# suport--ledgr-eng.pages.dev — SUSPICIOUS > Domain suport--ledgr-eng.pages.dev masquerades as Ledger login to steal crypto; flagged by Google Safe Browsing. ## Summary Domain suport--ledgr-eng.pages.dev is currently under investigation for impersonating Ledger hardware wallet login pages to harvest user credentials and cryptocurrency wallet access. The domain leverages a spoofed support interface designed to deceive users into entering their Ledger recovery phrases or private keys under the guise of account validation. PhishDestroy identifies this domain as actively propagating a credential theft attack vector with confirmed social engineering intent. The infrastructure is hosted on Cloudflare Pages and resolves to a Google Front End IP within Cloudflare’s 188.114.97.0/24 range, indicative of abuse of legitimate cloud hosting services to evade traditional domain-based detections. Users interacting with this domain should immediately revoke any entered credentials and audit wallet access permissions. PhishDestroy’s threat intelligence indicates this domain remains unflagged by the majority of security vendors, with 0 detections out of 95 VirusTotal scanners at time of analysis. The domain is registered through Cloudflare, Inc. and resolves to IP 188.114.97.3. It is flagged by Google Safe Browsing under the category SOCIAL_ENGINEERING, confirming malicious intent. The SSL certificate is issued by Google Trust Services, leveraging Google’s infrastructure to appear legitimate. Technical indicators include the use of Cloudflare Pages for rapid deployment and evasion, and a payload likely delivered via JavaScript injection targeting Ledger’s WebAssembly authentication module. Risk assessment is currently classified as under_investigation due to evolving infrastructure, but the presence of Google Safe Browsing detection signals confirmed malicious behavior. At this time, the domain remains active and accessible, with no takedown action observed. PhishDestroy recommends users avoid this domain entirely and verify any Ledger-related login pages via official channels only (ledger.com). If credentials were entered, immediately rotate recovery phrases, transfer assets to unaffected wallets, and audit all device authorizations. Security teams should monitor for indicators such as domain creation timestamp, IP reputation changes, and new subdomains under pages.dev. This domain should be added to network and browser blocklists to prevent further victimization. Continuous monitoring is advised as threat actors may rapidly modify hosting infrastructure or payloads to evade detection. ## Threat Details - Verdict: SUSPICIOUS - Site status: unknown (HTTP ?) ## Domain Intelligence - Registrar: Cloudflare, Inc. - IP: 188.114.97.3 ## Detection Status - VirusTotal: 0 vendors flagged - Google Safe Browsing: FLAGGED - Blocklists: 0 hits ## Evidence - Cloudflare Radar: https://radar.cloudflare.com/scan/662222be-2517-42bc-9c61-5aa5f92ccd5b - PhishDestroy: https://phishdestroy.io/domain/suport--ledgr-eng.pages.dev/ - LLM endpoint: https://phishdestroy.io/domain/suport--ledgr-eng.pages.dev/llm.txt ## If You Visited This Site 1. Change any passwords you may have entered 2. Enable 2FA on all related accounts 3. Monitor your accounts for unauthorized activity 4. Report to: FBI IC3, Europol, local authorities --- Report by PhishDestroy | https://phishdestroy.io/domain/suport--ledgr-eng.pages.dev/ Last updated: 2026-03-22