# PhishDestroy threat dossier — meta-admin.accounts-admin-agency.com ================================================================ Fetched: 2026-05-13 13:54:04 UTC Canonical: https://phishdestroy.io/domain/meta-admin.accounts-admin-agency.com/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Google ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 21/95 security vendors flagged this domain Flagging vendors: ADMINUSLabs, BitDefender, Cluster25, CRDF, CyRadar, ESET, Emsisoft, Forcepoint ThreatSeeker, Fortinet, G-Data, Gridinsoft, Kaspersky, LevelBlue, Lionic, Mimecast, Netcraft, OpenPhish, SOCRadar, Sophos, VIPRE, Webroot URLQuery: 2 detections Public blocklists: listed on 2 independent blocklists ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.66.0.96 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Gransy, s.r.o. Nameservers: ns.gransy.com, ns2.gransy.com, ns3.gransy.com, ns4.gransy.com, ns5.gransy.com Registered: 2026-05-04 Page title: Accounts Centre HTTP response: 403 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-08-01 Status: INVALID chain Fingerprint: c8791ab9fbdd62bbedfb61ab7f8d319a694aba4118f545508e50eece03ba1b7d ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-04 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-04 12:02:50 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-05-04 09:03:52 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-05-12 13:40:06 UTC Current status: ACTIVE / observable Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019df238-1a51-71aa-ae19-ed07e7cc25ca/ URLQuery: https://urlquery.net/report/fc055283-03f9-4834-8a4e-e39db2d5a945 Wayback Machine: https://web.archive.org/web/*/meta-admin.accounts-admin-agency.com crt.sh CT logs: https://crt.sh/?q=%25.meta-admin.accounts-admin-agency.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=meta-admin.accounts-admin-agency.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/meta-admin.accounts-admin-agency.com URLhaus: https://urlhaus.abuse.ch/host/meta-admin.accounts-admin-agency.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-04 12:04:28 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies meta-admin.accounts-admin-agency.com as a live credential phishing domain explicitly engineered to harvest login credentials under the fraudulent guise of a legitimate 'Accounts Centre' interface. This domain constitutes a high-risk threat due to its deployment of a Google Trust Services SSL certificate and intentional mimicry of official branding, creating a false sense of legitimacy. Technical indicators underscore its malicious nature: the domain resolves to IP 172.66.0.96, was registered on May 01, 2026 (an anomalously recent creation date), and currently resides on two active security blocklists (OpenPhish and PhishingArmy). VirusTotal analysis reveals 21 out of 95 participating security vendors have flagged this domain, while registration occurred through Gransy, s.r.o., a known registrar with low oversight standards. These factors collectively validate its operational status as a credential theft platform targeting users through deceptive authentication portals. To mitigate exposure to this threat, organizations and individual users must implement layered defenses including DNS filtering to block the domain at the network level, browser-based phishing detection tools to intercept access attempts, and user awareness training emphasizing verification of domain naming conventions and SSL issuers. Immediate takedown requests should be submitted to hosting providers and registrars, leveraging the domain’s blocklist presence and VT detections to accelerate response. Continuous monitoring for similar domains with the seed dce238 is strongly advised due to the attacker’s likely reuse of infrastructure patterns. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260504-6164E9 TLS cert SHA-256: c8791ab9fbdd62bbedfb61ab7f8d319a694aba4118f545508e50eece03ba1b7d ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/meta-admin.accounts-admin-agency.com/ JSON API: https://api.destroy.tools/v1/check?domain=meta-admin.accounts-admin-agency.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 148,917 domains (40,746 alive under monitoring, 107,884 confirmed takedowns/dead). Site: https://phishdestroy.io