# PhishDestroy threat dossier — tangandewamerah.store ================================================================ Fetched: 2026-05-01 20:02:29 UTC Canonical: https://phishdestroy.io/domain/tangandewamerah.store/ ## VERDICT ---------------------------------------------------------------- HIGH THREAT — malicious activity confirmed Composite threat score: 65/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 2/94 security vendors flagged this domain Flagging vendors: alphaMountain.ai, Gridinsoft ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 188.114.96.3 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: CloudFlare, Inc. Registrar: NameCheap, Inc. Nameservers: ["jason.ns.cloudflare.com", "teresa.ns.cloudflare.com"] Registered: 2026-04-22 Page title: Tangandewa: Situs Slot Gacor Hari Ini Ada Link Slot88 Maxwin Qris Terbaru HTTP response: 403 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E7 Expires: 2026-07-16 Status: INVALID chain Fingerprint: e61e66cdf99be380716246c67bca4ad7eba1d71cbd03927ecbfabbce83794e07 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-22 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-22 21:10:47 UTC (by PhishDestroy tracker) Last verified: 2026-05-01 01:40:14 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019db662-3b74-728c-a774-b8889dcc9f27/ Wayback Machine: https://web.archive.org/web/*/tangandewamerah.store crt.sh CT logs: https://crt.sh/?q=%25.tangandewamerah.store Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=tangandewamerah.store AlienVault OTX: https://otx.alienvault.com/indicator/domain/tangandewamerah.store URLhaus: https://urlhaus.abuse.ch/host/tangandewamerah.store/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-22 21:11:12 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] A newly observed domain, tangandewamerah.store, has been flagged under active investigation for specific phishing activity targeting cryptocurrency users. Based on behavioral telemetry from sandbox analysis and heuristic scanning, this domain is suspected to be part of a crypto drainer campaign designed to divert assets from unwary users. The domain is currently in an active state and resolving to a known hosting provider, indicating it remains operational despite limited detection coverage. This domain resolves to IP address 188.114.96.3, which is hosted on Cloudflare’s infrastructure within ASN 13335. A valid SSL certificate issued by Let’s Encrypt (CN: tangandewamerah.store) was observed, suggesting an attempt to establish trust through encryption. Current VirusTotal analysis reveals 0 out of 95 detection engines flagged this domain as malicious at the time of assessment. The domain registration occurred recently, and no blocklist entries were detected during cross-referencing with multiple threat intelligence feeds. Trust scores from domain reputation engines show low or neutral ratings, consistent with newly created domains leveraged for short-lived campaigns. Given the high-risk nature of crypto drainer operations, immediate mitigation is required. Users should avoid interacting with any wallet-related links associated with this domain or similar unfamiliar domains. Organizations should implement DNS filtering rules to block resolution of tangandewamerah.store and monitor network traffic for connections to the associated IP. Blocking 188.114.96.3 at the firewall level and inspecting HTTPS traffic for signs of crypto wallet impersonation (e.g., wallet address substitution, clipboard hijacking) is strongly advised. Security teams should also consider adding this domain to blocklists and conducting a threat hunt for related IOCs such as other subdomains or registrant emails linked to this campaign. Due to the evolving nature of drainer toolkits, continuous monitoring and updating of detection rules are essential to prevent asset loss. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: 5b1b5b901827da0a8bd9918f08bac1de TLS cert SHA-256: e61e66cdf99be380716246c67bca4ad7eba1d71cbd03927ecbfabbce83794e07 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/tangandewamerah.store/ JSON API: https://api.destroy.tools/v1/check?domain=tangandewamerah.store Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io