# PhishDestroy threat dossier — pumptokenvouchl01p1.netlify.app ================================================================ Fetched: 2026-04-21 23:24:18 UTC Canonical: https://phishdestroy.io/domain/pumptokenvouchl01p1.netlify.app/ ## VERDICT ---------------------------------------------------------------- STATUS STALE — last probed 21 days ago, treat as ACTIVE until re-verified Composite threat score: 82/100 (PhishDestroy scoring — see methodology below) Scam classification: cryptocurrency Targeted brand: OKX ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/95 security vendors flagged this domain Public blocklists: listed on 3 independent blocklists Victim re-reports (public form): 1 ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 63.176.8.218 (DE, Frankfurt am Main) ASN: ASAS16509 Amazon.com, Inc. Hosting org: AS16509 Amazon.com, Inc. Registrar: Name.com, Inc (Netlify) Nameservers: dns1.p01.nsone.net, dns2.p01.nsone.net, dns3.p01.nsone.net, dns4.p01.nsone.net Registered: 2026-02-21 Expires: 2026-05-08 Page title: Site not found HTTP response: 404 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: DigiCert Inc / DigiCert Global G2 TLS RSA SHA256 2020 CA1 Expires: 2027-03-19 Status: INVALID chain Fingerprint: bc3a8134c21a842e64ea34d488826dd2ba50f59a3bcbaed1e6b71a4242de1478 Subject Alternative Names (related infrastructure — often same operator): - netlify.app ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-02-21 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-02-25 02:39:27 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-02-06 18:52:55 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-03-31 01:19:40 UTC (STALE — 21 days ago, re-verify) Flagged dead: 2026-04-21 00:00:46 UTC (NOT RE-VERIFIED IN 21 DAYS — treat as unconfirmed) Current status: UNCONFIRMED (our live-probe is 21 days stale) Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019c33a6-cf74-735d-96f4-a2b15e235cc0/ Wayback Machine: https://web.archive.org/web/*/pumptokenvouchl01p1.netlify.app crt.sh CT logs: https://crt.sh/?q=%25.pumptokenvouchl01p1.netlify.app Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=pumptokenvouchl01p1.netlify.app AlienVault OTX: https://otx.alienvault.com/indicator/domain/pumptokenvouchl01p1.netlify.app URLhaus: https://urlhaus.abuse.ch/host/pumptokenvouchl01p1.netlify.app/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-03-24 01:17:49 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy has identified pumptokenvouchl01p1.netlify.app as a brand impersonation threat targeting the cryptocurrency platform OKX. Despite the site currently being offline, this domain was created with the intent to mislead users by mimicking the trusted brand, potentially aiming to capture sensitive information or credentials. Such impersonation attacks pose significant risks to users by exploiting brand trust, which can lead to financial loss or data compromise. The domain pumptokenvouchl01p1.netlify.app was registered on February 21, 2026, via Name.com, Inc, and is hosted on the Netlify platform. The domain resolves to IP address 63.176.8.218 and has appeared on three separate security blocklists, signaling suspicious activity. Notably, VirusTotal scans have not flagged this domain, showing zero detections across 95 vendors, which indicates that some phishing infrastructure may evade current automated detection methods. The site’s page title currently shows "Site not found," as it has been taken offline, but the domain remains under active investigation to assess any residual risks. Users are advised to remain vigilant when interacting with any links or communications referencing OKX, especially those from unfamiliar sources or unexpected channels. Always verify URLs carefully and avoid entering login information or sensitive data on suspicious or unverified websites. Organizations should monitor similar domains for early signs of phishing attempts and ensure that their users are informed about ongoing impersonation threats. PhishDestroy continues to track developments related to pumptokenvouchl01p1.netlify.app and urges caution as investigations proceed. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon SHA-256: d4ec07824fc01afe6046ada9c228b29881054f808b7d7900fbad965325e97f25 TLS cert SHA-256: bc3a8134c21a842e64ea34d488826dd2ba50f59a3bcbaed1e6b71a4242de1478 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/pumptokenvouchl01p1.netlify.app/ JSON API: https://api.destroy.tools/v1/check?domain=pumptokenvouchl01p1.netlify.app Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io