# lidostentaking.gitbook.io — SUSPICIOUS > lidostentaking.gitbook.io impersonates Lido brand. Crypto drainer site flagged by 0 of 95 VirusTotal vendors. Verify safety on PhishDestroy before interaction. ## Summary PhishDestroy identifies lidostentaking.gitbook.io as an active domain engaged in brand impersonation targeting Lido, a decentralized finance protocol. The domain is currently under investigation with a status marked as active. This threat involves the creation of a fraudulent site designed to deceive users into believing they are interacting with an official Lido service, potentially leading to cryptocurrency theft or credential compromise. This domain was flagged by 0 of 95 VirusTotal vendors, indicating that it remains undetected by most antivirus engines as of current analysis. The domain resolves to IP address 104.18.40.47 and is associated with Google Trust Services for SSL certification. The GitBook platform is used as a hosting service, which may complicate detection due to its legitimate appearance. The domain's unique seed identifier is 5b7a53, which helps in tracking its evolution across reports. No blocklist entries or trust score reductions were detected at this time, though the investigation status suggests ongoing scrutiny. The current status of lidostentaking.gitbook.io remains active, with no immediate remediation actions observed. Users are advised to avoid interacting with this domain and verify its legitimacy through PhishDestroy before any financial transactions or data entry. Security researchers should monitor this domain for changes in detection status or infrastructure. Organizations leveraging Lido services should alert their user base to this impersonation attempt and reinforce verification protocols for official communications. ## Threat Details - Verdict: SUSPICIOUS - Site status: unknown (HTTP ?) - Target brand: Lido ## Domain Intelligence - Registrar: REGISTRAR_NOT_FOUND - IP: 104.18.40.47 ## Detection Status - VirusTotal: 0 vendors flagged - Google Safe Browsing: clean - Blocklists: 0 hits ## Evidence - Cloudflare Radar: https://radar.cloudflare.com/scan/910cb890-54de-42a9-a76e-4a070d9bba85 - PhishDestroy: https://phishdestroy.io/domain/lidostentaking.gitbook.io/ - LLM endpoint: https://phishdestroy.io/domain/lidostentaking.gitbook.io/llm.txt ## If You Visited This Site 1. Change any passwords you may have entered 2. Enable 2FA on all related accounts 3. Monitor your accounts for unauthorized activity 4. Report to: FBI IC3, Europol, local authorities --- Report by PhishDestroy | https://phishdestroy.io/domain/lidostentaking.gitbook.io/ Last updated: 2026-04-12