ydbae[.]com
Forensic brief
Read full brief
Threat Overview The domain ydbae[.]com has been flagged as a phishing threat. PhishDestroy's automated scanning systems detected multiple risk indicators associated with this domain. Detection Details This domain was identified through a combination of automated analysis, community reports, and cross-referencing with global threat intelligence feeds including VirusTotal, Google Safe Browsing, and 50+ specialized blocklists.
Risk Indicators - Domain registered on com TLD - Domain length: 9 characters Stay Safe Always verify URLs before entering credentials. Use a password manager to avoid typing passwords on fake sites. Enable two-factor authentication wherever possible.
Threat response pipeline
Public blocklist status
VirusTotal consensus
Aggregated detection across 95 security vendors.
Evidence & external reports
Were you affected by this site?
Were You Affected?
Recommendations & Advice for Victims
- Do not pay anything else. Recovery agents demanding upfront fees are a second-stage scam.
- Disconnect compromised wallets. Move remaining funds to a fresh seed phrase generated offline.
- Preserve evidence. Screenshot transactions, save URLs, archive emails — chain-of-custody matters for prosecution.
- Report to authorities (see section 15 below) — even small reports help build case patterns.
- Notify your bank/exchange. Some chargebacks may still be possible within 24-72h.
Report to your local authorities
Email template — registrar abuse
abuse@fewmoretaps ou d/b/a trustname.com
Registrar: Fewmoretaps OU d/b/a Trustname.com Case: PD-
Embed this report
About this report
About this report: ydbae.com
This domain security report is maintained by PhishDestroy's automated threat-intelligence pipeline. Our system continuously monitors this domain across 95 security vendors on VirusTotal and 1 public blocklists.
ydbae.com has been flagged by 0 security vendors as of today.
If you believe this listing is inaccurate, you can submit an appeal. For more information about our methodology, visit our FAQ page.