refreshed-minotaur-425702.framer[.]app
Forensic brief
Read full brief
PhishDestroy identifies refreshed-minotaur-425702.framer.app as an active fake login page scam designed to trick users into submitting sensitive credentials. This domain was crafted to mimic legitimate login portals, likely targeting victims through deceptive emails or messages that direct them to the malicious site. Once users enter their usernames, passwords, or other personal information, the attackers capture it for fraudulent use, including identity theft or unauthorized account access.
The risk of falling for this scam is elevated, as the domain is currently active and has already been blocked by one security blocklist, PhishingArmy. With 16 out of 95 security vendors flagging this domain, the threat is widely recognized but not universally detected, meaning some users may encounter it before protections are fully updated. This domain was flagged using a unique seed identifier (9fc7e9) and resolves to the IP address 31.43.161.6.
It operates under a Let’s Encrypt SSL certificate, which may give it a false sense of legitimacy by displaying a padlock icon in the browser address bar. While Framer.app is a legitimate platform for website creation, this subdomain has been hijacked or spoofed to host malicious content. The domain’s infrastructure and SSL certificate suggest an attempt to appear trustworthy, but the underlying intent is to deceive users into surrendering their login details.
Given its presence on security blocklists and low detection rate by some vendors, it poses a real danger to unsuspecting users. If you visited refreshed-minotaur-425702.framer.app, immediately check any accounts where you may have entered credentials—especially if they were the same as or similar to those used on this site. Change passwords for those accounts immediately and enable two-factor authentication where possible.
Scan your device for malware using reputable antivirus software, as some phishing pages may also attempt to install malicious payloads. Report the domain to your email provider or security team if you received it via phishing. Avoid interacting with this site in the future, and use caution when clicking links in unsolicited messages.
For broader protection, consider using a DNS filtering service like Quad9 or Cloudflare Family to block known malicious domains automatically.
Threat response pipeline
Cloudflare Radar
VirusTotal
Forensic Evidence Collectionabuse@framer.com with forensic evidence (metadata, screenshots, PDF).Evidence capture
Domain Intelligence
Technical details
Public blocklist status
Technologies
Technologies · 4 identified
VirusTotal consensus
Aggregated detection across 95 security vendors.
Site performance
Site performance analysis
Google PageSpeed Insights — mobile audit of refreshed-minotaur-425702.framer.app
Evidence & external reports
Were you affected by this site?
Were You Affected?
Recommendations & Advice for Victims
- Do not pay anything else. Recovery agents demanding upfront fees are a second-stage scam.
- Disconnect compromised wallets. Move remaining funds to a fresh seed phrase generated offline.
- Preserve evidence. Screenshot transactions, save URLs, archive emails — chain-of-custody matters for prosecution.
- Report to authorities (see section 15 below) — even small reports help build case patterns.
- Notify your bank/exchange. Some chargebacks may still be possible within 24-72h.
Report to your local authorities
Email template — registrar abuse
abuse@framer.com
Case: PD-20260517-1AF342
Embed this report
About this report
About this report: refreshed-minotaur-425702.framer.app
This domain security report is maintained by PhishDestroy's automated threat-intelligence pipeline. Our system continuously monitors this domain across 95 security vendors on VirusTotal and 1 public blocklists.
The site displays a page titled “My Framer Site”.
refreshed-minotaur-425702.framer.app has been flagged by 16 security vendors as of May 17, 2026.
If you believe this listing is inaccurate, you can submit an appeal. For more information about our methodology, visit our FAQ page.