# PhishDestroy threat dossier — royalfityneardelhiairport.spahotel.guru ================================================================ Fetched: 2026-05-17 04:12:18 UTC Canonical: https://phishdestroy.io/domain/royalfityneardelhiairport.spahotel.guru/ ## VERDICT ---------------------------------------------------------------- ACTIVE THREAT — multiple warning signs Composite threat score: 48/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 12/95 security vendors flagged this domain Flagging vendors: ADMINUSLabs, BitDefender, ESET, Fortinet, G-Data, Kaspersky, Lionic, OpenPhish, Seclookup, Sophos, VIPRE, Webroot ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 52.29.26.157 (DE, Frankfurt am Main) ASN: AS16509 Amazon.com, Inc. Hosting org: AWS EC2 (eu-central-1) Registrar: REGISTRAR_NOT_FOUND Nameservers: NS_NOT_FOUND Registered: 2026-05-17 Page title: Hotel Royal Infinity Near Delhi Airport New Delhi - New Delhi, India HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E8 Expires: 2026-07-30 Status: INVALID chain Fingerprint: 6673fc5704a8083a941f5941be5b22294274992e098ffe43e01c35663f810601 Subject Alternative Names (related infrastructure — often same operator): - spahotel.guru ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-17 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-17 03:32:47 UTC (by PhishDestroy tracker) Last verified: 2026-05-17 06:04:03 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e3357-bb0c-7619-8f0e-696ac1da4332/ Wayback Machine: https://web.archive.org/web/*/royalfityneardelhiairport.spahotel.guru crt.sh CT logs: https://crt.sh/?q=%25.royalfityneardelhiairport.spahotel.guru Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=royalfityneardelhiairport.spahotel.guru AlienVault OTX: https://otx.alienvault.com/indicator/domain/royalfityneardelhiairport.spahotel.guru URLhaus: https://urlhaus.abuse.ch/host/royalfityneardelhiairport.spahotel.guru/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-17 03:33:30 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies royalfityneardelhiairport.spahotel.guru as a fake airline spa booking phishing site that impersonates Delhi Airport’s premium spa services to steal payment and login details. The domain mimics a legitimate Royal Fityne Airline spa portal, luring users with false promises of discounted or exclusive spa treatments. Once victims enter their personal or payment information, attackers harvest the data for fraudulent transactions or identity theft. This is an elevated-risk threat designed to exploit trust in airline-branded services. This domain was flagged by PhishDestroy after 12 out of 95 VirusTotal security vendors detected malicious content. It resolved to IP address 52.29.26.157 and uses a Let’s Encrypt SSL certificate to appear legitimate. The domain was registered through a privacy-protected registrar and shows signs of recent creation, with no prior reputation in threat intelligence feeds. The mismatch between the domain name (spahotel.guru) and the claimed airline service further indicates malicious intent, as legitimate businesses rarely use .guru top-level domains. If you visited this site, stop entering any information immediately. Clear your browser cache and cookies, and scan your device with updated antivirus software. Do not trust follow-up emails claiming to help ‘secure your account’—they are likely part of the same campaign. Report the domain to your IT team or use PhishDestroy’s lookup tool to verify future links. Always navigate directly to official airline websites using verified URLs or bookmarked links to avoid similar scams. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: f64ad864d87e446dc9f89caf5522936c TLS cert SHA-256: 6673fc5704a8083a941f5941be5b22294274992e098ffe43e01c35663f810601 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/royalfityneardelhiairport.spahotel.guru/ JSON API: https://api.destroy.tools/v1/check?domain=royalfityneardelhiairport.spahotel.guru Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 150,473 domains (27,148 alive under monitoring, 123,046 confirmed takedowns/dead). Site: https://phishdestroy.io