# str-smcontrcats.cfd — MALICIOUS > Discover the risks of str-smcontrcats.cfd, a high-risk phishing domain flagged by multiple security systems. Learn how to protect yourself today. ## Summary PhishDestroy identifies str-smcontrcats.cfd as an active phishing domain posing a high risk to users. This site is involved in generic phishing attacks designed to steal sensitive information by impersonating legitimate services or entities. The domain's creation in early 2026 and its association with suspicious activity underline the threat's immediacy. Technically, str-smcontrcats.cfd is registered through NICENIC INTERNATIONAL GROUP CO., LIMITED and resolves to the IP address 94.154.35.167. It is currently listed on two security blocklists, indicating that multiple threat intelligence sources recognize its malicious intent. VirusTotal analysis shows 19 out of 95 security vendors flag this domain, reinforcing its suspicious nature and the need for caution. The domain remains active, and users should avoid interacting with it. PhishDestroy recommends implementing strong email filtering, updating endpoint security, and educating users about phishing risks to mitigate exposure. Blocking access to str-smcontrcats.cfd and monitoring related network activity are critical steps to prevent data compromise linked to this threat. ## Threat Details - Verdict: MALICIOUS - Site status: dead (HTTP 0) - Page title: Sorry, the website has been stopped ## Domain Intelligence - Registered: 2026-03-08 19:07:01 - Registrar: NiceNIC International Group Co., Limited - Country: HK - IP: 94.154.35.167 - IP Country: NL - IP City: Hopel - IP Org: AS202412 Omegatech LTD - Nameservers: ["ns3.my-ndns.com", "ns4.my-ndns.com"] - SSL Issuer: none ## Detection Status - VirusTotal: 16 vendors flagged Vendors: ["ADMINUSLabs", "BitDefender", "CRDF", "CyRadar", "Fortinet", "G-Data", "Kaspersky", "Lionic", "MalwareURL", "Seclookup", "SOCRadar", "Sophos", "Sucuri SiteCheck", "Trustwave", "VIPRE", "Webroot"] - Google Safe Browsing: clean - Blocklists: 3 hits Lists: ["PhishDestroy", "MetaMask", "SEAL"] ## Evidence - Screenshot: https://urlscan.io/screenshots/019ccea3-79ed-70bd-8ab5-4cc7b271093d.png - Cloudflare Radar: https://radar.cloudflare.com/scan/9c1ab109-ad64-4beb-9a89-ad7e2cd162ba - Wayback Machine: https://web.archive.org/web/https://str-smcontrcats.cfd - PhishDestroy: https://phishdestroy.io/domain/str-smcontrcats.cfd/ - LLM endpoint: https://phishdestroy.io/domain/str-smcontrcats.cfd/llm.txt ## If You Visited This Site 1. Change any passwords you may have entered 2. Enable 2FA on all related accounts 3. Monitor your accounts for unauthorized activity 4. Report to: FBI IC3, Europol, local authorities --- Report by PhishDestroy | https://phishdestroy.io/domain/str-smcontrcats.cfd/ Last updated: 2026-03-19