# PhishDestroy threat dossier — zoomtoken.net ================================================================ Fetched: 2026-05-17 12:35:19 UTC Canonical: https://phishdestroy.io/domain/zoomtoken.net/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 80/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: OKX ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/92 security vendors flagged this domain Public blocklists: listed on 1 independent blocklist ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 145.223.77.134 (US, Boston) ASN: AS47583 Hostinger International Limited Hosting org: HOSTINGER US Registrar: HOSTINGER operations, UAB Nameservers: ["artemis.dns-parking.com", "hermes.dns-parking.com"] Registered: 2026-05-16 Page title: DexZoom — $ZOOM | Zoom In. Trade Smart. Stay Ahead. ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-16 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-16 21:17:18 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-05-16 18:18:38 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-05-17 07:42:17 UTC Neutralised: 2026-05-16 23:54:02 UTC Current status: taken down (registrar suspended or DNS dead) Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e31fe-c089-7377-9327-bef05625891d/ URLQuery: https://urlquery.net/report/c99565ec-2828-4a76-ba40-13a4c807f7d3 Wayback Machine: https://web.archive.org/web/*/zoomtoken.net crt.sh CT logs: https://crt.sh/?q=%25.zoomtoken.net Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=zoomtoken.net AlienVault OTX: https://otx.alienvault.com/indicator/domain/zoomtoken.net URLhaus: https://urlhaus.abuse.ch/host/zoomtoken.net/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-16 21:19:12 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies zoomtoken.net as an active domain engaged in brand impersonation targeting the OKX cryptocurrency exchange. This threat involves the creation of a counterfeit token domain designed to deceive users into interacting with fraudulent OKX-branded materials, potentially leading to financial loss through wallet compromise or fake token purchases. The domain leverages the trusted reputation of a well-known brand to exploit user trust and harvest credentials or cryptocurrency assets. Users should treat this domain as hostile and avoid any interaction, including wallet connections or data entry. zoomtoken.net exhibits several red flags consistent with malicious intent. The domain is currently resolving to IP address 145.223.77.134 and was registered through HOSTINGER operations, UAB on May 14, 2026. VirusTotal analysis shows 0 detections out of 95 scanning engines, indicating this threat has not yet been widely recognized by automated security systems. The domain is listed on 1 security blocklist and has been blocked by MetaMask, demonstrating proactive blocking by a major wallet provider. Despite using a Let's Encrypt SSL certificate, which provides no meaningful security assurance for users, the combination of recent registration, absence from detection systems, and immediate brand impersonation activity creates a dangerous threat profile that requires immediate attention from security teams and end users. Mitigation against this specific threat requires immediate domain blocking and user education on cryptocurrency scam tactics. Organizations should add zoomtoken.net and its IP address (145.223.77.134) to network blocklists and endpoint detection rules to prevent accidental exposure. Users should be advised to never enter credentials or connect cryptocurrency wallets to unfamiliar domains, regardless of branding. The combination of MetaMask blocking and low detection rates suggests this threat is newly emerged, making traditional signature-based defenses ineffective. Security teams should monitor for similar domains registered around the same date (May 14, 2026) and proactively block any newly registered domains containing 'token' or 'okx' in their naming convention. Cryptocurrency users should verify any token sale or exchange communication directly through official OKX channels and avoid clicking promotional links from unsolicited sources. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260516-F647F5 Favicon MD5: ff17e622231038d81bfc6b57523681ca ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/zoomtoken.net/ JSON API: https://api.destroy.tools/v1/check?domain=zoomtoken.net Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 150,612 domains (28,137 alive under monitoring, 122,195 confirmed takedowns/dead). Site: https://phishdestroy.io