# PhishDestroy threat dossier — ldgr-live-web-atn.pages.dev ================================================================ Fetched: 2026-04-30 20:07:28 UTC Canonical: https://phishdestroy.io/domain/ldgr-live-web-atn.pages.dev/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Ledger ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 11/91 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, BitDefender, CyRadar, Forcepoint ThreatSeeker, Fortinet, G-Data, Kaspersky, LevelBlue, Lionic, Sophos ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.66.44.96 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Cloudflare, Inc. Nameservers: hans.ns.cloudflare.com, izabella.ns.cloudflare.com Registered: 2026-04-27 Page title: Ledger Live — Secure Crypto Management App HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-06-25 Status: INVALID chain Fingerprint: 8100ec44ee52278c438afdb858508d04edb76b75e2757cfbec48aa616233c63c ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-27 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-27 08:25:03 UTC (by PhishDestroy tracker) Last verified: 2026-04-29 07:40:10 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dcd64-39af-75c8-a2e8-75362369e77e/ Wayback Machine: https://web.archive.org/web/*/ldgr-live-web-atn.pages.dev crt.sh CT logs: https://crt.sh/?q=%25.ldgr-live-web-atn.pages.dev Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=ldgr-live-web-atn.pages.dev AlienVault OTX: https://otx.alienvault.com/indicator/domain/ldgr-live-web-atn.pages.dev URLhaus: https://urlhaus.abuse.ch/host/ldgr-live-web-atn.pages.dev/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-27 08:26:14 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] A previously undetected domain, ldgr-live-web-atn.pages.dev, is undergoing active evaluation for cryptocurrency drainer activity after being linked to a potential credential theft campaign. The observed infrastructure, hosted behind Cloudflare’s pages.dev service, suggests an attempt to evade traditional network defenses while leveraging trusted certificate authorities to establish legitimacy. As of current analysis cycles, this domain remains unflagged across leading threat intelligence platforms—posing a latent risk to organizations and individuals engaging with web-based transactions or content delivery endpoints. This domain resolves to the IP address 172.66.44.96, which is associated with Cloudflare’s content delivery network (CDN) infrastructure. The domain was registered through Cloudflare, Inc., a well-known privacy-focused registrar often abused in fast-flux hosting and evasion strategies. Notably, the SSL certificate in use is issued by Google Trust Services—an uncommon but increasingly observed tactic among threat actors seeking to cloak malicious activity under reputable cryptographic trust chains. Despite zero detections on VirusTotal (0 out of 95 security vendors), this domain has drawn attention due to the absence of prior reputation and the use of dynamic hosting indicative of rapid deployment and evasion. No blocklist entries were found at the time of analysis. The ongoing investigation classifies this domain as ACTIVE with a risk level currently labeled as UNDER_INVESTIGATION. Given the potential for cryptocurrency drainer deployment or brand impersonation, all security teams are advised to immediately block or monitor traffic to and from 172.66.44.96 and ldgr-live-web-atn.pages.dev at the network perimeter. Additionally, users should avoid accessing this domain until further validation is complete. A YARA rule based on observed page structure and JavaScript payloads has been drafted for internal deployment, and behavioral monitoring for unusual outbound traffic to unknown addresses—particularly involving wallet connections or transaction initiation—should be prioritized. This domain may be repurposed or re-registered under different hashes or subdomains; continuous monitoring via DNS sinkholes and SSL certificate transparency logs is strongly recommended. ## EVIDENCE HASHES ---------------------------------------------------------------- TLS cert SHA-256: 8100ec44ee52278c438afdb858508d04edb76b75e2757cfbec48aa616233c63c ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/ldgr-live-web-atn.pages.dev/ JSON API: https://api.destroy.tools/v1/check?domain=ldgr-live-web-atn.pages.dev Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io