# PhishDestroy threat dossier — m.galabet-resmigirisadresim.vip ================================================================ Fetched: 2026-05-08 18:07:43 UTC Canonical: https://phishdestroy.io/domain/m.galabet-resmigirisadresim.vip/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 93/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 5/95 security vendors flagged this domain Flagging vendors: BitDefender, Forcepoint ThreatSeeker, G-Data, Kaspersky, OpenPhish URLQuery: 2 detections Public blocklists: listed on 1 independent blocklist ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.67.183.85 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: NICENIC INTERNATIONAL GROUP CO., LIMITED !!! REGISTRAR INTEGRITY ALERT — NiceNIC !!! NiceNIC International: over 90% of its registered domains are associated with illegal content; documented systematic abuse-report non-response. Primary sources: https://phishdestroy.io/nicenic-real https://phishdestroy.io/nicenic-verdict Nameservers: ["jacob.ns.cloudflare.com", "joan.ns.cloudflare.com"] Registered: 2026-05-08 Page title: Galabet Giriş Güncel - Galabet Güncel Giriş Adresi 2026 HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E8 Expires: 2026-07-03 Status: INVALID chain Fingerprint: 049555ab877d9eb636cbce670f59e15345dcdb17634ef1b3faf3067f73a329ca Subject Alternative Names (related infrastructure — often same operator): - galabet-resmigirisadresim.vip ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-08 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-08 17:12:02 UTC (by PhishDestroy tracker) First reported: 2026-05-08 14:12:56 UTC (abuse notice filed) Last verified: 2026-05-08 20:30:23 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e07ec-8026-76e7-8cf8-0f675b4170b4/ URLQuery: https://urlquery.net/report/610f10d8-d1b8-4acd-be69-34a5bc75ff5b Wayback Machine: https://web.archive.org/web/*/m.galabet-resmigirisadresim.vip crt.sh CT logs: https://crt.sh/?q=%25.m.galabet-resmigirisadresim.vip Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=m.galabet-resmigirisadresim.vip AlienVault OTX: https://otx.alienvault.com/indicator/domain/m.galabet-resmigirisadresim.vip URLhaus: https://urlhaus.abuse.ch/host/m.galabet-resmigirisadresim.vip/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-08 17:12:44 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies m.galabet-resmigirisadresim.vip as an active credential theft phishing domain designed to mimic the legitimate Galabet online casino platform. The domain is currently engaged in malicious activity, posing as a login portal to harvest user credentials and financial data under the guise of a gaming service. Given its infrastructure and operational tactics, this domain represents an elevated risk to potential victims, particularly those with existing accounts or trust in the Galabet brand. This domain was flagged by 6 of 95 VirusTotal security vendors and is currently blocked by OpenPhish. It is registered through NICENIC INTERNATIONAL GROUP CO., LIMITED, resolves to the IP address 172.67.183.85, and was created on April 04, 2026. It has been identified on one security blocklist and is secured with a Let's Encrypt SSL certificate, which may enhance its legitimacy in the eyes of unsuspecting users. Despite its apparent use of reputable infrastructure, the domain’s recent creation and limited operational history contribute to heightened suspicions regarding its authenticity and intent. As of the latest intelligence, the domain remains active and poses a credible threat to users seeking access to Galabet’s services. To mitigate risk, individuals are strongly advised to verify the legitimacy of any login portals by checking for HTTPS, domain accuracy, and official branding cues. Organizations and users should consider blocking this domain at the network level, updating endpoint protection tools to detect related indicators of compromise, and reporting the domain to relevant threat intelligence platforms such as OpenPhish or PhishTank. Given the domain’s elevated risk profile and active status, immediate action is recommended to prevent potential credential compromise and associated financial fraud. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260508-4C245F Favicon MD5: 6d13bead749c4e8cf1e4960ad5f8e9b6 TLS cert SHA-256: 049555ab877d9eb636cbce670f59e15345dcdb17634ef1b3faf3067f73a329ca ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/m.galabet-resmigirisadresim.vip/ JSON API: https://api.destroy.tools/v1/check?domain=m.galabet-resmigirisadresim.vip Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 147,310 domains (48,569 alive under monitoring, 98,403 confirmed takedowns/dead). Site: https://phishdestroy.io