⚠️
This domain has been flagged as malicious
Detected by 17 security vendors and listed in 3 public blocklists. Exercise extreme caution — do not enter personal information or connect wallets.

web[.]pancake[.]run

Domain Security & Threat Intelligence Report

17/95 VT Detections URLScan: Scanned Still Active Detected Aug 10, 2025 3 Blocklists Targets: PancakeSwap Wallet Connect Abuse
98 Threat Score

Analyst Security Overview

AI-Generated

The domain web.pancake.run is identified as a phishing site designed to impersonate PancakeSwap, a popular decentralized exchange. With a VirusTotal detection score of 17 out of 95, this domain poses a risk to users looking to access PancakeSwap services. The phishing attempt is primarily aimed at harvesting wallet credentials through Wallet Connect abuse, which can lead to unauthorized access to user funds.

This domain is currently active and shows a blocklist presence of 4, indicating its recognized malicious intent. While specific registrar information is absent, the IP address associated with this domain is 76.76.21.123. The lack of transparency in registration details often correlates with fraudulent activities, and the current status indicates that it is likely being hosted on shared infrastructure which increases its risk profile.

PhishDestroy has reported this domain for malicious activity and is actively monitoring it to prevent further victimization of PancakeSwap users. Continuous vigilance is essential as this phishing site remains operational and poses a threat to users' digital assets.

VirusTotal
17/95 VT Detections
URLScan.io
Site Status
Active (HTTP 403)
DestroyList
Listed
User Reports
1 report

Threat Response Pipeline

13/15
Pre-emptive Discovery & Ingestion
30+ Proprietary Parsers · Infrastructure Analysis · Threat Ingested
3/3 ✓
30+ Proprietary Parsers
Distributed network scanning Google Ads (malvertising), SEO-manipulated results, Twitter/X, YouTube & Telegram campaigns
Infrastructure Analysis
dnstwist & typosquatting detection to catch look-alike domains targeting established brands
Threat Ingested
web.pancake.run detected and queued for full analysis
Aug 10, 2025
Global Ecosystem Submission
50+ Vendor Submissions · Cloudflare Radar · VirusTotal · Blocklist Detection · Drainer Identified
5/5 ✓
50+ Vendor Submissions
Data submitted to Cloudflare, Google Safe Browsing, Microsoft, VirusTotal, Netcraft, ESET, Bitdefender, Norton, Avira, PhishTank, Dr.Web, URLScan.io, PolySwarm & more
Cloudflare Radar
Scanned via Cloudflare Radar — DNS, certificates & network data
VirusTotal
17/95 vendors flagged on VirusTotal
Feb 23, 2026
Blocklist Detection
Found in 3 blocklists: MetaMask, ScamSniffer, PhishDestroy
Feb 25, 2026
Drainer Identified
Wallet Connect Abuse wallet drainer — impersonating PancakeSwap
Legal Notifications & Reporting
ICANN Compliance Reports · DestroyList Published · Abuse Report Pending · Re-detection Logic
3/4
ICANN Compliance Reports
Formal abuse notifications aligned with ICANN standards, including forensic evidence packages (metadata, screenshots, PDF)
DestroyList Published
Added to PhishDestroy/DestroyList — open-source blocklist for wallets & extensions
Aug 10, 2025
Abuse Report Pending
Will be sent to registrar (N/A) & hosting
Re-detection Logic
Follow-up alerts if threat remains active beyond 24 hours — automated re-reporting cycle
Public Transparency & Takedown
Open Threat Database · Social Broadcasting · Awaiting Takedown
2/3
Open Threat Database
Real-time commits to GitHub repository & live monitoring at phishdestroy.io/live
Social Broadcasting
Automated alerts on Twitter, Telegram & Mastodon channels
Awaiting Takedown
Domain still active — monitoring & re-reporting continues

Public Blocklist Status

Website Screenshot

Malicious Content
Screenshot of web.pancake.run captured during automated security scan
Automated capture by URLScan.io View full scan
Report This Domain Submit evidence & help protect others from this threat

Domain Intelligence

Domainweb.pancake.run
RegistrarN/A (Unknown)
IP Address76.76.21.123
NameserversN/A
Abuse ContactsEMAILS_NOT_FOUND
First DetectedAug 10, 2025
Registrar Response0h
HTTP Status403

VirusTotal Analysis

17 / 95 security vendors flagged this domain
View on VT
ADMINUSLabs
BitDefender
Chong Lua Dao
CRDF
CyRadar
DNS8
ESET
Forcepoint ThreatSeeker
Fortinet
G-Data
Kaspersky
Lionic
Phishing Database
Seclookup
Sophos
VIPRE
Webroot

Evidence & External Reports

Were You Affected by This Site?

You are not alone and there is nothing to be ashamed of. Scammers are sophisticated criminals who exploit trust. Reporting your experience is the most powerful weapon against fraud — your report can prevent others from becoming victims and help law enforcement take action. Silence is the scammer's greatest advantage. Break it.

If you have interacted with this domain, entered personal information, or connected a cryptocurrency wallet — take immediate action. Below are resources to help you report the incident and protect yourself.

Beware of recovery scammers! After being scammed, criminals may contact you again pretending to be "recovery agents," lawyers, or investigators who claim they can retrieve your lost funds — for a fee. This is a second scam. No legitimate service will ask for upfront payment to recover stolen crypto. Learn more about recovery fraud →

Report to Your Local Authorities

Select your country to see local cybercrime reporting contacts and complaint templates.

Select your country...

Related Domain Reports

protocol-user-finance.cc
7 detections
saylorbtc.io
13 detections
michaelsaylor25.com
10 detections
a.ethcoin.vip
2 detections · Taken down
b.ethcoin.vip
6 detections · Taken down
defi-usdc.top
6 detections
crypto-wallet4.com
15 detections · Taken down
usdc-eth.co
1 detections

Other Domains on 76.76.21.123

gallery.billy-chiu.com 22 monad.yeetcaster.xyz 12 testnet.suipass.xyz 5 bridge.mwdao.xyz 2 alpha.tronpower.xyz 2 www.cryptoswap.finance 1

More Domains at N/A

mindsol.app ouyicn.kim 2 osmosiss.zone 2 arbitrum-claim.life 8 gauesuzw.life 9 etsena-app.eu.com

Stay Informed, Stay Safe

Monitor live threats or contest this listing if you believe it's a false positive

Live Threat Feed Appeal This Listing