# PhishDestroy threat dossier — t-mobile.rplahx.top ================================================================ Fetched: 2026-05-20 23:13:28 UTC Canonical: https://phishdestroy.io/domain/t-mobile.rplahx.top/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 11/92 security vendors flagged this domain Flagging vendors: ADMINUSLabs, Cluster25, CRDF, Emsisoft, Fortinet, G-Data, Gridinsoft, LevelBlue, Netcraft, SOCRadar, Sophos ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 188.114.97.3 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: CloudFlare, Inc. Registrar: NameSilo,LLC !!! REGISTRAR INTEGRITY ALERT — NameSilo !!! NameSilo is a registrar documented by PhishDestroy as (1) publicly lying about received abuse reports, (2) shielding a $20M+ Monero-theft operation (xmrwallet.com) for 10 continuous years, and (3) retaliating against PhishDestroy by getting our X/Twitter account @Phish_Destroy banned after we published the evidence. Researchers/victims must ALWAYS CC compliance@icann.org on every abuse ticket — NameSilo has a track record of later claiming reports were never received. Primary sources: https://phishdestroy.io/namesilo-killed-our-twitter https://phishdestroy.io/xmrwallet-namesilo-exposed Nameservers: ["reese.ns.cloudflare.com.", "monika.ns.cloudflare.com."] Registered: 2026-05-19 Page title: Welcome to OpenResty! HTTP response: 530 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E8 Expires: 2026-08-14 Status: INVALID chain Fingerprint: 1475bb74e2aefcf183368b5a20159e2a1d0cbbc0a3de5ac9ca8312f59de85670 Subject Alternative Names (related infrastructure — often same operator): - rplahx.top ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-19 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-19 15:37:06 UTC (by PhishDestroy tracker) Last verified: 2026-05-20 23:47:54 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e403a-9122-76b1-b6ab-9bddaab3197f/ Wayback Machine: https://web.archive.org/web/*/t-mobile.rplahx.top crt.sh CT logs: https://crt.sh/?q=%25.t-mobile.rplahx.top Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=t-mobile.rplahx.top AlienVault OTX: https://otx.alienvault.com/indicator/domain/t-mobile.rplahx.top URLhaus: https://urlhaus.abuse.ch/host/t-mobile.rplahx.top/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-19 15:38:40 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies t-mobile.rplahx.top as a live crypto drainer domain operating under a high-risk threat classification. This malicious site mimics T-Mobile branding to trick users into connecting crypto wallets, with the goal of draining digital assets through deceptive wallet connection prompts. The domain presents a fraudulent login interface designed to harvest credentials and facilitate unauthorized cryptocurrency transfers. This is not a generic phishing attempt but a targeted crypto-draining operation leveraging brand impersonation for maximum deception and financial gain. This domain was flagged by 9 out of 95 VirusTotal security vendors, indicating strong consensus among antivirus engines regarding its malicious nature. It resolves to IP address 188.114.97.3, a known malicious infrastructure node frequently associated with cryptocurrency scams. The domain was registered through NameSilo,LLC on May 16, 2026, which represents an unusually recent creation date for a domain actively hosting malicious content. The site operates under a valid Let's Encrypt SSL certificate, which adds a false sense of legitimacy to the fraudulent login portal. These technical indicators collectively paint a picture of a sophisticated, rapidly deployed crypto-draining operation designed to evade initial detection while appearing trustworthy to potential victims. Users should immediately cease all interaction with this domain and verify any similar links through PhishDestroy’s verification system before proceeding. To protect against crypto drainers, always verify the URL structure and domain spelling before entering any credentials or connecting wallets. Examine browser address bars carefully for subtle misspellings or unusual top-level domains. Implement wallet connection verification protocols and use hardware wallets for high-value transactions. Consider using browser extensions that detect and block known crypto drainer domains. Report any encounters with this domain to PhishDestroy and relevant cryptocurrency platforms to help disrupt these malicious operations before additional victims are compromised. ## EVIDENCE HASHES ---------------------------------------------------------------- TLS cert SHA-256: 1475bb74e2aefcf183368b5a20159e2a1d0cbbc0a3de5ac9ca8312f59de85670 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/t-mobile.rplahx.top/ JSON API: https://api.destroy.tools/v1/check?domain=t-mobile.rplahx.top Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 152,162 domains (43,259 alive under monitoring, 108,591 confirmed takedowns/dead). Site: https://phishdestroy.io