# PhishDestroy threat dossier — xn--ive-pump-3mb.fun ================================================================ Fetched: 2026-04-23 15:06:59 UTC Canonical: https://phishdestroy.io/domain/xn--ive-pump-3mb.fun/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 38/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 3/94 security vendors flagged this domain Flagging vendors: alphaMountain.ai, Gridinsoft, SOCRadar ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.67.137.35 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Dynadot Inc Nameservers: ["aspen.ns.cloudflare.com", "ignacio.ns.cloudflare.com"] Registered: 2026-03-24 Page title: about:privatebrowsing ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E8 Expires: 2026-06-12 Status: INVALID chain Fingerprint: 70367d71f928012b12962b3a93111b65ad3fec2a8bf146e600b82363baf0651c ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-03-24 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-03-24 17:22:25 UTC (by PhishDestroy tracker) First reported: 2026-03-24 13:33:04 UTC (abuse notice filed) Last verified: 2026-04-21 16:14:38 UTC Neutralised: 2026-03-25 06:21:43 UTC Current status: taken down (registrar suspended or DNS dead) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d2002-f5c5-7028-8104-4c346ebdd68b/ URLQuery: https://urlquery.net/report/3a9d6ed9-4f6d-42a5-a6d8-078d27d3d0db Wayback Machine: https://web.archive.org/web/*/xn--ive-pump-3mb.fun crt.sh CT logs: https://crt.sh/?q=%25.xn--ive-pump-3mb.fun Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=xn--ive-pump-3mb.fun AlienVault OTX: https://otx.alienvault.com/indicator/domain/xn--ive-pump-3mb.fun URLhaus: https://urlhaus.abuse.ch/host/xn--ive-pump-3mb.fun/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-03-25 20:02:56 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies xn--ive-pump-3mb.fun as a domain associated with generic phishing activity. Although the risk level is currently assessed as low, phishing sites like this aim to deceive users into divulging sensitive information such as login credentials or personal data. Users should treat this domain with caution to avoid potential exposure to scams or identity theft. This phishing domain was registered on March 24, 2026, and was flagged by 2 out of 95 security vendors on VirusTotal, indicating some suspicious activity but relatively limited detection. The domain resolved to IP address 172.67.137.35 and was registered through Dynadot Inc. The page title found was "about:privatebrowsing," which may attempt to lure users by mimicking privacy-related browser features or settings. The domain has since been taken offline, reducing immediate risk, but remnants or redirects may still pose hazards. If you have visited xn--ive-pump-3mb.fun, it is recommended to avoid entering any personal information or credentials on the site. Run a full security scan on your device and monitor your accounts for unusual activity. Change passwords for any accounts that may have been exposed, especially if reused elsewhere. Stay vigilant against phishing attempts by verifying URLs and never clicking suspicious links. PhishDestroy continues to monitor such domains to help users stay informed of emerging threats. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260324-4C4D60 Favicon MD5: 3b95f264ba9ca3874a7cd5528ce97142 TLS cert SHA-256: 70367d71f928012b12962b3a93111b65ad3fec2a8bf146e600b82363baf0651c ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/xn--ive-pump-3mb.fun/ JSON API: https://api.destroy.tools/v1/check?domain=xn--ive-pump-3mb.fun Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io