This phishing domain has been taken down
Confirmed dead — kept on record for forensic reference and similar-pattern matching.

nwin[.]com

Domain Security & Threat Intelligence Report
“nwin.com”
8/95 VT Taken Down May 17, 2026 1 Blocklist
0 Risk Score
Data coverage VirusTotal 8 / 95 URLQuery no det. OTX no pulses CF Radar suspicious URLScan report ready DNS blocks none SSL invalid WHOIS 20d old Screenshot captured Redirect chain not probed CDN bypass n/a
VirusTotal
8 det.
URLQuery
no det.
URLScan
Report ↗
SSL
Age
20d
Status
Dead
DestroyList
Listed
Reports Sent
0
02

Forensic brief

auto-generated · PhishDestroy AI
PhishDestroy AI
probe: May 17, 2026
score: 60/100
vendors8/95
blocklists1
Analyst brief · auto-generated

PhishDestroy identifies nwin.com as an active tech support scam domain currently under investigation for phishing activities. The domain is not yet flagged by VirusTotal, with 0 out of 95 detection engines marking it as malicious as of the latest scans. This delay in detection highlights the evolving tactics used by threat actors to evade initial scrutiny. The domain resolves to IP address 34.102.136.180 and was registered through Automattic Inc., a domain registrar known for its legitimate services but occasionally exploited for malicious purposes. The domain's age, created on December 04, 1995, may lend it an air of legitimacy, further complicating detection efforts. This domain exhibits several red flags that warrant close examination. The lack of detections on VirusTotal (0/95) suggests that traditional signature-based detection methods have not yet caught up with the threat actor's tactics. The domain's registration through Automattic Inc., while not inherently suspicious, adds a layer of complexity as threat actors often leverage reputable registrars to obscure their activities. The IP address 34.102.136.180, associated with this domain, has not been widely flagged on blocklists, further delaying its identification as a malicious host. The domain's creation date, spanning nearly three decades, may provide a false sense of trustworthiness, as older domains are often repurposed for malicious activities. To mitigate risks associated with nwin.com, users are advised to avoid interacting with this domain entirely. If engagement has already occurred, such as entering personal information or downloading files, users should immediately change passwords, enable multi-factor authentication on all accounts, and monitor for unusual activity. Organizations should consider blocking the IP address 34.102.136.180 at the network perimeter and updating firewall rules to prevent further communication with this domain. Security teams are encouraged to report this domain to threat intelligence platforms and blocklists to aid in its identification and neutralization. Continuous monitoring of this domain is critical, as its current status remains under investigation, and its threat level may escalate with additional intelligence. PhishDestroy will update this report as new data becomes available.

Phishing clean drainer
03

Threat response pipeline

May 17, 2026 · 0 reports submitted
Discovery
Submission
Legal
Takedown
11/19
30+ Proprietary Parsers
Distributed scanning of Google Ads, SEO-manipulated results, Twitter/X, YouTube & Telegram campaigns.
Infrastructure Analysis
dnstwist & typosquatting detection.
Community Intelligence
Real-time ingestion via Telegram Bot & partner intelligence feeds.
Threat Ingested
nwin.com detected and queued for full analysis.
May 17, 2026
51+ Vendor Submissions
Threat data submitted to 51+ security vendors & threat-intel platforms. 4 flagged this domain.
Cloudflare Radar
View scan — verdict: suspicious
VirusTotal
8 / 95 vendors flagged on VirusTotal.
Blocklist Detection
Found in 1 blocklists: PhishDestroy.
Forensic Evidence Collection
URLScan.io, URLQuery & Cloudflare Radar — DOM snapshots, HTTP transactions, DNS & certificate data.
Open Threat Database
Real-time commits to GitHub repository & live monitoring at phishdestroy.io/live.
Social Broadcasting
Automated alerts on X, Telegram & Mastodon.
Confirmed dead
Domain confirmed taken down.
May 17, 2026
04

Evidence capture

urlscan snapshot · domain intelligence
08

Public blocklist status

cross-vendor confirmation
1
Listed in 1 public blocklist — confirmed by independent sources
Sources with no listing are omitted.
10

VirusTotal consensus

95 vendors · 3-col matrix
8/95
vendors flagging
Partial detection

Aggregated detection across 95 security vendors.

Per-vendor breakdown not available — view raw report on VirusTotal ↗
12

Evidence & external reports

cross-reference this domain
14

Were you affected by this site?

immediate response · authorities

Were You Affected?

You are not alone and there is nothing to be ashamed of. Reporting is the most powerful weapon against fraud — your report can prevent others from becoming victims.
Beware of recovery scammers! No legitimate service will ask for upfront payment to recover stolen crypto. Learn more about recovery fraud →
15

Report to your local authorities

geo-aware · authorities · AI complaint
Your country (auto-detected)
United States

  Email template — registrar abuse

To: nwin.com@privatewho.is, domainabuse@automattic.com Registrar: Automattic Inc. Case: PD-
Open in mail client Appeal (if false-positive)
16

Embed this report

iframe · sizer · CC-BY

Embed this report

Drop a live, self-updating risk widget anywhere — blog, DAO forum, Discord webhook, X post. Free, no API key, CC-BY.

nwin[.]com 60/100 TAKEN DOWN · 8/95 VT · 0h View full report ↗
Live preview at 100% width
Canonical: https://phishdestroy.io/domain/nwin.com/ JSON API llm.txt
17

About this report

methodology · appeals · API

About this report: nwin.com

This domain security report is maintained by PhishDestroy's automated threat-intelligence pipeline. Our system continuously monitors this domain across 95 security vendors on VirusTotal and 1 public blocklists.

The site displays a page titled “nwin.com”.

nwin.com has been flagged by 8 security vendors as of May 17, 2026.

If you believe this listing is inaccurate, you can submit an appeal. For more information about our methodology, visit our FAQ page.