# PhishDestroy threat dossier — metamaaskelogiine.webflow.io ================================================================ Fetched: 2026-05-02 11:11:52 UTC Canonical: https://phishdestroy.io/domain/metamaaskelogiine.webflow.io/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Credential Phishing Targeted brand: MetaMask ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 15/91 security vendors flagged this domain Flagging vendors: ADMINUSLabs, ChainPatrol, alphaMountain.ai, BitDefender, CyRadar, ESET, Emsisoft, Fortinet, G-Data, Kaspersky, Lionic, Netcraft, Sophos, VIPRE, Webroot ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.64.151.8 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: REGISTRAR_NOT_FOUND Nameservers: NS_NOT_FOUND Registered: 2026-04-27 Page title: Login | MetaMask - The crypto wallet for Defi, … HTTP response: 404 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-06-27 Status: INVALID chain Fingerprint: 7a69dbcd62ed8b1fd312c31d15eac89dd681ec97a720d4fee29acafa644c63a9 Subject Alternative Names (related infrastructure — often same operator): - webflow.io ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-27 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-27 14:41:52 UTC (by PhishDestroy tracker) Last verified: 2026-04-29 13:40:06 UTC Neutralised: 2026-04-28 12:22:33 UTC Current status: taken down (registrar suspended or DNS dead) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dcebe-1f6e-7081-87e8-8e14b20d3508/ Wayback Machine: https://web.archive.org/web/*/metamaaskelogiine.webflow.io crt.sh CT logs: https://crt.sh/?q=%25.metamaaskelogiine.webflow.io Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=metamaaskelogiine.webflow.io AlienVault OTX: https://otx.alienvault.com/indicator/domain/metamaaskelogiine.webflow.io URLhaus: https://urlhaus.abuse.ch/host/metamaaskelogiine.webflow.io/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-27 14:42:29 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies metamaaskelogiine.webflow.io as an active MetaMask brand impersonation domain, leveraging a counterfeit login portal to harvest credentials. The threat is classified as high-risk due to explicit mimicking of MetaMask’s branding and interface, with the page title mirroring the legitimate ‘Login | MetaMask’ title. This domain exploits user trust in recognizable interfaces to deploy credential phishing, a tactic commonly associated with cryptocurrency wallet theft. The seed hash c1108f confirms this threat’s uniqueness in the database. This domain was flagged with 0 detections out of 95 on VirusTotal, indicating undetected malicious activity as of the latest scan. It resolves to IP address 172.64.151.8 and operates under Google Trust Services’ SSL certificate, which does not guarantee legitimacy in this context. The domain uses the Webflow.io platform, a legitimate hosting service, to host the phishing content—demonstrating abuse of reputable infrastructure. No current blocklist entries were detected, and full telemetry remains under active investigation. The impersonation of MetaMask, a leading cryptocurrency wallet, amplifies the risk potential due to the high-value nature of wallet credentials and the likelihood of user interaction. To mitigate exposure to this specific brand impersonation threat, users must verify domain spellings and HTTPS certificates manually, especially when accessing financial platforms. Never enter credentials on sites reached via third-party links or ads. Enterprises should deploy real-time domain reputation checks and browser extensions that compare URLs against known phishing databases using threat intelligence feeds. Report suspected impersonation domains immediately to MetaMask’s official security channels and update security awareness training to highlight visual spoofing tactics. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: fafaaae1a9f39c6d85756bb6f281a6a1 TLS cert SHA-256: 7a69dbcd62ed8b1fd312c31d15eac89dd681ec97a720d4fee29acafa644c63a9 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/metamaaskelogiine.webflow.io/ JSON API: https://api.destroy.tools/v1/check?domain=metamaaskelogiine.webflow.io Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io