# PhishDestroy threat dossier — ledger--liveap-run.pages.dev ================================================================ Fetched: 2026-04-22 22:17:47 UTC Canonical: https://phishdestroy.io/domain/ledger--liveap-run.pages.dev/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 99/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Ledger ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 4/94 security vendors flagged this domain Flagging vendors: ADMINUSLabs, Kaspersky, LevelBlue, Netcraft ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.66.44.209 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Cloudflare, Inc. Nameservers: apollo.ns.cloudflare.com, desi.ns.cloudflare.com Registered: 2026-04-03 Page title: Suspected phishing site | Cloudflare HTTP response: 403 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-06-26 Status: INVALID chain Fingerprint: a8fda94ab93b5d355440fd2d75921ac77ed328a2cef311525ba8007a3a883c6e ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-03 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-03 02:57:13 UTC (by PhishDestroy tracker) Last verified: 2026-04-21 16:10:05 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d50a0-6609-7597-97ae-bbf6a0d4e219/ Wayback Machine: https://web.archive.org/web/*/ledger--liveap-run.pages.dev crt.sh CT logs: https://crt.sh/?q=%25.ledger--liveap-run.pages.dev Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=ledger--liveap-run.pages.dev AlienVault OTX: https://otx.alienvault.com/indicator/domain/ledger--liveap-run.pages.dev URLhaus: https://urlhaus.abuse.ch/host/ledger--liveap-run.pages.dev/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-03 02:58:57 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies ledger--liveap-run.pages.dev as an actively running brand impersonation scam that masquerades as Ledger, a prominent cryptocurrency hardware wallet manufacturer. The domain is designed to deceive users into believing they are accessing an official Ledger service, likely to steal cryptocurrency assets or harvest sensitive credentials. Given the domain's recent activation status and lack of detection by security engines, this threat poses a significant risk to users who may inadvertently expose their private keys, seed phrases, or other authentication details. The campaign leverages Ledger's trusted brand reputation to lower user suspicion, making it a prime vector for financial theft or credential harvesting in the cryptocurrency ecosystem. This domain resolves to IP address 172.66.44.209 and operates under Cloudflare's infrastructure, which is commonly exploited by threat actors to obfuscate hosting origins and evade takedowns. The domain was registered through Cloudflare, Inc., a legitimate service provider, but its malicious intent is evidenced by its active impersonation of the Ledger brand. VirusTotal currently reports 0 detections out of 95 scanning engines, indicating that mainstream security tools have yet to flag this threat. The domain utilizes an SSL certificate issued by Google Trust Services, a trusted Certificate Authority, which may further legitimize its appearance to unsuspecting users. Notably, the domain employs a subdomain structure (pages.dev) under Cloudflare Pages, a legitimate platform often abused for phishing due to its rapid deployment capabilities and built-in CDN services. To mitigate exposure to this threat, users should avoid interacting with ledger--liveap-run.pages.dev or any similar domains claiming to represent Ledger without verifying the official website (https://www.ledger.com) directly. Always navigate to official sites via manual URL entry or verified bookmarks, and enable multi-factor authentication (MFA) on all cryptocurrency-related accounts. Additionally, revoke any permissions granted to suspicious domains and report the domain to Ledger's official fraud reporting channels for investigation. Security teams should monitor for emerging domains using the Ledger brand and block this IP (172.66.44.209) at the network perimeter. For further validation, consult PhishDestroy's threat database using seed 469679. ## EVIDENCE HASHES ---------------------------------------------------------------- TLS cert SHA-256: a8fda94ab93b5d355440fd2d75921ac77ed328a2cef311525ba8007a3a883c6e ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/ledger--liveap-run.pages.dev/ JSON API: https://api.destroy.tools/v1/check?domain=ledger--liveap-run.pages.dev Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io