# PhishDestroy threat dossier — rizvedevelop.com ================================================================ Fetched: 2026-04-19 21:29:05 UTC Canonical: https://phishdestroy.io/domain/rizvedevelop.com/ ## VERDICT ---------------------------------------------------------------- ACTIVE THREAT — multiple warning signs Composite threat score: 41/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 6/95 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, BitDefender, Certego, Fortinet, G-Data URLQuery: 2 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 147.45.41.219 Registrar: Dynadot Inc Nameservers: ns1.dyna-ns.net, ns2.dyna-ns.net Registered: 2026-04-19 Page title: Next Generation Script Exploits HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R13 Expires: 2026-07-18 Status: INVALID chain Fingerprint: c692b571ff5e49c4e6d8d3bc53dc93942f64bf8f4f11ec53c9635b3ca9bbbf88 Subject Alternative Names (related infrastructure — often same operator): - www.rizvedevelop.com ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-19 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-19 20:28:15 UTC (by PhishDestroy tracker) First reported: 2026-04-19 17:29:59 UTC (abuse notice filed) Last verified: 2026-04-19 22:38:12 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019da6c8-6528-7019-9590-b716d03c3a3d/ URLQuery: https://urlquery.net/report/f13b1d32-f8a9-449a-bd47-37d710a637a1 Wayback Machine: https://web.archive.org/web/*/rizvedevelop.com crt.sh CT logs: https://crt.sh/?q=%25.rizvedevelop.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=rizvedevelop.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/rizvedevelop.com URLhaus: https://urlhaus.abuse.ch/host/rizvedevelop.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-19 20:28:34 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies rizvedevelop.com as a confirmed phishing domain active since April 19, 2026. This site is engineered to deceive users into sharing sensitive information such as login credentials, payment details, or personal data under the guise of a legitimate service or platform. Attackers often use such deception to harvest data for identity theft, financial fraud, or corporate espionage. The site resolves to IP 147.45.41.219 and uses a Let’s Encrypt SSL certificate, which may falsely suggest safe browsing. Users should avoid entering any data and treat all communications referencing this domain as suspicious. This domain was flagged by 6 out of 95 VirusTotal security vendors, indicating a significant level of suspicion across multiple detection engines. It was registered through Dynadot Inc on April 19, 2026, making it a very recent addition to the threat landscape. The combination of a newly created domain, low but positive detection rate, and SSL certificate usage suggests an opportunistic phishing campaign rather than a long-standing malicious infrastructure. The elevated risk level reflects the potential for real-world harm if users interact with the site. If you visited rizvedevelop.com, do not enter any personal, financial, or login information. Immediately close the browser tab and clear your browsing data for that site. Run a full antivirus scan on your device to check for any compromise. If you entered credentials or sensitive data, change those passwords immediately, enable multi-factor authentication where possible, and monitor your accounts for unauthorized activity. Report the domain to your IT team or security provider and consider blocking it at your network level. Always verify URLs carefully and use official channels to confirm the legitimacy of websites before entering any data. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260419-B50754 TLS cert SHA-256: c692b571ff5e49c4e6d8d3bc53dc93942f64bf8f4f11ec53c9635b3ca9bbbf88 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/rizvedevelop.com/ JSON API: https://api.destroy.tools/v1/check?domain=rizvedevelop.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io