# PhishDestroy threat dossier — onionpages.com ================================================================ Fetched: 2026-05-18 00:23:35 UTC Canonical: https://phishdestroy.io/domain/onionpages.com/ ## VERDICT ---------------------------------------------------------------- ACTIVE THREAT — multiple warning signs Composite threat score: 55/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/95 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 213.111.146.253 (NL, Haarlem) ASN: AS43641 SOLLUTIUM EU Sp z.o.o. Hosting org: Vsys AMS Registrar: TUCOWS.COM, CO. Nameservers: javier.ns.cloudflare.com, vida.ns.cloudflare.com Registered: 2025-08-27 Page title: DDOS Protection HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E7 Expires: 2026-07-21 Status: INVALID chain Fingerprint: 11c3eed5e1c59b61d06f9c6eac05cbde560e7a06dcc5dae9ab79bb6e16b5375b Subject Alternative Names (related infrastructure — often same operator): - www.onionpages.com ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2025-08-27 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-17 22:29:13 UTC (by PhishDestroy tracker) Last verified: 2026-05-18 03:16:07 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e3767-c3fd-76f8-93ab-fdb4fc618913/ Wayback Machine: https://web.archive.org/web/*/onionpages.com crt.sh CT logs: https://crt.sh/?q=%25.onionpages.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=onionpages.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/onionpages.com URLhaus: https://urlhaus.abuse.ch/host/onionpages.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-17 22:29:37 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies onionpages.com as a live crypto-drainer phishing domain deployed under the generic threat label. No specific brand impersonation is confirmed in open intelligence, but the site’s technical footprint suggests a web3-targeting drainer kit is actively hosted. The domain leverages a Let’s Encrypt SSL certificate to appear legitimate and relies on a simple, recently registered name to evade long-term detection. Investigators have yet to extract the drainer’s payload or wallet addresses, so the exact kit remains unclassified. This domain resolves to IP 213.111.146.253 and was created on 2025-08-27 through TUCOWS.COM, CO. VirusTotal currently scores it 0/95 detections, indicating zero antivirus coverage as of the last scan. Google Safe Browsing has not yet flagged the page, and the domain has not appeared on any public blocklists, leaving a clean slate for threat actors to operate. The absence of detections correlates with the domain’s youth, but the combination of a fresh registration, unlisted IP, and zero VT coverage creates a high-risk hosting environment. onionpages.com remains in active status with the risk level marked “under_investigation,” meaning defensive actions are still pending. Security teams should treat the domain as hostile until payload extraction or brand impersonation is confirmed. Users encountering the site should not interact and instead verify its safety on PhishDestroy before proceeding. The current risk is elevated due to the domain’s unblocked, newly active state and the likelihood of drainer code being served to unsuspecting visitors. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: 3ab4d9992296d1f2fafeb3ef121c1268 TLS cert SHA-256: 11c3eed5e1c59b61d06f9c6eac05cbde560e7a06dcc5dae9ab79bb6e16b5375b ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/onionpages.com/ JSON API: https://api.destroy.tools/v1/check?domain=onionpages.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 150,733 domains (33,433 alive under monitoring, 117,004 confirmed takedowns/dead). Site: https://phishdestroy.io