fortlocker[.]org
Forensic brief
Read full brief
PhishDestroy identifies fortlocker.org as an active crypto drainer impersonating the Lock&Lock brand, a well-known manufacturer of food storage containers. This domain employs a fake login page designed to trick users into connecting their cryptocurrency wallets, enabling unauthorized transactions that drain funds. The threat type is classified as a generic phishing operation with elevated risk, leveraging deceptive branding to exploit user trust and facilitate crypto theft.
This domain exhibits multiple red flags confirmed by forensic analysis. VirusTotal flags 15 out of 15 security vendors, indicating widespread suspicion. The domain was registered through Web Commerce Communications Limited dba WebNic.cc and resolves to IP address 104.21.82.162.
Registered on March 26, 2026, this is a newly created domain with minimal reputation. It utilizes a Let's Encrypt SSL certificate, a common tactic to appear legitimate. Additionally, fortlocker.org is not listed on Google Safe Browsing (GSB) and remains unblocked by many major blocklists, increasing exposure to potential victims.
PhishDestroy currently lists fortlocker.org as active with an elevated threat level. Immediate actions include blocking the domain and IP address at the network and DNS levels. Users should avoid visiting this site entirely due to the high risk of crypto wallet compromise.
While the domain remains accessible, the combination of recent registration, low VT coverage, and active crypto-draining operations poses a significant ongoing threat. Users are advised to verify any Lock&Lock-related links using PhishDestroy before interacting with the site to prevent financial loss.
Threat response pipeline
Cloudflare Radar
VirusTotal
Forensic Evidence Collectioncompliance_abuse@webnic.cc with forensic evidence (metadata, screenshots, PDF).Evidence capture
Domain Intelligence
Web Commerce Communications Limited dba WebNic.cc
Technical details
Public blocklist status
Technologies
Technologies · 4 identified
VirusTotal consensus
Aggregated detection across 15 security vendors.
Evidence & external reports
Were you affected by this site?
Were You Affected?
Recommendations & Advice for Victims
- Do not pay anything else. Recovery agents demanding upfront fees are a second-stage scam.
- Disconnect compromised wallets. Move remaining funds to a fresh seed phrase generated offline.
- Preserve evidence. Screenshot transactions, save URLs, archive emails — chain-of-custody matters for prosecution.
- Report to authorities (see section 15 below) — even small reports help build case patterns.
- Notify your bank/exchange. Some chargebacks may still be possible within 24-72h.
Report to your local authorities
Email template — registrar abuse
compliance_abuse@webnic.cc
Registrar: Web Commerce Communications Limited dba WebNic.cc Case: PD-20260512-DD19C2
Embed this report
About this report
About this report: fortlocker.org
This domain security report is maintained by PhishDestroy's automated threat-intelligence pipeline. Our system continuously monitors this domain across 15 security vendors on VirusTotal and 1 public blocklists.
The site displays a page titled “Fortnite Inventory Checker | Epic Games”.
fortlocker.org has been flagged by 15 security vendors as of May 17, 2026.
If you believe this listing is inaccurate, you can submit an appeal. For more information about our methodology, visit our FAQ page.