# PhishDestroy threat dossier — tenwex.com ================================================================ Fetched: 2026-04-23 12:14:17 UTC Canonical: https://phishdestroy.io/domain/tenwex.com/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 99/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Crypto Casino / Gambling ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 7/94 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.67.199.34 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: MAT BAO CORPORATION Nameservers: nolan.ns.cloudflare.com, ruth.ns.cloudflare.com Registered: 2025-12-16 Page title: Tenwex: Most Popular Online Crypto Casino Based on Blockchain HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-07-12 Status: INVALID chain Fingerprint: e96ff0152de45b1edd767c488cdced68328dae249f6c273d3b81dfeb413ef369 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2025-12-16 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-22 20:22:59 UTC (by PhishDestroy tracker) First reported: 2026-04-22 17:26:07 UTC (abuse notice filed) Last verified: 2026-04-23 13:02:24 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019db635-5939-738c-991a-95baafcd7b00/ URLQuery: https://urlquery.net/report/6aea50d6-eb50-40b3-9519-7c1705fc4b0a Wayback Machine: https://web.archive.org/web/*/tenwex.com crt.sh CT logs: https://crt.sh/?q=%25.tenwex.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=tenwex.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/tenwex.com URLhaus: https://urlhaus.abuse.ch/host/tenwex.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-22 20:23:42 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies tenwex.com as an active tech support scam landing page designed to impersonate legitimate remote-assistance portals. The site leverages a newly registered domain and trusted SSL certificate to deceive visitors into believing they are interacting with an official support channel, typically prompting them to grant remote access or disclose payment credentials under the guise of resolving a fictitious system issue. Registrar records show the domain was created on December 16, 2025 through MAT BAO CORPORATION and currently resolves to IP address 172.67.199.34. As of the latest scan, VirusTotal shows zero detections across 95 security engines, indicating this threat remains undetected by most automated defenses. This domain represents a clear and present danger due to its evasion of current detection systems, low time on the internet, and use of a Google Trust Services SSL certificate, which enhances its appearance of legitimacy. The combination of a freshly registered domain (under 30 days old) and zero VirusTotal coverage suggests it is either a newly deployed campaign or has adapted its infrastructure to bypass signature-based detection. While no confirmed blocklist entries are publicly recorded, the absence of detections highlights the need for proactive user awareness and network-level monitoring rather than reliance on reactive threat intelligence feeds. Users who have visited tenwex.com should immediately cease any interaction with the site and avoid entering credentials or downloading any software prompted by the page. If remote access was granted, disconnect immediately, run a full antivirus scan, and consider revoking any permissions granted to remote administration tools. Report the domain to your IT security team and file a report with your local cybercrime unit or platforms like Google Safe Browsing. Enable multi-factor authentication on all critical accounts and monitor financial transactions for unusual activity. Always verify support contacts through official vendor websites rather than relying on unsolicited pop-ups or browser alerts. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260422-3AD36A Favicon MD5: a96bf3af79c228f92e3c6852ba74bcea TLS cert SHA-256: e96ff0152de45b1edd767c488cdced68328dae249f6c273d3b81dfeb413ef369 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/tenwex.com/ JSON API: https://api.destroy.tools/v1/check?domain=tenwex.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io