# PhishDestroy threat dossier — nfaclaw.fun ================================================================ Fetched: 2026-05-01 07:50:13 UTC Canonical: https://phishdestroy.io/domain/nfaclaw.fun/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 89/100 (PhishDestroy scoring — see methodology below) Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: content_split) (score: 1/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 1/91 security vendors flagged this domain Flagging vendors: Bfore.Ai PreCrime ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 64.29.17.65 (US, Walnut) ASN: AS16509 Amazon.com, Inc. Hosting org: Vercel, Inc Registrar: HOSTINGER operations, UAB Nameservers: ["ns1.vercel-dns.com", "ns2.vercel-dns.com"] Registered: 2026-04-30 Page title: NFAClaw | PoW Mining Protocol ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R13 Expires: 2026-07-29 Status: INVALID chain Fingerprint: 86b5f2e39fabcdbc42cace5e3014f349776953b841c7f5fcc5cd8264d8394aea ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-30 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-30 17:23:41 UTC (by PhishDestroy tracker) Last verified: 2026-05-01 07:40:11 UTC Neutralised: 2026-05-01 03:44:16 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019ddec2-9bae-7014-bbf9-d897163a5635/ Wayback Machine: https://web.archive.org/web/*/nfaclaw.fun crt.sh CT logs: https://crt.sh/?q=%25.nfaclaw.fun Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=nfaclaw.fun AlienVault OTX: https://otx.alienvault.com/indicator/domain/nfaclaw.fun URLhaus: https://urlhaus.abuse.ch/host/nfaclaw.fun/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-30 17:25:33 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies the domain nfaclaw.fun as a newly active phishing resource suspected of facilitating drive-by download attacks. The domain was flagged under the generic phishing category and is currently under investigation due to its low detection rate despite clear malicious indicators. No specific brand impersonation or drainer kit fingerprint has been confirmed at this stage, warranting heightened scrutiny from cybersecurity researchers and endpoint protection teams. nfaclaw.fun resolves to the IP address 64.29.17.65 and was registered on February 28, 2026 through HOSTINGER operations, UAB. The domain utilizes a valid Let's Encrypt SSL certificate and currently exhibits a VirusTotal detection score of 0/95, indicating no immediate blocklist or signature-based detection. Given its recent creation (within 2 weeks of analysis), the domain has not been evaluated by Google Safe Browsing (GSB) and remains unlisted across major threat intelligence feeds as of this report. As of reporting, the domain status is active and under investigation with a risk level classified as under_investigation. Security teams are advised to block traffic to 64.29.17.65 at the network perimeter and inspect endpoint logs for connections to this IP or domain. Users should avoid visiting nfaclaw.fun entirely due to the unconfirmed but plausible threat of drive-by download exploitation. The residual risk remains elevated given the absence of detections and the domain’s recent activation, suggesting imminent evolution of attack infrastructure. Proactive monitoring and signature updates are strongly recommended. [Updates since narrative was generated:] - VirusTotal detections: now 1/91 (narrative was written when count was lower) ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: 5862ae01f08b711a44bc7f9bc24d450a TLS cert SHA-256: 86b5f2e39fabcdbc42cace5e3014f349776953b841c7f5fcc5cd8264d8394aea ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/nfaclaw.fun/ JSON API: https://api.destroy.tools/v1/check?domain=nfaclaw.fun Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io