# PhishDestroy threat dossier — shop-ledgr-wallet.pages.dev ================================================================ Fetched: 2026-04-30 17:04:28 UTC Canonical: https://phishdestroy.io/domain/shop-ledgr-wallet.pages.dev/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Ledger ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 12/91 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, BitDefender, CyRadar, ESET, Fortinet, G-Data, Kaspersky, LevelBlue, Lionic, Sophos, VIPRE ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.66.47.33 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Cloudflare, Inc. Nameservers: desi.ns.cloudflare.com, seamus.ns.cloudflare.com Registered: 2026-04-29 Page title: Ledger Wallet — Your Gateway to Safe Crypto Storage HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-07-19 Status: INVALID chain Fingerprint: ad9852bf93d21308c797bdfd0bb48c93c18e89ffd22cf8a163404b8cf6c138cd ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-29 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-29 07:15:31 UTC (by PhishDestroy tracker) Last verified: 2026-04-30 13:40:08 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dd771-02cc-75ae-a3d4-6481e165f4c3/ Wayback Machine: https://web.archive.org/web/*/shop-ledgr-wallet.pages.dev crt.sh CT logs: https://crt.sh/?q=%25.shop-ledgr-wallet.pages.dev Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=shop-ledgr-wallet.pages.dev AlienVault OTX: https://otx.alienvault.com/indicator/domain/shop-ledgr-wallet.pages.dev URLhaus: https://urlhaus.abuse.ch/host/shop-ledgr-wallet.pages.dev/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-29 07:16:19 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies shop-ledgr-wallet.pages.dev as an active crypto-drainer site designed to trick visitors into connecting a cryptocurrency wallet so that funds can be silently drained. When loaded in a browser, the page prompts users for a wallet connection under the guise of a “ledger wallet” interface. Any authorization granted through this prompt hands over transaction-signing privileges to the threat actor, enabling immediate theft of all assets without further approval from the victim. This domain was flagged by 11 of 95 VirusTotal security vendors within hours of its appearance. Telemetry shows it was registered through Cloudflare, Inc. and first resolved to IP address 172.66.47.33 on a Google Trust Services SSL certificate, a combination frequently abused for short-lived malicious pages behind Cloudflare’s proxy. The site’s brevity and rapid evasion tactics are hallmarks of modern crypto-draining campaigns that profit from distracted or hurried users. If you visited shop-ledgr-wallet.pages.dev—or entered any wallet credentials or signed any transactions while connected—revoke the wallet connection immediately through your wallet’s “connected sites” or “connected apps” menu and transfer remaining assets to a new, unused address. Next, flush your browser cache and reset browser settings to remove any lingering scripts. Report the incident to your wallet provider and local cybercrime unit; include the wallet address that authorized the connection so the transaction can be tracked. Moving forward, always verify links in wallet-related messages by manually typing the official URL or using a pre-approved bookmark to prevent similar attacks. ## EVIDENCE HASHES ---------------------------------------------------------------- TLS cert SHA-256: ad9852bf93d21308c797bdfd0bb48c93c18e89ffd22cf8a163404b8cf6c138cd ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/shop-ledgr-wallet.pages.dev/ JSON API: https://api.destroy.tools/v1/check?domain=shop-ledgr-wallet.pages.dev Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io