# PhishDestroy threat dossier — suite-trzer-eng.pages.dev ================================================================ Fetched: 2026-05-01 13:36:07 UTC Canonical: https://phishdestroy.io/domain/suite-trzer-eng.pages.dev/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Trezor ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 8/91 security vendors flagged this domain Flagging vendors: ADMINUSLabs, BitDefender, CyRadar, Fortinet, G-Data, Kaspersky, LevelBlue, Sophos ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 188.114.96.3 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: CloudFlare, Inc. Registrar: Cloudflare, Inc. Nameservers: hal.ns.cloudflare.com, jacqueline.ns.cloudflare.com Registered: 2026-04-30 Page title: Trezor Suite© – Manage Your Crypto Securely HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-07-28 Status: INVALID chain Fingerprint: 3c23cf9560f95e04d8e23527dbf3a2dcbcee7ce1a6745cb5b65f58694fbc21fd ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-30 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-30 20:22:52 UTC (by PhishDestroy tracker) Last verified: 2026-05-01 13:05:35 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019ddf68-07d7-7672-8517-496ea64f410a/ Wayback Machine: https://web.archive.org/web/*/suite-trzer-eng.pages.dev crt.sh CT logs: https://crt.sh/?q=%25.suite-trzer-eng.pages.dev Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=suite-trzer-eng.pages.dev AlienVault OTX: https://otx.alienvault.com/indicator/domain/suite-trzer-eng.pages.dev URLhaus: https://urlhaus.abuse.ch/host/suite-trzer-eng.pages.dev/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-30 20:24:43 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies suite-trzer-eng.pages.dev as a potentially dangerous domain currently under investigation for generic phishing activities targeting cryptocurrency users. This page, hosted on Cloudflare Pages at IP 188.114.96.3, poses a significant risk by masquerading as a legitimate service, likely aiming to trick visitors into revealing sensitive credentials or transferring digital assets to attacker-controlled wallets. While the site currently operates without widespread detection—marked by 0 detections out of 95 VirusTotal scans—its active status and recent deployment warrant heightened caution among users, particularly those involved in crypto transactions. This domain was flagged through automated threat intelligence pipelines, revealing key technical indicators that suggest malicious intent. Registered via Cloudflare, Inc., the site leverages Google Trust Services for its SSL certificate, a tactic often used to appear legitimate at first glance. The domain resolves to IP address 188.114.96.3, which is associated with Cloudflare’s infrastructure. Notably, VirusTotal’s analysis shows 0 detections as of the latest scan, leaving this threat largely undetected by conventional security tools. The domain’s structure, combining terms like 'suite,' 'trzer,' and 'eng,' may indicate an attempt to impersonate a legitimate organization, possibly a software suite or engineering service, further blurring the line between safe and malicious content. If you’ve already visited suite-trzer-eng.pages.dev, take immediate steps to secure your accounts. Begin by disconnecting any wallets or browser extensions connected to cryptocurrency platforms. Scan your device for malware or unauthorized browser extensions using reputable antivirus software. If you entered any credentials or sensitive information, change those passwords immediately and enable two-factor authentication where possible. Report the domain to your security team or the platform it impersonates, and consider blocking the domain at your network or DNS level to prevent further exposure. Stay vigilant, as threat actors frequently update domains and tactics to evade detection. ## EVIDENCE HASHES ---------------------------------------------------------------- TLS cert SHA-256: 3c23cf9560f95e04d8e23527dbf3a2dcbcee7ce1a6745cb5b65f58694fbc21fd ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/suite-trzer-eng.pages.dev/ JSON API: https://api.destroy.tools/v1/check?domain=suite-trzer-eng.pages.dev Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io