# PhishDestroy threat dossier — okx-web3-usdt-trc20-payfor-00000069.pages.dev ================================================================ Fetched: 2026-04-30 18:07:42 UTC Canonical: https://phishdestroy.io/domain/okx-web3-usdt-trc20-payfor-00000069.pages.dev/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 82/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: OKX ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/95 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.66.44.116 Registrar: Cloudflare, Inc. Nameservers: aragorn.ns.cloudflare.com, brianna.ns.cloudflare.com Registered: 2026-04-30 Page title: OKX HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-07-17 Status: INVALID chain Fingerprint: bb627b79dade5ff2071196a7932f336c63d7a09114971105112e57660eb508fb ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-30 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-30 18:01:55 UTC (by PhishDestroy tracker) Last verified: 2026-04-30 19:50:04 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019ddee8-5751-77c0-ab23-bf9847361d64/ Wayback Machine: https://web.archive.org/web/*/okx-web3-usdt-trc20-payfor-00000069.pages.dev crt.sh CT logs: https://crt.sh/?q=%25.okx-web3-usdt-trc20-payfor-00000069.pages.dev Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=okx-web3-usdt-trc20-payfor-00000069.pages.dev AlienVault OTX: https://otx.alienvault.com/indicator/domain/okx-web3-usdt-trc20-payfor-00000069.pages.dev URLhaus: https://urlhaus.abuse.ch/host/okx-web3-usdt-trc20-payfor-00000069.pages.dev/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-30 18:03:02 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies okx-web3-usdt-trc20-payfor-00000069.pages.dev as an active brand impersonation domain targeting OKX, designed to deceive users into divulging sensitive information or facilitating unauthorized crypto transactions. This fraudulent site leverages Cloudflare’s infrastructure to resolve to IP 172.66.44.116, masking its true origin while exploiting the trust associated with the OKX brand. The domain’s structure includes misleading keywords like 'payfor' and 'usdt-trc20', creating the false impression of an official OKX payment gateway, while the suffix '.pages.dev' suggests a temporary or deceptive hosting strategy aimed at evading detection. Technical analysis confirms multiple red flags: the domain shows zero detections out of 95 scans on VirusTotal as of the latest check, indicating it remains under the radar of most security vendors. It was registered through Cloudflare, Inc., which anonymizes the registrant details, and is secured with a Google Trust Services SSL certificate—a tactic commonly used to lend false legitimacy to fraudulent sites. The absence of detections does not imply safety; rather, it highlights the domain’s evasive design and the need for proactive blocking by security systems. Further, the domain’s recent creation and lack of historical data make it a prime candidate for use in credential theft or crypto drainer campaigns, where unsuspecting users are tricked into connecting wallets or entering login credentials. Users who have visited this domain or interacted with its content should take immediate precautions to safeguard their assets and personal information. First, disconnect any connected cryptocurrency wallets from the site and revoke any permissions granted to fraudulent domains via wallet settings. Second, scan all devices used to access the site with updated antivirus and anti-malware software to detect any potential compromises. Third, avoid reusing passwords or credentials on any site, especially those related to financial services like OKX. Finally, report the domain to OKX’s official fraud reporting channels and your local cybersecurity authorities to contribute to broader threat intelligence efforts. Proactive vigilance is critical, as even unflagged domains can pose significant risks to unsuspecting users. ## EVIDENCE HASHES ---------------------------------------------------------------- TLS cert SHA-256: bb627b79dade5ff2071196a7932f336c63d7a09114971105112e57660eb508fb ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/okx-web3-usdt-trc20-payfor-00000069.pages.dev/ JSON API: https://api.destroy.tools/v1/check?domain=okx-web3-usdt-trc20-payfor-00000069.pages.dev Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io