# PhishDestroy threat dossier — mansion.spahotel.guru ================================================================ Fetched: 2026-04-24 22:27:05 UTC Canonical: https://phishdestroy.io/domain/mansion.spahotel.guru/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 96/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 15/95 security vendors flagged this domain Flagging vendors: ADMINUSLabs, BitDefender, CRDF, CyRadar, ESET, Fortinet, G-Data, Gridinsoft, Kaspersky, Lionic, OpenPhish, Seclookup, Sophos, VIPRE, Webroot ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 52.29.26.157 (DE, Frankfurt am Main) ASN: AS16509 Amazon.com, Inc. Hosting org: AWS EC2 (eu-central-1) Registrar: Spaceship, Inc. Nameservers: ["launch1.spaceship.net", "launch2.spaceship.net"] Registered: 2026-04-24 Page title: The Mansion Resort Hotel & Spa Ubud - Ubud (Bali), Indonesia HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E7 Expires: 2026-07-01 Status: INVALID chain Fingerprint: 1da303c34dd7031e5b1fcc8f9aa0727e0cc7b775c55d84984abadc7e6d003c1c Subject Alternative Names (related infrastructure — often same operator): - spahotel.guru ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-24 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-24 16:54:19 UTC (by PhishDestroy tracker) Last verified: 2026-04-24 19:50:05 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dbfc3-9cb8-706f-8f16-b5a54ae2acb3/ Wayback Machine: https://web.archive.org/web/*/mansion.spahotel.guru crt.sh CT logs: https://crt.sh/?q=%25.mansion.spahotel.guru Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=mansion.spahotel.guru AlienVault OTX: https://otx.alienvault.com/indicator/domain/mansion.spahotel.guru URLhaus: https://urlhaus.abuse.ch/host/mansion.spahotel.guru/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-24 16:56:24 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies mansion.spahotel.guru as an active credential theft campaign impersonating The Mansion Resort Hotel & Spa Ubud (Bali), Indonesia. The domain serves a fraudulent replica of the luxury resort’s official site to harvest login credentials and personal information from unsuspecting travelers booking accommodations. This fake portal is designed to mimic the legitimate booking flow, exploiting trust in the resort’s brand to trick users into entering sensitive data such as email addresses, passwords, and payment details. The page title mirrors the real resort’s branding, creating a deceptive facade that lures victims into a trap set by threat actors operating this high-risk scam. This domain was flagged by 15 out of 95 VirusTotal security vendors, indicating a high level of suspicion among the cybersecurity community. The domain resolves to IP address 52.29.26.157 and holds a valid SSL certificate issued by Let’s Encrypt, which adds a false sense of legitimacy to the site. Threat intelligence shows the domain remains active despite security warnings. While the exact creation date of the domain is not publicly available, its current status and sustained activity underscore the urgency of proactive defense measures. The low detection ratio on VirusTotal highlights the evolving tactics of credential theft campaigns, which often bypass initial scans to target users directly. Users who visited mansion.spahotel.guru should immediately cease any interaction with the site and avoid entering login credentials, payment details, or personal information. If credentials were submitted, change passwords on all accounts that used the same email and password combination, and enable multi-factor authentication where available. Report the domain to your IT security team or relevant cybercrime reporting platform. Use only verified official channels to book accommodations and verify website authenticity through official domains and secure HTTPS connections. Monitor financial accounts closely for unauthorized transactions. Proactive verification and skepticism toward unsolicited booking links are critical to preventing credential theft and financial loss. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: f64ad864d87e446dc9f89caf5522936c TLS cert SHA-256: 1da303c34dd7031e5b1fcc8f9aa0727e0cc7b775c55d84984abadc7e6d003c1c ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/mansion.spahotel.guru/ JSON API: https://api.destroy.tools/v1/check?domain=mansion.spahotel.guru Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io