# PhishDestroy threat dossier — lsienzopps4.com ================================================================ Fetched: 2026-04-26 03:20:14 UTC Canonical: https://phishdestroy.io/domain/lsienzopps4.com/ ## VERDICT ---------------------------------------------------------------- HIGH THREAT — malicious activity confirmed Composite threat score: 62/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 7/94 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 104.21.18.175 Registrar: NameSilo, LLC !!! REGISTRAR INTEGRITY ALERT — NameSilo !!! NameSilo is a registrar documented by PhishDestroy as (1) publicly lying about received abuse reports, (2) shielding a $20M+ Monero-theft operation (xmrwallet.com) for 10 continuous years, and (3) retaliating against PhishDestroy by getting our X/Twitter account @Phish_Destroy banned after we published the evidence. Researchers/victims must ALWAYS CC compliance@icann.org on every abuse ticket — NameSilo has a track record of later claiming reports were never received. Primary sources: https://phishdestroy.io/namesilo-killed-our-twitter https://phishdestroy.io/xmrwallet-namesilo-exposed Nameservers: lars.ns.cloudflare.com, martha.ns.cloudflare.com Registered: 2026-02-17 Page title: UZUM HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-07-16 Status: INVALID chain Fingerprint: 0cbd94d33a5e0051b1e27ebd8ba9ca583847cbab91d9c543776cc50adf4c1d62 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-02-17 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-25 21:22:01 UTC (by PhishDestroy tracker) Last verified: 2026-04-26 05:00:11 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dc5df-b3f2-7235-844e-07d6e6defd2b/ Wayback Machine: https://web.archive.org/web/*/lsienzopps4.com crt.sh CT logs: https://crt.sh/?q=%25.lsienzopps4.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=lsienzopps4.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/lsienzopps4.com URLhaus: https://urlhaus.abuse.ch/host/lsienzopps4.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-25 21:22:55 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies lsienzopps4.com as an active domain engaged in generic phishing operations, posing as a fraudulent opportunity platform. The domain is currently live and remains unclassified by mainstream threat intelligence platforms. lsienzopps4.com was registered on February 17, 2026, through NameSilo, LLC, and resolves to IP address 104.21.18.175. The domain currently remains undetected by any of the 95 VirusTotal scanning engines as of active monitoring. It operates under a Google Trust Services SSL certificate, potentially misleading users into believing its authenticity. Current passive DNS and domain reputation monitoring reveals no prior association with known phishing campaigns. This domain represents an immediate risk due to its recent creation, lack of detection, and plausible SSL certification. Users are strongly advised to avoid visiting lsienzopps4.com or clicking on any links associated with it. Network defenders and security teams should implement domain blocking at the DNS and firewall levels using the domain name and resolved IP address. Report this domain to relevant threat intelligence platforms and browser security vendors to aid in rapid classification. If accidental exposure or interaction occurs, users should run a full malware scan and change credentials used on unrelated sites. Monitor network traffic for outbound connections to 104.21.18.175. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: ba0f5807fabd898304ddabebd2e2f2b4 TLS cert SHA-256: 0cbd94d33a5e0051b1e27ebd8ba9ca583847cbab91d9c543776cc50adf4c1d62 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/lsienzopps4.com/ JSON API: https://api.destroy.tools/v1/check?domain=lsienzopps4.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io