# PhishDestroy threat dossier — princebhadana0575-developer.github.io ================================================================ Fetched: 2026-05-13 13:25:58 UTC Canonical: https://phishdestroy.io/domain/princebhadana0575-developer.github.io/ ## VERDICT ---------------------------------------------------------------- HIGH THREAT — malicious activity confirmed Composite threat score: 75/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 14/95 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, BitDefender, CyRadar, ESET, Emsisoft, G-Data, Google Safebrowsing, Gridinsoft, Kaspersky, Lionic, Netcraft, Sophos, VIPRE Public blocklists: listed on 1 independent blocklist Google Safe Browsing: FLAGGED ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 185.199.108.153 Registrar: GitHub, Inc. Nameservers: NS_NOT_FOUND ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- First detected: 2026-05-13 16:01:35 UTC (by PhishDestroy tracker) Last verified: 2026-05-13 16:02:53 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e216c-01f6-72bb-8827-158fd0c4269b/ Wayback Machine: https://web.archive.org/web/*/princebhadana0575-developer.github.io crt.sh CT logs: https://crt.sh/?q=%25.princebhadana0575-developer.github.io Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=princebhadana0575-developer.github.io AlienVault OTX: https://otx.alienvault.com/indicator/domain/princebhadana0575-developer.github.io URLhaus: https://urlhaus.abuse.ch/host/princebhadana0575-developer.github.io/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-13 16:02:45 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies princebhadana0575-developer.github.io as a live credential-harvesting site deployed on GitHub Pages. The page mimics a legitimate developer login portal to trick visitors into surrendering usernames and passwords. Once stolen, attackers can hijack accounts, pivot to other services, or sell the data on underground markets. Because GitHub’s free hosting infrastructure is abused here, the malicious link can spread quickly through social media or developer forums, reaching users who may lower their guard simply because the page sits on a familiar domain. Visiting the page therefore carries an immediate and severe risk of account compromise and downstream financial loss. This domain was flagged by concrete technical indicators. According to VirusTotal, 14 out of 95 security vendors now detect princebhadana0575-developer.github.io as malicious, and Google Safe Browsing classifies it under SOCIAL_ENGINEERING. The page is served over a Let’s Encrypt SSL certificate (no protection there) from the IP 185.199.108.153, which is already blocked by OpenPhish. Although the site is registered through GitHub, Inc., the combination of low vendor detection early on and active phishing payloads triggered multiple blocklists within hours of activation. If you visited princebhadana0575-developer.github.io, assume your credentials were harvested. Immediately change passwords on every account that used the same username or email, enable two-factor authentication wherever possible, and scan your devices for malware. Report the incident to your organization’s security team or to the platform the credentials protect. Do not reuse those credentials on any other service. Forward the URL to PhishDestroy or your threat-intel provider so the indicators can be added to blocklists and protect others. ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/princebhadana0575-developer.github.io/ JSON API: https://api.destroy.tools/v1/check?domain=princebhadana0575-developer.github.io Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 148,913 domains (40,473 alive under monitoring, 107,948 confirmed takedowns/dead). Site: https://phishdestroy.io