# PhishDestroy threat dossier — wordpress-209642-0.cloudclusters.net ================================================================ Fetched: 2026-05-14 22:37:14 UTC Canonical: https://phishdestroy.io/domain/wordpress-209642-0.cloudclusters.net/ ## VERDICT ---------------------------------------------------------------- STATUS STALE — last probed 22 days ago, treat as ACTIVE until re-verified Composite threat score: 70/100 (PhishDestroy scoring — see methodology below) Scam classification: Generic Phishing ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 5/94 security vendors flagged this domain Flagging vendors: alphaMountain.ai, CRDF, Seclookup, URLQuery, Webroot URLQuery: 2 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 108.181.157.242 (US, Dallas) ASN: AS40676 Psychz Networks Hosting org: Psychz Networks Registrar: NetEarth One, Inc. Nameservers: ns1.cloudclusters.net, ns2.cloudclusters.net Registered: 2018-11-30 Page title: wordpress – Just another WordPress site ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: DigiCert Inc / RapidSSL TLS RSA CA G1 Expires: 2027-01-18 Status: INVALID chain Fingerprint: 392c99477a172bdcaacf16e37f728554361131a4d1725ddfc6b9f940ac84b846 Subject Alternative Names (related infrastructure — often same operator): - cloudclusters.net ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2018-11-30 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-03-28 04:01:30 UTC (by PhishDestroy tracker) First reported: 2026-03-28 02:52:30 UTC (abuse notice filed) Last verified: 2026-04-22 01:40:32 UTC (STALE — 22 days ago, re-verify) Flagged dead: 2026-03-29 03:41:52 UTC (NOT RE-VERIFIED IN 22 DAYS — treat as unconfirmed) Current status: UNCONFIRMED (our live-probe is 22 days stale) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d31f3-80f4-72b5-80bc-26d4936819b1/ URLQuery: https://urlquery.net/report/2aff11b1-9033-47ba-b1ea-1b870291db09 Wayback Machine: https://web.archive.org/web/*/wordpress-209642-0.cloudclusters.net crt.sh CT logs: https://crt.sh/?q=%25.wordpress-209642-0.cloudclusters.net Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=wordpress-209642-0.cloudclusters.net AlienVault OTX: https://otx.alienvault.com/indicator/domain/wordpress-209642-0.cloudclusters.net URLhaus: https://urlhaus.abuse.ch/host/wordpress-209642-0.cloudclusters.net/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-03-28 04:02:02 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies wordpress-209642-0.cloudclusters.net as hosting an active fake WordPress login portal designed to harvest credentials. This domain mimics legitimate WordPress infrastructure to trick users into entering their credentials under the guise of site management. The threat actor leverages cloud hosting (cloudclusters.net) to evade traditional detection while maintaining a plausible appearance. Users who encounter this site may unknowingly submit their login details to a malicious server controlled by the attacker. This domain was flagged by 5 out of 95 security vendors on VirusTotal, indicating partial but not universal detection. Registered through NetEarth One, Inc. on November 30, 2018, the domain has operated for over five years, allowing the threat actor to establish infrastructure longevity. It resolves to IP address 108.181.157.242 and holds a valid SSL certificate issued by DigiCert Inc, which may further deceive users by displaying a padlock icon in their browser. The combination of partial blocklist coverage, long operational history, and HTTPS support increases the risk of successful credential theft. If you visited this domain and entered any credentials, immediately change your passwords on all accounts using the same or similar login details. Enable multi-factor authentication wherever possible to prevent unauthorized access. Scan your device for malware using reputable antivirus software and monitor accounts for suspicious activity. Avoid reusing passwords across different services to limit exposure. Report the domain to your security team or platform provider to aid in broader threat mitigation. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260328-26EA58 TLS cert SHA-256: 392c99477a172bdcaacf16e37f728554361131a4d1725ddfc6b9f940ac84b846 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/wordpress-209642-0.cloudclusters.net/ JSON API: https://api.destroy.tools/v1/check?domain=wordpress-209642-0.cloudclusters.net Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 149,387 domains (34,631 alive under monitoring, 114,421 confirmed takedowns/dead). Site: https://phishdestroy.io