# PhishDestroy threat dossier — microsoft365xx1.iceiy.com ================================================================ Fetched: 2026-05-17 05:47:56 UTC Canonical: https://phishdestroy.io/domain/microsoft365xx1.iceiy.com/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Microsoft Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: content_divergence) (score: 1/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 13/95 security vendors flagged this domain Flagging vendors: ADMINUSLabs, BitDefender, CRDF, Fortinet, G-Data, Kaspersky, LevelBlue, Lionic, OpenPhish, Seclookup, Sophos, URLQuery, VIPRE URLQuery: 2 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 185.27.134.229 (GB, Gosforth) ASN: AS34119 Wildcard UK Limited Hosting org: I FastNet LTD Registrar: Porkbun LLC Nameservers: ns1.byet.org, ns2.byet.org, ns3.byet.org, ns4.byet.org, ns5.byet.org Registered: 2020-12-06 Page title: Iniciar sesión en tu cuenta Microsoft HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: ZeroSSL / ZeroSSL ECC Domain Secure Site CA Expires: 2026-06-25 Status: INVALID chain Fingerprint: 3112e93c26c50d9079201574870e912643bd3293e3df293eb90299283def9243 Subject Alternative Names (related infrastructure — often same operator): - iceiy.com ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2020-12-06 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-17 03:29:18 UTC (by PhishDestroy tracker) First reported: 2026-05-17 00:30:32 UTC (abuse notice filed) Last verified: 2026-05-17 08:40:38 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e3354-ad96-7252-bece-59383235976a/ URLQuery: https://urlquery.net/report/96dc7d3a-f666-4656-bb6d-396c0a1c6e53 Wayback Machine: https://web.archive.org/web/*/microsoft365xx1.iceiy.com crt.sh CT logs: https://crt.sh/?q=%25.microsoft365xx1.iceiy.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=microsoft365xx1.iceiy.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/microsoft365xx1.iceiy.com URLhaus: https://urlhaus.abuse.ch/host/microsoft365xx1.iceiy.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-17 03:29:39 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy confirms microsoft365xx1.iceiy.com as an elevated-risk domain actively engaging in brand impersonation against Microsoft, specifically mimicking Microsoft 365 to deceive users into entering credentials or downloading malicious content. The domain exhibits multiple red flags including a zero-day SSL certificate from ZeroSSL, consistent detection by antivirus engines, and direct association with a known malicious infrastructure. Users interacting with this domain risk credential theft, account takeover, or malware installation, making it a clear threat to personal and organizational security. This domain was flagged by 13 out of 95 VirusTotal security vendors, indicating partial but significant detection across multiple engines. It resolves to IP address 185.27.134.229, a known malicious host frequently linked to phishing campaigns. Registered through Porkbun LLC on December 06, 2020, the domain’s age coincides with the proliferation of impersonation scams targeting Microsoft users. While no public blocklist data is cited, the combination of low trust score due to ZeroSSL and high detection ratio signals active misuse. The SSL certificate—issued without extended validation—further enables man-in-the-middle interception risks. Mitigation begins with complete avoidance: do not visit microsoft365xx1.iceiy.com or any associated subdomains. If credentials were entered, immediately reset all Microsoft accounts and enable multi-factor authentication. Monitor for unusual login attempts or data exfiltration. Organizations should update firewall rules and DNS blocklists to include this domain and its IP (185.27.134.229). Educate users to verify domains via official Microsoft portals and report suspicious emails. Always use trusted bookmarks or direct navigation to Microsoft services. Report this domain to your security team or abuse channels to aid collective defense. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260517-375333 TLS cert SHA-256: 3112e93c26c50d9079201574870e912643bd3293e3df293eb90299283def9243 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/microsoft365xx1.iceiy.com/ JSON API: https://api.destroy.tools/v1/check?domain=microsoft365xx1.iceiy.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 150,513 domains (28,174 alive under monitoring, 122,055 confirmed takedowns/dead). Site: https://phishdestroy.io