This domain has been flagged as malicious
Detected by 15 of 15 security vendors and listed in 1 public blocklists. Do not connect a wallet; do not paste a seed phrase.

vsemiralbom[.]cyou

Domain Security & Threat Intelligence Report
“404 Not Found”
15/15 VT Malicious May 17, 2026 1 Blocklist ACTIVE THREAT HTTP 200
REF F3982CD2 SCORE 100/100 ENGINE PD-4 Turbo Appeal listing
0 Risk Score
Data coverage VirusTotal 15 / 15 URLQuery no det. OTX no pulses CF Radar clean URLScan report ready DNS blocks none SSL valid, 60d WHOIS 296d old Screenshot captured Redirect chain no redirect CDN bypass n/a
VirusTotal
15 det.
URLQuery
no det.
OTX
no pulses
CF Radar
Clean
URLScan
Report ↗
DNS Security
3 dets
Gridinsoft
SSL
Let's Encrypt
Age
296d
Status
Live
DestroyList
Listed
Reports Sent
0
02

Forensic brief

auto-generated · PhishDestroy AI
PhishDestroy AI
probe: May 17, 2026
score: 100/100
vendors15/15
blocklists1
Analyst brief · auto-generated

PhishDestroy identifies vsemiralbom.cyou as an active credential theft domain currently circulating in the wild. This site masquerades as a legitimate service to harvest user login details, browser cookies, and session tokens, enabling account takeovers and subsequent financial fraud. The page is designed to mimic a familiar interface, tricking visitors into entering sensitive information under false pretenses.

Security researchers observed traffic redirecting from compromised advertisements and spoofed support chats, indicating an ongoing campaign targeting both novice and experienced users seeking media content. This domain was flagged by 15 of 95 VirusTotal security vendors, demonstrating a clear risk to visitors. It was registered through Atak Domain on July 24, 2025, and resolves to IP address 62.60.226.105 using a Let's Encrypt SSL certificate to appear legitimate.

The low but concerning blocklist count suggests this campaign may be newly launched or narrowly targeted. Users searching for Russian-language media content may be particularly exposed due to the domain’s naming convention and hosting infrastructure. If you visited vsemiralbom.cyou, immediately revoke any saved browser passwords, log out of all active sessions, and run a full antivirus scan.

Clear cookies for the site and enable two-factor authentication on all critical accounts. Report the domain to your IT team or hosting provider and avoid re-engaging with any links or pop-ups associated with this URL. Use a reputable ad-blocker and URL filtering tool to prevent future exposures.

Read full brief

PhishDestroy identifies vsemiralbom.cyou as an active credential theft domain currently circulating in the wild. This site masquerades as a legitimate service to harvest user login details, browser cookies, and session tokens, enabling account takeovers and subsequent financial fraud. The page is designed to mimic a familiar interface, tricking visitors into entering sensitive information under false pretenses.

Security researchers observed traffic redirecting from compromised advertisements and spoofed support chats, indicating an ongoing campaign targeting both novice and experienced users seeking media content. This domain was flagged by 15 of 95 VirusTotal security vendors, demonstrating a clear risk to visitors. It was registered through Atak Domain on July 24, 2025, and resolves to IP address 62.60.226.105 using a Let's Encrypt SSL certificate to appear legitimate.

The low but concerning blocklist count suggests this campaign may be newly launched or narrowly targeted. Users searching for Russian-language media content may be particularly exposed due to the domain’s naming convention and hosting infrastructure. If you visited vsemiralbom.cyou, immediately revoke any saved browser passwords, log out of all active sessions, and run a full antivirus scan.

Clear cookies for the site and enable two-factor authentication on all critical accounts. Report the domain to your IT team or hosting provider and avoid re-engaging with any links or pop-ups associated with this URL. Use a reputable ad-blocker and URL filtering tool to prevent future exposures.

Phishing clean drainer
03

Threat response pipeline

May 17, 2026 · 0 reports submitted
Discovery
Submission
Legal
Takedown
10/19
30+ Proprietary Parsers
Distributed scanning of Google Ads, SEO-manipulated results, Twitter/X, YouTube & Telegram campaigns.
Infrastructure Analysis
dnstwist & typosquatting detection.
Community Intelligence
Real-time ingestion via Telegram Bot & partner intelligence feeds.
Threat Ingested
vsemiralbom.cyou detected and queued for full analysis.
May 17, 2026
61+ Vendor Submissions
Threat data submitted to 61+ security vendors & threat-intel platforms. 15 flagged this domain.
Cloudflare Radar
View scan — verdict: clean
VirusTotal
15 / 15 vendors flagged on VirusTotal.
Blocklist Detection
Found in 1 blocklists: PhishDestroy.
Forensic Evidence Collection
URLScan.io, URLQuery & Cloudflare Radar — DOM snapshots, HTTP transactions, DNS & certificate data.
Open Threat Database
Real-time commits to GitHub repository & live monitoring at phishdestroy.io/live.
Social Broadcasting
Automated alerts on X, Telegram & Mastodon.
Awaiting Takedown
Domain still active — monitoring & re-reporting continues. 0h since first report.
04

Evidence capture

urlscan snapshot · domain intelligence

Domain Intelligence

Domainvsemiralbom.cyou
Registrar Atak Domain(TR)
IP Address 62.60.226.105
Registration Created 2025-07-24 19:41:11
SSL Let's Encrypt · valid 60d · expires 2026-07-16
Nameservers kate.ns.cloudflare.com
Page title “404 Not Found”
HTTP status 200
Technical details DNS, hashes, case ID
SSL fingerprint468312458b0ab4f9ff808be4e188727c7c5d134daaa8145883020f4628cd457e
08

Public blocklist status

cross-vendor confirmation
1
Listed in 1 public blocklist — confirmed by independent sources
Sources with no listing are omitted.
09

Technologies

Wappalyzer · Cloudflare Radar
Technologies · 3 identified
WEB SERVERS · 2
Nginx
OpenResty
SECURITY · 1
HSTS
Detected via Cloudflare Radar · Wappalyzer engine
10

VirusTotal consensus

15 vendors · 3-col matrix
15/15
vendors flagging
Unanimous malicious verdict

Aggregated detection across 15 security vendors.

Per-vendor breakdown not available — view raw report on VirusTotal ↗
12

Evidence & external reports

cross-reference this domain
14

Were you affected by this site?

immediate response · authorities

Were You Affected?

You are not alone and there is nothing to be ashamed of. Reporting is the most powerful weapon against fraud — your report can prevent others from becoming victims.
Beware of recovery scammers! No legitimate service will ask for upfront payment to recover stolen crypto. Learn more about recovery fraud →

Recommendations & Advice for Victims

  1. Do not pay anything else. Recovery agents demanding upfront fees are a second-stage scam.
  2. Disconnect compromised wallets. Move remaining funds to a fresh seed phrase generated offline.
  3. Preserve evidence. Screenshot transactions, save URLs, archive emails — chain-of-custody matters for prosecution.
  4. Report to authorities (see section 15 below) — even small reports help build case patterns.
  5. Notify your bank/exchange. Some chargebacks may still be possible within 24-72h.
ICANN RAA §3.18 DMCA §512 GDPR Art.17 FBI guidelines SEAL-ISAC
15

Report to your local authorities

geo-aware · authorities · AI complaint
Your country (auto-detected)
International / Other

  Email template — registrar abuse

To: domain@apiname.com, abuse@as214351.com Registrar: Atak Domain Case: PD-
Open in mail client Appeal (if false-positive)
16

Embed this report

iframe · sizer · CC-BY

Embed this report

Drop a live, self-updating risk widget anywhere — blog, DAO forum, Discord webhook, X post. Free, no API key, CC-BY.

vsemiralbom[.]cyou 100/100 MALICIOUS · 15/15 VT · 0h View full report ↗
Live preview at 100% width
Canonical: https://phishdestroy.io/domain/vsemiralbom.cyou/ JSON API llm.txt
17

About this report

methodology · appeals · API

About this report: vsemiralbom.cyou

This domain security report is maintained by PhishDestroy's automated threat-intelligence pipeline. Our system continuously monitors this domain across 15 security vendors on VirusTotal and 1 public blocklists.

The site displays a page titled “404 Not Found”.

vsemiralbom.cyou has been flagged by 15 security vendors as of May 17, 2026.

If you believe this listing is inaccurate, you can submit an appeal. For more information about our methodology, visit our FAQ page.