# PhishDestroy threat dossier — lionsenergy.net ================================================================ Fetched: 2026-05-01 09:37:21 UTC Canonical: https://phishdestroy.io/domain/lionsenergy.net/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 55/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/94 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 217.182.199.96 (DE, Limburg an der Lahn) ASN: AS16276 OVH SAS Hosting org: OVH GmbH Registrar: HOSTINGER operations, UAB Nameservers: ns1.sterkhost.com, ns2.sterkhost.com Registered: 2023-12-20 Page title: LIONS ENERGY | HOME ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R13 Expires: 2026-07-30 Status: INVALID chain Fingerprint: ffee742e65c14b8f07e81c46204d64821cf627180fa8ddb8c0dc4fef41916f6b Subject Alternative Names (related infrastructure — often same operator): - ultra.sterkhost.com ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2023-12-20 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-23 20:54:34 UTC (by PhishDestroy tracker) First reported: 2026-04-23 17:55:01 UTC (abuse notice filed) Last verified: 2026-05-01 11:57:18 UTC Neutralised: 2026-04-23 22:57:06 UTC Current status: taken down (registrar suspended or DNS dead) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dbb79-4ad2-71fd-b504-5962e40e8dea/ Wayback Machine: https://web.archive.org/web/*/lionsenergy.net crt.sh CT logs: https://crt.sh/?q=%25.lionsenergy.net Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=lionsenergy.net AlienVault OTX: https://otx.alienvault.com/indicator/domain/lionsenergy.net URLhaus: https://urlhaus.abuse.ch/host/lionsenergy.net/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-23 20:55:14 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies lionsenergy.net as an active fake energy provider phishing campaign posing as a legitimate energy services provider. The domain leverages social engineering to deceive users into submitting sensitive account or payment details under the guise of energy bill verification. With a risk level marked as "under_investigation," this threat requires immediate attention due to its potential to harvest credentials and financial data at scale. This domain was flagged with 0 out of 95 VirusTotal detections, indicating it remains largely undetected by mainstream security engines as of current telemetry. The domain lionsenergy.net resolves to IP address 217.182.199.96, which is hosted by HOSTINGER operations, UAB using their registrar infrastructure. The domain was created on December 20, 2023, suggesting a recently established campaign designed to evade legacy detection systems. No entries were found on major blocklists at the time of analysis, and trust indicators such as domain age and hosting reputation are artificially inflated due to the recent registration and shared hosting environment. Mitigation for this threat requires organizations and end users to block network-level access to lionsenergy.net and its associated IP address 217.182.199.96 at the firewall or DNS layer. Users should avoid clicking links in unsolicited emails or messages referencing energy billing or account suspension, especially those claiming to originate from "Lions Energy." If exposure occurs, users must change passwords associated with energy accounts, enable multi-factor authentication where available, and monitor financial statements for unauthorized transactions. Security teams should add indicators of compromise (IOCs) — including the domain, IP, and any embedded URLs — to email filtering rules and network intrusion detection systems to prevent lateral spread or credential harvesting campaigns leveraging this infrastructure. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260423-F86C94 Favicon MD5: 1e8529c47d608d2bce95c3ff98aef56e TLS cert SHA-256: ffee742e65c14b8f07e81c46204d64821cf627180fa8ddb8c0dc4fef41916f6b ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/lionsenergy.net/ JSON API: https://api.destroy.tools/v1/check?domain=lionsenergy.net Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io