# PhishDestroy threat dossier — trumpfundus.com ================================================================ Fetched: 2026-05-01 13:28:59 UTC Canonical: https://phishdestroy.io/domain/trumpfundus.com/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: content_divergence) (score: 2/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/94 security vendors flagged this domain Public blocklists: listed on 2 independent blocklists ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 104.21.68.184 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Global Domain Group LLC Nameservers: lynn.ns.cloudflare.com, walk.ns.cloudflare.com Registered: 2026-04-19 Page title: TRUMP COIN HTTP response: 200 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-19 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-20 13:47:05 UTC (by PhishDestroy tracker) First reported: 2026-04-20 10:47:47 UTC (abuse notice filed) Last verified: 2026-04-27 19:40:07 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019daa7c-e963-722b-9f91-aae50d1f8dc4/ URLQuery: https://urlquery.net/report/31a71b1f-7bf2-4358-bc0f-8a9dce30f206 Wayback Machine: https://web.archive.org/web/*/trumpfundus.com crt.sh CT logs: https://crt.sh/?q=%25.trumpfundus.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=trumpfundus.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/trumpfundus.com URLhaus: https://urlhaus.abuse.ch/host/trumpfundus.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-20 13:48:40 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies trumpfundus.com as an active crypto drainer impersonating TRUMP COIN, a high-risk threat designed to trick users into connecting wallets and draining cryptocurrency assets. This domain was flagged as under_investigation with a risk level escalating due to its malicious infrastructure and evasion tactics. The site leverages the guise of TRUMP COIN—a crypto token associated with political branding—to lure victims into exposing their wallets to a drainer script. Technical indicators reveal a newly registered domain with no legitimate affiliations, created specifically to deceive cryptocurrency users seeking token exposure or investment opportunities. This domain exhibits multiple red flags consistent with malicious operations. Registered through Global Domain Group LLC, trumpfundus.com resolves to IP 104.21.68.184 and has already been placed on 2 security blocklists. Despite appearing on these lists, it remains undetected by 0 of 95 VirusTotal engines, indicating low signature coverage and high evasion potential. The domain uses a Let’s Encrypt SSL certificate to appear legitimate, created on April 19, 2026—an unusually recent date suggesting opportunistic registration targeting current events. Defensive responses are already active: MetaMask and SEAL have blocked the domain, reflecting proactive detection by security platforms, though VirusTotal’s zero detection rate highlights a critical gap in automated scanning. The combination of a fake crypto asset, zero detections, and rapid domain age elevates the threat to active and potentially escalating. Mitigation for this crypto drainer threat requires immediate and cautious action. Users should never connect wallets to unfamiliar or unsolicited crypto sites, especially those referencing political figures or branded tokens like TRUMP COIN. Verify any crypto-related domain using PhishDestroy’s real-time scanner before interaction. If exposure has occurred, disconnect the wallet immediately, revoke unauthorized permissions via blockchain explorers, and transfer remaining assets to a clean wallet. Organizations should block the IP 104.21.68.184 and domain at network and DNS levels. Continuous monitoring is essential, as zero detections suggest this campaign may expand undetected across platforms. Always inspect SSL certificates, domain age, and blocklist status using tools like PhishDestroy to avoid falling victim to such rapidly evolving crypto scams. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260420-1E4A1F Favicon MD5: 5080bf85ef5e0952387af5eb24a71da2 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/trumpfundus.com/ JSON API: https://api.destroy.tools/v1/check?domain=trumpfundus.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io