# PhishDestroy threat dossier — roblox-custom-accessory-filter-script.pages.dev ================================================================ Fetched: 2026-05-04 22:42:43 UTC Canonical: https://phishdestroy.io/domain/roblox-custom-accessory-filter-script.pages.dev/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 87/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 4/91 security vendors flagged this domain Flagging vendors: ADMINUSLabs, G-Data, MalwareURL, Sophos ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 188.114.96.3 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: CloudFlare, Inc. Registrar: Cloudflare, Inc. Nameservers: coleman.ns.cloudflare.com, vida.ns.cloudflare.com Registered: 2026-05-03 Page title: Making Your Own Roblox Custom Accessory Filter Script | Roblox Custom Accessory Filter Script HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E7 Expires: 2026-07-23 Status: INVALID chain Fingerprint: b91d9edd304e91d82f24f6ecc6d14eac7b9ae729356a581c8ed025c12cf7bf11 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-03 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-03 11:41:40 UTC (by PhishDestroy tracker) Last verified: 2026-05-04 13:40:05 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019decfe-6f0c-7598-bba1-2fe9306c57f1/ Wayback Machine: https://web.archive.org/web/*/roblox-custom-accessory-filter-script.pages.dev crt.sh CT logs: https://crt.sh/?q=%25.roblox-custom-accessory-filter-script.pages.dev Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=roblox-custom-accessory-filter-script.pages.dev AlienVault OTX: https://otx.alienvault.com/indicator/domain/roblox-custom-accessory-filter-script.pages.dev URLhaus: https://urlhaus.abuse.ch/host/roblox-custom-accessory-filter-script.pages.dev/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-03 11:43:01 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies roblox-custom-accessory-filter-script.pages.dev as an active phishing page disguised as a Roblox custom accessory filter script. This rogue site attempts to trick users into downloading malicious software or surrendering their Roblox credentials by masquerading as a legitimate modding tool. Once accessed, the page may deploy keyloggers or prompt victims to enter login details under false pretenses, risking account takeover or financial loss through credential theft. This domain was flagged by PhishDestroy with an elevated risk rating and is protected by a Let’s Encrypt SSL certificate. It resolves to IP 188.114.96.3 and was registered through Cloudflare, Inc. Notably, only 1 out of 95 VirusTotal security vendors detected malicious activity at the time of analysis, underscoring the importance of proactive threat intelligence and manual verification for newly observed domains. The domain follows a common pattern of threat actors using free hosting services like Cloudflare Pages to bypass traditional domain-based blocking mechanisms. If you visited roblox-custom-accessory-filter-script.pages.dev, immediately stop interacting with the page. Do not enter any credentials or download files. If you entered your Roblox password, change it immediately and enable two-factor authentication. Scan your device with updated antivirus software, especially if you downloaded any files. If you suspect account compromise, report it to Roblox support and monitor your account for unauthorized transactions. Always verify unofficial tools through official Roblox community channels and user reviews before use. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: ffebe6df6f1c4247861f31be1e2d9077 TLS cert SHA-256: b91d9edd304e91d82f24f6ecc6d14eac7b9ae729356a581c8ed025c12cf7bf11 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/roblox-custom-accessory-filter-script.pages.dev/ JSON API: https://api.destroy.tools/v1/check?domain=roblox-custom-accessory-filter-script.pages.dev Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 145,673 domains (56,118 alive under monitoring, 89,295 confirmed takedowns/dead). Site: https://phishdestroy.io