# PhishDestroy threat dossier — tronxi.shop ================================================================ Fetched: 2026-04-26 21:07:43 UTC Canonical: https://phishdestroy.io/domain/tronxi.shop/ ## VERDICT ---------------------------------------------------------------- HIGH THREAT — malicious activity confirmed Composite threat score: 65/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 2/94 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 66.116.210.76 (US, Phoenix) ASN: AS31898 Oracle Corporation Hosting org: Oracle Corporation Registrar: Spaceship, Inc. Nameservers: ["launch2.spaceship.net", "launch1.spaceship.net"] Registered: 2026-04-23 Page title: walletauthorizer HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E8 Expires: 2026-07-19 Status: INVALID chain Fingerprint: 9eecda17e03a1dbd3e1d174dca3515933b04ee1708dc7e761a34c7258bb30ec9 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-23 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-23 12:33:30 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-04-23 09:33:11 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-04-26 11:06:48 UTC Current status: ACTIVE / observable Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019db9ae-1830-71f9-8186-97f3259819cc/ URLQuery: https://urlquery.net/report/1c418c56-c30b-4a0e-ac44-3b6d3aa7a712 Wayback Machine: https://web.archive.org/web/*/tronxi.shop crt.sh CT logs: https://crt.sh/?q=%25.tronxi.shop Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=tronxi.shop AlienVault OTX: https://otx.alienvault.com/indicator/domain/tronxi.shop URLhaus: https://urlhaus.abuse.ch/host/tronxi.shop/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-23 12:33:51 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies an active phishing site operated at tronxi.shop that impersonates a Tron wallet authorization portal, using the page title walletauthorizer to deceive users. This domain was flagged under a generic phishing campaign with an unknown seed fe9514 and remains under investigation as of the latest scan. This threat relies on convincing users to enter wallet credentials or approve fraudulent transactions by mimicking legitimate wallet interfaces. VirusTotal currently shows 0 detections out of 95 security engines, indicating it has evaded automated scanning tools so far. The site resolves to IP address 66.116.210.76 and uses a Let's Encrypt SSL certificate to appear legitimate. Technical analysis shows the domain was likely created recently and registered through a privacy-protected service, making attribution challenging. If you visited tronxi.shop or entered any wallet information, disconnect your device from the internet immediately. Revoke any approved permissions via your wallet’s official interface and transfer remaining funds to a new wallet generated from a clean device. Change passwords only if you reused credentials across sites, and scan your device with updated antivirus software using signatures no older than 24 hours. Report the domain to your wallet provider and file a complaint with your local cybercrime unit if financial loss occurred. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260423-BD7FC9 Favicon MD5: 36398dc733c13e771b3eeaba15cfbc8f TLS cert SHA-256: 9eecda17e03a1dbd3e1d174dca3515933b04ee1708dc7e761a34c7258bb30ec9 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/tronxi.shop/ JSON API: https://api.destroy.tools/v1/check?domain=tronxi.shop Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io