# PhishDestroy threat dossier — pandez-lab.com ================================================================ Fetched: 2026-05-08 21:03:40 UTC Canonical: https://phishdestroy.io/domain/pandez-lab.com/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: content_divergence) (score: 2/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/95 security vendors flagged this domain Public blocklists: listed on 2 independent blocklists ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 188.114.96.3 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: CloudFlare, Inc. Registrar: NICENIC INTERNATIONAL GROUP CO., LIMITED !!! REGISTRAR INTEGRITY ALERT — NiceNIC !!! NiceNIC International: over 90% of its registered domains are associated with illegal content; documented systematic abuse-report non-response. Primary sources: https://phishdestroy.io/nicenic-real https://phishdestroy.io/nicenic-verdict Nameservers: everton.ns.cloudflare.com, jo.ns.cloudflare.com Registered: 2026-05-06 Page title: Pandez Lab HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E7 Expires: 2026-08-04 Status: INVALID chain Fingerprint: 2e04643322533f94fada30143fa2b2fb7f4a8cdce1c5fa51dbdafc501420e6bf ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-06 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-08 17:24:42 UTC (by PhishDestroy tracker) First reported: 2026-05-08 14:25:31 UTC (abuse notice filed) Last verified: 2026-05-08 23:40:45 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e07f8-0733-75dc-95e2-868860eb3f15/ URLQuery: https://urlquery.net/report/875fdc6c-181a-4ad7-8085-81f7e43002c9 Wayback Machine: https://web.archive.org/web/*/pandez-lab.com crt.sh CT logs: https://crt.sh/?q=%25.pandez-lab.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=pandez-lab.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/pandez-lab.com URLhaus: https://urlhaus.abuse.ch/host/pandez-lab.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-08 17:25:58 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies pandez-lab.com as an active crypto drainer phishing domain currently under investigation for malicious intent. The domain is engineered to deceive users into transferring cryptocurrency to attacker-controlled wallets under the false pretense of legitimate services. Multiple security vendors and browser extensions have flagged this domain as hostile, indicating coordinated detection efforts are underway to neutralize this threat vector. This domain was flagged by 0 out of 95 VirusTotal vendors as of the latest scan, demonstrating a concerning lack of detection despite clear malicious indicators. It was registered via NICENIC INTERNATIONAL GROUP CO., LIMITED, resolving to IP address 188.114.96.3. Notably, pandez-lab.com is already blocked by MetaMask and SEAL security systems. The domain was created on May 06, 2026, and currently appears on 2 independent security blocklists. These technical indicators collectively suggest a recently deployed but rapidly evolving threat infrastructure with agile operational tactics. As this domain remains active and continues to evade detection by major scanning engines, PhishDestroy advises immediate action for all users. Avoid accessing pandez-lab.com entirely and warn others in your network. If you have previously interacted with this domain—especially entering wallet credentials or initiating transactions—revoke any connected wallet permissions immediately and transfer remaining assets to a new wallet. Use hardware wallets or reputable software wallets with built-in phishing protections. Report this domain to your antivirus provider, browser security extensions, and relevant blockchain monitoring services such as MetaMask or SEAL. Monitor wallets for unauthorized transactions and consider enhanced monitoring tools like Etherscan’s alert services for suspicious activity. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260508-46403C Favicon MD5: c30c7d42707a47a3f4591831641e50dc TLS cert SHA-256: 2e04643322533f94fada30143fa2b2fb7f4a8cdce1c5fa51dbdafc501420e6bf ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/pandez-lab.com/ JSON API: https://api.destroy.tools/v1/check?domain=pandez-lab.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 147,350 domains (48,473 alive under monitoring, 98,472 confirmed takedowns/dead). Site: https://phishdestroy.io