# PhishDestroy threat dossier — superteam.icu ================================================================ Fetched: 2026-05-01 03:46:23 UTC Canonical: https://phishdestroy.io/domain/superteam.icu/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Solana Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: content_split) (score: 1/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 2/94 security vendors flagged this domain Flagging vendors: Forcepoint ThreatSeeker, Gridinsoft ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 188.114.96.3 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: CloudFlare, Inc. Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com Nameservers: ["daisy.ns.cloudflare.com", "rustam.ns.cloudflare.com"] Registered: 2026-04-24 Page title: Superteam | The Talent Layer of Solana HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E8 Expires: 2026-07-21 Status: INVALID chain Fingerprint: 448887341a32c18a4b11f7de086bbf9dc7eaff05aae30e2d649e2a81d5a8b79b ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-24 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-24 18:22:58 UTC (by PhishDestroy tracker) Last verified: 2026-05-01 04:42:02 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dc012-9f5f-7279-a461-022ff0438335/ Wayback Machine: https://web.archive.org/web/*/superteam.icu crt.sh CT logs: https://crt.sh/?q=%25.superteam.icu Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=superteam.icu AlienVault OTX: https://otx.alienvault.com/indicator/domain/superteam.icu URLhaus: https://urlhaus.abuse.ch/host/superteam.icu/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-24 18:23:59 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies superteam.icu as an active crypto drainer phishing domain designed to trick users into connecting cryptocurrency wallets or entering seed phrases. This domain masquerades as a legitimate platform by leveraging a Let's Encrypt SSL certificate, which lends false credibility to its fraudulent pages. Threat actors commonly use such domains to harvest sensitive wallet data or initiate unauthorized transactions, posing an elevated risk to cryptocurrency users and investors. This domain was flagged by security vendors with a detection ratio of 1 out of 95 on VirusTotal, indicating limited but concerning visibility among security tools. Registered through PDR Ltd. d/b/a PublicDomainRegistry.com, the domain was created on April 22, 2026, and resolves to IP address 188.114.96.3. The recent registration date and low detection rate suggest this is a newly deployed threat designed to evade early-stage security scrutiny. While the exact count of blocklists is not provided, the combination of these factors highlights a targeted and rapidly evolving phishing campaign. If you have visited superteam.icu, immediately disconnect any connected cryptocurrency wallets, revoke any permissions granted to the site, and transfer your assets to a secure wallet if necessary. Do not enter any seed phrases or private keys on this domain. Run a full antivirus scan and consider changing passwords for critical accounts. Report this domain to PhishDestroy and your organization's security team to help disrupt ongoing campaigns. Stay vigilant against crypto drainer phishing attempts by verifying URLs before interacting with any platform. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: 819aae38b78efa72c042e5c0a6d59a0a TLS cert SHA-256: 448887341a32c18a4b11f7de086bbf9dc7eaff05aae30e2d649e2a81d5a8b79b ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/superteam.icu/ JSON API: https://api.destroy.tools/v1/check?domain=superteam.icu Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io