# PhishDestroy threat dossier — requi-trezobridge.pages.dev ================================================================ Fetched: 2026-04-30 20:01:14 UTC Canonical: https://phishdestroy.io/domain/requi-trezobridge.pages.dev/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Trezor ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 11/91 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, BitDefender, CyRadar, Forcepoint ThreatSeeker, Fortinet, G-Data, Kaspersky, LevelBlue, Lionic, Sophos ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 188.114.97.3 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: CloudFlare, Inc. Registrar: Cloudflare, Inc. Nameservers: jacqueline.ns.cloudflare.com, quincy.ns.cloudflare.com Registered: 2026-04-27 Page title: Trezor Bridge – White Mode Secure Connection HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-07-18 Status: INVALID chain Fingerprint: 61ebc6d92ef5dd9d9cdf4633c0c6eb98a41ee0c9b054213df308df229d2c9f45 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-27 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-27 06:21:13 UTC (by PhishDestroy tracker) Last verified: 2026-04-29 07:40:12 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dccf2-7378-72ae-a931-72a02e683465/ Wayback Machine: https://web.archive.org/web/*/requi-trezobridge.pages.dev crt.sh CT logs: https://crt.sh/?q=%25.requi-trezobridge.pages.dev Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=requi-trezobridge.pages.dev AlienVault OTX: https://otx.alienvault.com/indicator/domain/requi-trezobridge.pages.dev URLhaus: https://urlhaus.abuse.ch/host/requi-trezobridge.pages.dev/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-27 06:21:42 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies requi-trezobridge.pages.dev as a malicious domain impersonating the official Trezor Bridge service to steal cryptocurrency wallet credentials. This domain uses a convincing spoof of the legitimate Trezor Bridge page, aiming to trick users into entering their recovery seeds or private keys. Once submitted, the harvested data is immediately exfiltrated to attacker-controlled servers under the control of the phishing operator. The page is currently live and accessible from IP 188.114.97.3, which is hosted by Cloudflare’s infrastructure, a common tactic used to obfuscate true origin and bypass IP-based blocking. This domain was flagged with zero detections across 95 VirusTotal engines as of the latest scan, indicating that traditional antivirus and security tools have yet to classify it as malicious. The SSL certificate is issued by Google Trust Services, further enhancing its perceived legitimacy. Registered through Cloudflare, Inc., the domain was likely created recently to evade historical blocklists. Users should treat this domain as a confirmed threat vector and avoid interaction immediately. Based on the available data and behavior analysis, the risk level is classified as 'active' and under further investigation by security teams. If you have visited requi-trezobridge.pages.dev, assume your sensitive data may have been compromised. Do not use the services or enter any cryptocurrency wallet details on this page. Disconnect any connected devices from the internet if possible, and power off any wallets that may have been accessed. Revoke any session tokens or API keys that could have been exposed. Report the domain to your antivirus vendor, browser provider, and the original service being impersonated (Trezor Support). Enable multi-factor authentication and hardware wallet protections. Monitor your wallet activity closely and consider transferring remaining funds to a newly generated, secure wallet. Always verify the official URL (trezor.io/bridge) before using any crypto-related service and confirm SSL certificate validity. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: 47cd79fa2df1f5ec0cefec2baa548577 TLS cert SHA-256: 61ebc6d92ef5dd9d9cdf4633c0c6eb98a41ee0c9b054213df308df229d2c9f45 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/requi-trezobridge.pages.dev/ JSON API: https://api.destroy.tools/v1/check?domain=requi-trezobridge.pages.dev Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io