# PhishDestroy threat dossier — system-aave.limited ================================================================ Fetched: 2026-04-22 08:52:06 UTC Canonical: https://phishdestroy.io/domain/system-aave.limited/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: wallet_connect_phish Targeted brand: Aave (and: aave, balancer, chainlink, coinbase, curve) Wallet drainer: Angel Drainer Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: status_split) (score: 2/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 9/95 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, BitDefender, CyRadar, Fortinet, G-Data, Lionic, SOCRadar, Sophos URLQuery: 100 detections AlienVault OTX: 1 pulses (threat-intel feed mentions) Public blocklists: listed on 3 independent blocklists Victim re-reports (public form): 1 ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 196.251.66.67 (NL, Amsterdam) ASN: ASAS401116 NYBULA, US Registrar: Atak Domain Nameservers: ns1.plesk.axxel1.com, ns2.plesk.axxel1.com Registered: 2025-10-12 Expires: 2026-10-12 Page title: Aave - Open Source Liquidity Protocol ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: none Status: INVALID chain ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2025-10-12 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-02-25 02:39:27 UTC (by PhishDestroy tracker) First reported: 2025-10-13 00:02:46 UTC (abuse notice filed) Last verified: 2026-04-13 14:17:32 UTC Neutralised: 2026-02-23 03:15:03 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/0199dadf-dc37-7608-94be-715a78e390a6/ Wayback Machine: https://web.archive.org/web/*/system-aave.limited crt.sh CT logs: https://crt.sh/?q=%25.system-aave.limited Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=system-aave.limited AlienVault OTX: https://otx.alienvault.com/indicator/domain/system-aave.limited URLhaus: https://urlhaus.abuse.ch/host/system-aave.limited/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-03-19 02:15:19 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies system-aave.limited as a crypto drainer domain posing medium risk to users in the decentralized finance (DeFi) space. It impersonates the Aave liquidity protocol, attempting to trick users into compromising their cryptocurrency wallets. The threat leverages a malicious drainer kit known as Angel Drainer to exfiltrate sensitive crypto credentials and drain victim funds. Technically, the domain was registered recently on October 12, 2025, through Atak Domain and resolves to IP 196.251.66.67. It is currently flagged in two security blocklists and appears in one AlienVault OTX threat intelligence pulse, indicating ongoing monitoring by the cybersecurity community. Although only 9 of 95 VirusTotal security vendors detect it, the presence on multiple blocklists and use of the Angel Drainer kit underscore the domain’s malicious intent. The page title mimics the legitimate Aave protocol to lure victims with a false sense of security. Currently, system-aave.limited is offline and no longer accessible, mitigating immediate risk. However, given the potential impact on cryptocurrency holders, caution is advised when engaging with similar domains or unsolicited links mimicking trusted DeFi platforms. Users should verify domain authenticity, avoid connecting wallets to unknown sites, and employ updated security software to detect emerging threats. PhishDestroy recommends maintaining vigilance and reporting suspicious domains promptly to reduce exposure to crypto draining attacks. ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/system-aave.limited/ JSON API: https://api.destroy.tools/v1/check?domain=system-aave.limited Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io