trap intended to deceive users into entering sensitive information such as usernames, passwords, or payment details. The infrastructure behind the domain—hosted on IP 45.59.170.102—suggests coordinated hosting commonly associated with fraudulent campaigns targeting unsuspecting visitors. This domain represents a direct threat to user privacy and financial safety, leveraging freshly registered domains to bypass early detection mechanisms. Domain analysis reveals clear red flags validating its malicious intent. VirusTotal currently reports 0 detections out of 95 engines, indicating that signature-based scanning has not yet caught up with its evasion tactics. The domain was registered on January 22, 2026, classified as actively malicious under the seed identifier cb0f99. It is hosted on infrastructure frequently flagged in blocklists due to prior abuse, and employs a legitimate SSL certificate from Let’s Encrypt—a tactic often used to create false trust while concealing malicious payload delivery. Registrar NameCheap, Inc. is implicated, a platform known for both legitimate and malicious domain use depending on registration oversight. Users who have visited lbgo373.live should immediately cease entering any personal or financial information and exit the site. Clear browser cache and cookies related to the domain. If credentials were entered, change passwords immediately and enable multi-factor authentication across affected accounts. Consider using a reputable security tool to scan for malware or unauthorized access. Report the domain to your browser vendor or a threat intelligence service. This domain is confirmed malicious and should be blocked at the network and endpoint levels. Exercise caution with any newly registered domains offering login or financial prompts. ## Threat Details - Verdict: SUSPICIOUS - Site status: unknown (HTTP ?) ## Domain Intelligence - Registered: 2026-01-22 06:50:32 - Registrar: NameCheap, Inc. - IP: 45.59.170.102 ## Detection Status - VirusTotal: 0 vendors flagged - Google Safe Browsing: clean - Blocklists: 0 hits ## Evidence - Cloudflare Radar: https://radar.cloudflare.com/scan/a156547b-0571-4719-b72f-c4a1db9090cb - PhishDestroy: https://phishdestroy.io/domain/lbgo373.live/ - LLM endpoint: https://phishdestroy.io/domain/lbgo373.live/llm.txt ## If You Visited This Site 1. Change any passwords you may have entered 2. Enable 2FA on all related accounts 3. Monitor your accounts for unauthorized activity 4. Report to: FBI IC3, Europol, local authorities --- Report by PhishDestroy | https://phishdestroy.io/domain/lbgo373.live/ Last updated: 2026-03-24