# PhishDestroy threat dossier — mixero.info ================================================================ Fetched: 2026-05-08 22:11:42 UTC Canonical: https://phishdestroy.io/domain/mixero.info/ ## VERDICT ---------------------------------------------------------------- SUSPICIOUS — under active investigation Composite threat score: 36/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 1/95 security vendors flagged this domain Flagging vendors: Gridinsoft ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 104.21.26.120 Registrar: NameSilo, LLC !!! REGISTRAR INTEGRITY ALERT — NameSilo !!! NameSilo is a registrar documented by PhishDestroy as (1) publicly lying about received abuse reports, (2) shielding a $20M+ Monero-theft operation (xmrwallet.com) for 10 continuous years, and (3) retaliating against PhishDestroy by getting our X/Twitter account @Phish_Destroy banned after we published the evidence. Researchers/victims must ALWAYS CC compliance@icann.org on every abuse ticket — NameSilo has a track record of later claiming reports were never received. Primary sources: https://phishdestroy.io/namesilo-killed-our-twitter https://phishdestroy.io/xmrwallet-namesilo-exposed Nameservers: bella.ns.cloudflare.com, troy.ns.cloudflare.com Registered: 2026-04-24 Expires: 2027-04-24 HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E8 Expires: 2026-07-23 Status: INVALID chain Fingerprint: 839e19a7be70f4c57d2f868aa8222a948721978b85826d94cc3e546ec2847979 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-24 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-08 23:04:12 UTC (by PhishDestroy tracker) Last verified: 2026-05-09 01:00:05 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e092e-e8ac-773a-ab9a-fc7af6d1154c/ Wayback Machine: https://web.archive.org/web/*/mixero.info crt.sh CT logs: https://crt.sh/?q=%25.mixero.info Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=mixero.info AlienVault OTX: https://otx.alienvault.com/indicator/domain/mixero.info URLhaus: https://urlhaus.abuse.ch/host/mixero.info/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-08 23:05:24 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies mixero.info as an active crypto drainer phishing domain with an elevated risk level, meaning it is highly likely to be used for fraudulent cryptocurrency transactions. Unlike generic phishing sites that aim for credential theft, this domain specifically targets victims’ crypto wallets by tricking users into connecting their wallets to malicious smart contracts or fraudulent transaction pages. The domain’s recent creation date and low VirusTotal detection rate suggest it may be part of a fast-moving campaign designed to evade early detection by security vendors. Given the financial stakes involved in crypto transactions, this threat is particularly severe and warrants immediate caution. This domain was flagged with 1 out of 95 security vendors on VirusTotal detecting malicious activity. It was registered through NameSilo, LLC on April 24, 2026, and resolves to IP address 104.21.26.120. The domain uses a Let's Encrypt SSL certificate, which does not indicate trustworthiness, as malicious actors frequently exploit free SSL certificates to appear legitimate. The low detection rate on VirusTotal is a red flag, as many crypto drainers evade detection initially by using new domains and rapidly changing infrastructure. Without additional historical data or blocklist confirmations, the domain remains a high-risk vector for unsuspecting users. To mitigate the risk posed by mixero.info, users should avoid clicking any links associated with the domain, including those received via email, social media, or advertisements. If the domain has been interacted with, immediately disconnect any connected wallets and revoke any unauthorized permissions granted to smart contracts. Use hardware wallets or secure wallet extensions with transaction simulation features to detect fraudulent transactions before approval. Security teams and individuals should report the domain to blocklists and threat intelligence platforms. Consider blocking the IP address 104.21.26.120 and the domain at the network level to prevent further access. Always verify the legitimacy of websites claiming to offer crypto services through official channels and trusted community sources. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: b7612ada78d8394d7cedc4e574601df3 TLS cert SHA-256: 839e19a7be70f4c57d2f868aa8222a948721978b85826d94cc3e546ec2847979 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/mixero.info/ JSON API: https://api.destroy.tools/v1/check?domain=mixero.info Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 147,366 domains (48,470 alive under monitoring, 98,477 confirmed takedowns/dead). Site: https://phishdestroy.io