# PhishDestroy threat dossier — qr-topayday7ea.com ================================================================ Fetched: 2026-05-08 17:57:50 UTC Canonical: https://phishdestroy.io/domain/qr-topayday7ea.com/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 20/95 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, BitDefender, Cluster25, CRDF, CyRadar, ESET, Forcepoint ThreatSeeker, Fortinet, G-Data, Gridinsoft, Kaspersky, LevelBlue, Lionic, Mimecast, OpenPhish, SOCRadar, Sophos, VIPRE, Webroot Public blocklists: listed on 2 independent blocklists ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 34.44.237.96 (US, Council Bluffs) ASN: AS396982 Google LLC Hosting org: Google Cloud (us-central1) Registrar: Aceville Pte. Ltd. Nameservers: a.dnspod.com, b.dnspod.com, c.dnspod.com Registered: 2026-05-04 Page title: スマートフォンでQRコードを読み取ってください HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: TrustAsia Technologies, Inc. / LiteSSL RSA CA 2025 Expires: 2026-08-02 Status: INVALID chain Fingerprint: a4607d1aae2e581ae81d6d19e430cee84d1096afcd99a20b27dbd69e50996ea7 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-04 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-08 11:15:33 UTC (by PhishDestroy tracker) Last verified: 2026-05-08 20:25:36 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e06a4-3c27-76f5-8850-a5c8717b4ab9/ Wayback Machine: https://web.archive.org/web/*/qr-topayday7ea.com crt.sh CT logs: https://crt.sh/?q=%25.qr-topayday7ea.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=qr-topayday7ea.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/qr-topayday7ea.com URLhaus: https://urlhaus.abuse.ch/host/qr-topayday7ea.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-08 11:16:37 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies qr-topayday7ea.com as an elevated-risk payday loan scam domain posing as a legitimate financial service. This fraudulent site specifically mimics quick-cash payday lenders to harvest sensitive user data including bank account credentials and personal identity information. The domain’s fake loan application forms are designed to trick victims into submitting financial details under the guise of securing emergency cash advances, after which the threat actor either sells the data on dark web forums or initiates unauthorized withdrawals directly from victims’ accounts. Given the active nature of this scam and its presence on multiple real-time threat feeds, immediate avoidance and proactive blocking are strongly recommended to prevent financial credential theft. This domain was flagged by 20 out of 95 security vendors on VirusTotal, indicating widespread detection of its malicious intent. It was registered on May 04, 2026, through Aceville Pte. Ltd., and resolves to IP address 34.44.237.96. The site holds a valid SSL certificate issued by TrustAsia Technologies, Inc., which is commonly abused to lend false credibility to phishing portals. Additionally, qr-topayday7ea.com has been blocked by OpenPhish and PhishingArmy, placing it on two independent blocklists dedicated to real-time phishing defense. Despite its recent creation, the domain’s deployment of HTTPS and its inclusion on authoritative threat intelligence feeds underscore its active operational status and elevated risk profile among cybersecurity professionals. To mitigate exposure to this payday loan scam, users must immediately cease all interaction with qr-topayday7ea.com and avoid clicking any links associated with the domain. System administrators should implement network-level blocking via DNS filtering or firewall rules targeting IP 34.44.237.96 and the domain name. Financial institutions should monitor for attempted credential submissions from customers who may have visited the site and issue fraud alerts if detection occurs. Finally, users are advised to report the domain to their email provider and browser’s phishing reporting tools to help reduce its distribution across digital channels. Vigilance in verifying sender identities and avoiding unsolicited loan offers remains critical in preventing this type of credential harvesting attack. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: 516db5e3d5a53e3436a7719babc32ff4 TLS cert SHA-256: a4607d1aae2e581ae81d6d19e430cee84d1096afcd99a20b27dbd69e50996ea7 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/qr-topayday7ea.com/ JSON API: https://api.destroy.tools/v1/check?domain=qr-topayday7ea.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 147,310 domains (48,569 alive under monitoring, 98,404 confirmed takedowns/dead). Site: https://phishdestroy.io