# PhishDestroy threat dossier — mrfortune.casino ================================================================ Fetched: 2026-04-21 18:39:30 UTC Canonical: https://phishdestroy.io/domain/mrfortune.casino/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Crypto Casino / Gambling Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: content_divergence) (score: 1/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 4/94 security vendors flagged this domain Flagging vendors: alphaMountain.ai, Gridinsoft, Seclookup, SOCRadar ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 188.114.96.3 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: CloudFlare, Inc. Registrar: NameSilo, LLC !!! REGISTRAR INTEGRITY ALERT — NameSilo !!! NameSilo is a registrar documented by PhishDestroy as (1) publicly lying about received abuse reports, (2) shielding a $20M+ Monero-theft operation (xmrwallet.com) for 10 continuous years, and (3) retaliating against PhishDestroy by getting our X/Twitter account @Phish_Destroy banned after we published the evidence. Researchers/victims must ALWAYS CC compliance@icann.org on every abuse ticket — NameSilo has a track record of later claiming reports were never received. Primary sources: https://phishdestroy.io/namesilo-killed-our-twitter https://phishdestroy.io/xmrwallet-namesilo-exposed Nameservers: ["daisy.ns.cloudflare.com", "mcgrory.ns.cloudflare.com"] Registered: 2026-04-14 Expires: 2026-12-21 Page title: Mrfortune: Most Popular Online Crypto Casino Based on Blockchain HTTP response: 404 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: REPORTS FILED AND IGNORED — NameSilo, LLC did not act on these notifications. Domain still online. Reports filed: 1 independent abuse notifications First report: 2026-04-20 15:10:24 UTC Days since first notice: 1 — no registrar action, domain remains online Methodology: follow-up reports are sent ONLY when a victim re-submitted a re-report via our public form, our monitoring detected the domain resurfacing in SEO/feeds, OR our live-checker confirmed the domain is still technically active and fraudulent. Each report contains: VT verdict, URLScan snapshot, WHOIS, SSL metadata, IP/hosting chain, impersonated-brand evidence, drainer/kit classification, screenshots, and a cryptographic hash of the forensic PDF. ICANN RAA Sec. 3.18 applies. Per-report timeline: https://phishdestroy.io/domain/mrfortune.casino/#coordinated-suppression ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-14 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-14 19:12:46 UTC (by PhishDestroy tracker) First reported: 2026-04-20 12:10:24 UTC (abuse notice filed) Last verified: 2026-04-21 16:07:32 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d8cc1-5268-73ed-b698-dd2a3724dcf1/ Wayback Machine: https://web.archive.org/web/*/mrfortune.casino crt.sh CT logs: https://crt.sh/?q=%25.mrfortune.casino Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=mrfortune.casino AlienVault OTX: https://otx.alienvault.com/indicator/domain/mrfortune.casino URLhaus: https://urlhaus.abuse.ch/host/mrfortune.casino/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-14 19:15:16 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies mrfortune.casino as an active brand impersonation domain designed to mimic legitimate crypto services. This site specifically impersonates Base, a blockchain-based network, and promotes itself as a crypto casino to lure victims into depositing funds that are likely drained via malicious scripts. The elevated risk is driven by its deceptive branding, limited but concerning detection on VirusTotal, and association with cryptocurrency-related fraud. This domain was flagged due to multiple red flags: It was registered on December 21, 2025, through NameSilo, LLC, and resolves to IP 188.114.96.3. VirusTotal shows only 3 out of 95 security vendors flagged this domain, indicating low but notable detection. The site uses a Let’s Encrypt SSL certificate, which does not confer legitimacy—many fraudulent sites obtain free certificates to appear trustworthy. While no specific blocklist data is provided, the combination of impersonation tactics, crypto focus, and low detection rate elevates the risk profile. To mitigate exposure to brand impersonation like mrfortune.casino, users must avoid clicking links from untrusted sources—especially in ads or social media promoting crypto casinos. Verify the domain URL carefully; impersonation sites often use slight misspellings or appended terms. Never enter private keys, seed phrases, or wallet credentials on any site linked from ads or unsolicited messages. Use browser extensions that block known malicious domains and consider relying only on official Base network links or trusted launchpads. If exposed, discontinue use immediately and revoke any connected wallet permissions through blockchain explorers. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-1776687021-mrfortune.casin Favicon MD5: c3d9e7ac8ad834ae3d129c8c7a595a4f ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/mrfortune.casino/ JSON API: https://api.destroy.tools/v1/check?domain=mrfortune.casino Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io