This phishing domain has been taken down
Confirmed dead — kept on record for forensic reference and similar-pattern matching.

backpacktge[.]lol

Domain Security & Threat Intelligence Report
“backpacktge.lol”
2/95 VT Taken Down May 17, 2026 3 Blocklists Taken Down
REF 322243F3 SCORE 48/100 ENGINE PD-4 Turbo Appeal listing
0 Risk Score
Data coverage VirusTotal 2 / 95 URLQuery no det. OTX no pulses CF Radar clean URLScan report ready DNS blocks none SSL valid, 88d WHOIS 72d old Screenshot captured Redirect chain no redirect CDN bypass n/a
VirusTotal
2 det.
URLQuery
no det.
OTX
no pulses
CF Radar
Clean
URLScan
Report ↗
DNS Security
1 dets
Gridinsoft
SSL
Let's Encrypt
Age
72d
Status
Dead
DestroyList
Listed
Reports Sent
0
02

Forensic brief

auto-generated · PhishDestroy AI
PhishDestroy AI
probe: May 17, 2026
score: 48/100
vendors2/95
blocklists3
Analyst brief · auto-generated

PhishDestroy identifies backpacktge.lol as an active fake-login phishing site classified under generic_phishing. The domain simulates a legitimate service login page to harvest user credentials and first surfaced on March 6, 2026. Risk level is currently under_investigation, meaning defenders are still profiling its infrastructure and payload.

This domain was flagged with zero VirusTotal detections at the time of writing (0/95 engines), was registered through Namecheap, resolves to IPv4 35.157.26.135, obtained a Let’s Encrypt SSL certificate, and shows no entries on public blocklists or threat-intel feeds at this stage. Its infancy and clean reputation score contribute to the cautious under_investigation designation rather than an outright high-risk label. Mitigation for fake-login phishing hinges on user verification.

Always cross-check domains against PhishDestroy before entering credentials. If a site mimics a brand you recognize, navigate manually via an official URL instead of clicking embedded links. Report any suspicious behavior to incident responders immediately and consider deploying browser-based phishing indicators such as PhishDestroy’s extension to block page loads in real time.

Read full brief

PhishDestroy identifies backpacktge.lol as an active fake-login phishing site classified under generic_phishing. The domain simulates a legitimate service login page to harvest user credentials and first surfaced on March 6, 2026. Risk level is currently under_investigation, meaning defenders are still profiling its infrastructure and payload.

This domain was flagged with zero VirusTotal detections at the time of writing (0/95 engines), was registered through Namecheap, resolves to IPv4 35.157.26.135, obtained a Let’s Encrypt SSL certificate, and shows no entries on public blocklists or threat-intel feeds at this stage. Its infancy and clean reputation score contribute to the cautious under_investigation designation rather than an outright high-risk label. Mitigation for fake-login phishing hinges on user verification.

Always cross-check domains against PhishDestroy before entering credentials. If a site mimics a brand you recognize, navigate manually via an official URL instead of clicking embedded links. Report any suspicious behavior to incident responders immediately and consider deploying browser-based phishing indicators such as PhishDestroy’s extension to block page loads in real time.

Suspicious clean drainer
03

Threat response pipeline

May 17, 2026 · 0 reports submitted
Discovery
Submission
Legal
Takedown
12/19
30+ Proprietary Parsers
Distributed scanning of Google Ads, SEO-manipulated results, Twitter/X, YouTube & Telegram campaigns.
Infrastructure Analysis
dnstwist & typosquatting detection.
Community Intelligence
Real-time ingestion via Telegram Bot & partner intelligence feeds.
Threat Ingested
backpacktge.lol detected and queued for full analysis.
May 17, 2026
55+ Vendor Submissions
Threat data submitted to 55+ security vendors & threat-intel platforms.
Cloudflare Radar
View scan — verdict: clean
VirusTotal
2 / 95 vendors flagged on VirusTotal.
Blocklist Detection
Found in 3 blocklists: MetaMask, PhishDestroy, SEAL.
Forensic Evidence Collection
URLScan.io, URLQuery & Cloudflare Radar — DOM snapshots, HTTP transactions, DNS & certificate data.
Open Threat Database
Real-time commits to GitHub repository & live monitoring at phishdestroy.io/live.
Social Broadcasting
Automated alerts on X, Telegram & Mastodon.
Confirmed dead
Domain confirmed taken down in 123 hours.
May 17, 2026
04

Evidence capture

urlscan snapshot · domain intelligence

Domain Intelligence

Domainbackpacktge.lol
Registrar Namecheap(SE)
IP Address 35.157.26.135
ASN 16509 · Amazon.com, Inc.
Registration Created 2026-03-06 16:47:02
SSL Let's Encrypt · valid 88d · expires 2026-08-03
Hosting DE Frankfurt am Main , DE · AWS EC2 (eu-central-1)
Nameservers dns4.p03.nsone.net
Page title “backpacktge.lol”
Technical details DNS, hashes, case ID
Favicon hashac3f32311f5599060898e92870b77c6a
SSL fingerprint3734bf0fda451bff24e9fbd4f388f0c46e1dbf5733639c40b31b3451c23eb859
08

Public blocklist status

cross-vendor confirmation
3
Listed in 3 public blocklists — confirmed by independent sources
Sources with no listing are omitted.
09

Technologies

Wappalyzer · Cloudflare Radar
Technologies · 2 identified
SECURITY · 1
HSTS
OTHER · 1
Netlify
Detected via Cloudflare Radar · Wappalyzer engine
10

VirusTotal consensus

95 vendors · 3-col matrix
2/95
vendors flagging
Partial detection

Aggregated detection across 95 security vendors.

Per-vendor breakdown not available — view raw report on VirusTotal ↗
12

Evidence & external reports

cross-reference this domain
14

Were you affected by this site?

immediate response · authorities

Were You Affected?

You are not alone and there is nothing to be ashamed of. Reporting is the most powerful weapon against fraud — your report can prevent others from becoming victims.
Beware of recovery scammers! No legitimate service will ask for upfront payment to recover stolen crypto. Learn more about recovery fraud →

Recommendations & Advice for Victims

  1. Do not pay anything else. Recovery agents demanding upfront fees are a second-stage scam.
  2. Disconnect compromised wallets. Move remaining funds to a fresh seed phrase generated offline.
  3. Preserve evidence. Screenshot transactions, save URLs, archive emails — chain-of-custody matters for prosecution.
  4. Report to authorities (see section 15 below) — even small reports help build case patterns.
  5. Notify your bank/exchange. Some chargebacks may still be possible within 24-72h.
ICANN RAA §3.18 DMCA §512 GDPR Art.17 FBI guidelines SEAL-ISAC
15

Report to your local authorities

geo-aware · authorities · AI complaint
Your country (auto-detected)
Germany

  Email template — registrar abuse

To: abuse@namecheap.com Registrar: Namecheap Case: PD-
Open in mail client Appeal (if false-positive)
16

Embed this report

iframe · sizer · CC-BY

Embed this report

Drop a live, self-updating risk widget anywhere — blog, DAO forum, Discord webhook, X post. Free, no API key, CC-BY.

backpacktge[.]lol 48/100 TAKEN DOWN · 2/95 VT · 0h View full report ↗
Live preview at 100% width
Canonical: https://phishdestroy.io/domain/backpacktge.lol/ JSON API llm.txt
17

About this report

methodology · appeals · API

About this report: backpacktge.lol

This domain security report is maintained by PhishDestroy's automated threat-intelligence pipeline. Our system continuously monitors this domain across 95 security vendors on VirusTotal and 3 public blocklists.

The site displays a page titled “backpacktge.lol”.

backpacktge.lol has been flagged by 2 security vendors as of May 17, 2026.

If you believe this listing is inaccurate, you can submit an appeal. For more information about our methodology, visit our FAQ page.