# PhishDestroy threat dossier — qr-topayday1ra.com ================================================================ Fetched: 2026-05-08 17:59:51 UTC Canonical: https://phishdestroy.io/domain/qr-topayday1ra.com/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 20/95 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, Chong Lua Dao, Cluster25, CRDF, CyRadar, ESET, Forcepoint ThreatSeeker, Fortinet, G-Data, Gridinsoft, Kaspersky, LevelBlue, Lionic, Mimecast, OpenPhish, SOCRadar, Sophos, VIPRE, Webroot Public blocklists: listed on 2 independent blocklists ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 34.44.237.96 (US, Council Bluffs) ASN: AS396982 Google LLC Hosting org: Google Cloud (us-central1) Registrar: Aceville Pte. Ltd. Nameservers: a.dnspod.com, b.dnspod.com, c.dnspod.com Registered: 2026-05-04 Page title: スマートフォンでQRコードを読み取ってください HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: TrustAsia Technologies, Inc. / LiteSSL RSA CA 2025 Expires: 2026-08-02 Status: INVALID chain Fingerprint: 5b2b49cd800dabc0cce80c945f5bba6db57248b15d55d35ad3e5c55cf6d661dd ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-04 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-08 11:17:33 UTC (by PhishDestroy tracker) Last verified: 2026-05-08 20:25:36 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e06a6-17dc-764e-bcb5-78742a2fcfe2/ Wayback Machine: https://web.archive.org/web/*/qr-topayday1ra.com crt.sh CT logs: https://crt.sh/?q=%25.qr-topayday1ra.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=qr-topayday1ra.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/qr-topayday1ra.com URLhaus: https://urlhaus.abuse.ch/host/qr-topayday1ra.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-08 11:19:20 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies qr-topayday1ra.com as an active phishing domain impersonating payday loan services to harvest sensitive financial data. This domain operates as a generic phishing page designed to deceive users seeking short-term loans, leveraging urgency and trust-building tactics to extract personal and banking information. The threat actor behind this domain employs a fraudulent user interface mimicking legitimate payday lenders, with no evidence of a drainer kit or advanced obfuscation techniques, indicating a low-to-moderate sophistication level. This domain was flagged with a VirusTotal score of 20/95 security vendors detecting malicious activity, indicating widespread recognition across threat intelligence platforms. The domain was registered on May 04, 2026, through Aceville Pte. Ltd., and resolves to IP address 34.44.237.96. The SSL certificate is issued by TrustAsia Technologies, Inc., which does not mitigate the phishing risk. Additionally, the domain is blocked by two major security blocklists, OpenPhish and PhishingArmy, and is flagged by Google Safe Browsing (GSB) as malicious. The domain’s recent creation date and active status suggest a time-sensitive threat requiring immediate attention. As of the latest assessment, qr-topayday1ra.com remains active and poses an elevated risk to users searching for payday loan services. Immediate response actions include blocking the domain at the network and endpoint levels, updating security blocklists, and issuing user advisories to avoid interactions with this fraudulent site. While the domain is currently under active monitoring, the risk of continued exploitation persists due to its recent deployment and the lack of advanced evasion techniques employed by the threat actor. Users are advised to exercise caution and verify the legitimacy of financial service websites before submitting sensitive information. [Updates since narrative was generated:] - VirusTotal detections: now 20/95 (narrative was written when count was lower) ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: 516db5e3d5a53e3436a7719babc32ff4 TLS cert SHA-256: 5b2b49cd800dabc0cce80c945f5bba6db57248b15d55d35ad3e5c55cf6d661dd ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/qr-topayday1ra.com/ JSON API: https://api.destroy.tools/v1/check?domain=qr-topayday1ra.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 147,310 domains (48,569 alive under monitoring, 98,404 confirmed takedowns/dead). Site: https://phishdestroy.io