Knowledge Base · 40+ Questions · Full Technical Details

Frequently Asked Questions

Everything about our detection pipeline, 30+ parsers, 50+ vendor integrations, free Threat API, scoring methodology, data feeds, and how we protect users from phishing and crypto scams.

104K+
Domains Tracked
770K+
API Threats
50+
Vendor Reports
30+
Parsers
23K+
Abuse Reports
<0.01%
False Positives

About PhishDestroy

Who we are, our mission, and what we've achieved

What is PhishDestroy?

PhishDestroy is an independent, non-commercial threat intelligence platform that has been disrupting phishing, crypto scams, and wallet drainer operations since 2019. We are a small team of volunteer threat hunters who operate the full attack lifecycle — from detection to takedown.

Our infrastructure includes:

  • 30+ proprietary parsers monitoring CT logs, DNS, ads, social media, and partner feeds in real time
  • Automated reporting to 50+ vendors — Cloudflare, Google Safe Browsing, Microsoft, VirusTotal, ESET, Bitdefender, Netcraft, Norton, and more
  • Free Threat API at api.destroy.tools covering 770,000+ threats with real-time risk scoring
  • Destroylist — open-source blocklists on GitHub in 7 formats (JSON, TXT, Hosts, AdBlock, Dnsmasq, Unbound, RPZ)
  • Public domain database at phishdestroy.io/domain with 104,000+ analyzed domains

Our results: 104,000+ phishing domains tracked, 23,000+ abuse reports filed, 79,000+ takedowns coordinated, with a false positive rate below 0.01%.

Who runs PhishDestroy? Is it a company?

No, PhishDestroy is not a company. It is a volunteer-driven, non-commercial project run by a small team of threat hunters with backgrounds in cybersecurity, blockchain forensics, and abuse handling.

We are completely independent:

  • No corporate backing or investors
  • No paid delistings — never, ever
  • No donations or sponsorships accepted
  • Not affiliated with any registrar, hosting provider, or AV vendor

We started by hunting Steam scammers and spammy ads. Today our scope is global crypto phishing, drainer networks, and large-scale fraud operations. We conduct end-to-end casework: tracing money on-chain, mapping infrastructure, and linking campaigns to specific operators. Learn more on our About page.

What are PhishDestroy's key achievements?

Since 2019, we have achieved:

104,000+Phishing domains detected and tracked across 350+ brands
23,000+Formal abuse reports filed to registrars, hosts, and AV vendors
79,000+Successful domain takedowns coordinated
770,000+Threats indexed in our API database
500,000+Historical domains archived (5+ years of data)
50+Security vendors receiving our threat data
30+Proprietary parsers running 24/7
13+Community sources aggregated in our blocklists
<0.01%False positive rate

Key investigations: XMRWallet Exposed (fake Monero wallet stealing millions over 10 years), TrustWallet Panel Exposed ($8.5M drainer panel with 1,900 leaked chat logs), TheProject Scam Empire (hundreds of coordinated domains).

Is everything really free?

Yes, 100% free. We sell nothing, accept no donations, and never charge for any service:

How can I contact PhishDestroy?

Detection Pipeline & Methodology

Our 4-phase threat intelligence workflow in detail

How does the 4-phase detection pipeline work?

Our pipeline processes thousands of domains daily through 4 phases:

Phase 1: Pre-emptive Discovery & Ingestion

We utilize a distributed network of 30+ proprietary parsers to identify malicious domains at their earliest stage:

  • Certificate Transparency (CT) logs — real-time monitoring of new SSL certificates to catch phishing domains within minutes of registration
  • DNS monitoring — tracking new domain registrations and suspicious configurations
  • Malvertising detection — continuous monitoring of Google Ads, SEO-manipulated search results, and trending social media campaigns on Twitter/X, YouTube, and Telegram
  • Typosquatting — leveraging dnstwist and custom heuristics to catch look-alike domains targeting established brands
  • Community intelligence — real-time ingestion via our Telegram Bot, email, and partner feeds
  • Phishing feed aggregation — integration with 13+ community sources including OpenPhish, PhishTank, URLhaus

Phase 2: Analysis & Scoring

  • 95 AV engines via VirusTotal
  • WHOIS/DNS enrichment (registrar, nameservers, IP geolocation, country)
  • SSL certificate analysis (issuer, SANs, validity dates)
  • Screenshot capture and visual content matching
  • Phishing kit fingerprinting
  • Risk score computation (0-100) from 12+ weighted signals

Phase 3: Global Vendor Reporting

Once confirmed, we submit to 50+ vendors simultaneously:

CloudflareGoogle Safe BrowsingMicrosoft SecurityVirusTotalNetcraftESETBitdefenderNorton Safe WebAviraPhishTankDr.WebYandex Safe BrowsingURLScan.ioPolySwarmSiteReviewUrlqueryPhishStatsPhishReportIsItPhishThreatCenter

Plus formal abuse notifications to domain registrars and hosting providers with evidence packages.

Phase 4: Public Transparency

What is the risk scoring methodology?

Every domain receives a risk score from 0 to 100 based on weighted signals:

SignalPointsDescription
Curated blocklist+40Present in our primary Destroylist
DNS active+30Domain currently resolves via DNS
Community reported+20Flagged by community feeds
Multi-source+10Confirmed by 2+ independent feeds
Suspicious keywords+5 eachmetamask, wallet, airdrop, connect, claim, etc.
Risky TLD+5.xyz, .top, .club, .icu, .buzz, .cfd, etc.

Severity levels:

70-100 CRITICAL 40-69 HIGH 20-39 MEDIUM 1-19 LOW

Additionally, our internal domain reports (at phishdestroy.io/domain) use a separate enriched scoring system that incorporates VirusTotal detections, WHOIS age, SSL patterns, content analysis, brand impersonation distance, and historical registrar abuse rates across 12+ signals.

What makes PhishDestroy different from other blocklists?

Most blocklists only list domains. We do end-to-end threat intelligence:

  • Pre-emptive detection — we catch domains minutes after registration, before they reach victims
  • Deep investigation — we trace crypto on-chain, map infrastructure, decompile phishing kits, and link campaigns to operators
  • "Root-level" access — we've obtained access to drainer panels, phishing kit source code, and operator chat logs, giving us unparalleled insight into attacker TTPs
  • Active takedown — we don't just flag domains; we file evidence packages with registrars, hosts, and 50+ AV vendors and track each domain until it's dead
  • Content verification — our Content-Verified feeds go beyond DNS: we perform actual HTTP requests to verify the phishing page is live, detecting cloaking attempts
  • Registrar accountability — we publicly track registrar abuse rates and response times, creating accountability for negligent providers

What is content verification? Why does it matter?

Content verification means we don't just check if a domain resolves (DNS), but actually visit the page and verify phishing content is present.

This matters because scammers use cloaking: they show fake/blank pages to automated scanners while showing the real phishing page to human victims. A domain NOT appearing in our content-verified list does not mean it's safe — it may simply be cloaked.

Our content-verified feeds:

  • Primary Content — curated domains with verified active phishing content (updated every 12h)
  • Community Content — aggregated feeds with verified content (updated every 24h)

For maximum protection, use our Primary All or Community General feeds, which include all domains regardless of content verification status.

How accurate is PhishDestroy?

Our false positive rate is below 0.01%. Every automated detection passes through multiple verification layers before a report is filed. We maintain:

  • Allowlist — a manually curated list of known-good domains that are never flagged
  • 48-hour appeals — every false positive is reviewed and resolved quickly
  • Continuous classifier refinement — we track every appeal outcome and update detection logic
  • Multi-source cross-validation — domains must trigger multiple signals before being confirmed

What phishing kits and drainers do you track?

We track all major wallet drainer families and phishing kit types:

  • Wallet Connect abuse — fake WalletConnect prompts stealing approvals
  • Inferno Drainer — one of the most prolific multi-chain drainers
  • Angel Drainer — advanced drainer with NFT support
  • Pink Drainer — social engineering + drain combo
  • Permit/Approval phishing — ERC-20 token approval exploits (Permit2)
  • Seed phrase theft — fake "verify wallet" or "sync wallet" forms
  • AML/KYC scams — fake compliance verification pages
  • Airdrop scams — fake token claim pages
  • Investment scams — fake trading platforms, Ponzi schemes
  • Solana Drainer — Solana-specific wallet drain kits

Browse our database by drainer type, scam method, or targeted brand.

Threat API & Data Feeds

Free API access, blocklist feeds, and download formats

What is the PhishDestroy Threat API?

The PhishDestroy Threat API is a free, open API providing real-time domain risk scoring across 770,000+ threats. No API key required.

Endpoints:

MethodEndpointDescription
GET/v1/check?domain=Single domain check with risk score & severity
POST/v1/check/bulkBulk check up to 500 domains per request
GET/v1/search?q=Search blocklisted domains by keyword
GET/v1/feed/{list}Download full feeds (primary, community, active)
GET/v1/statsLive statistics & domain counts

Example:

curl "https://api.destroy.tools/v1/check?domain=suspicious-site.xyz"

Response includes: threat (boolean), risk_score (0-100), severity (critical/high/medium/low), lists (which feeds contain the domain), and last_seen timestamp.

What data feeds are available?

We provide 7 distinct data feeds via the Destroylist repository:

FeedDescriptionUpdate
PrimaryCurated phishing domains from our parsersReal-time
Primary LivePrimary domains verified alive via DNSEvery 24h
Primary ContentPrimary + verified phishing content via HTTPEvery 12h
CommunityAggregated from 13+ external sourcesEvery 2h
Community LiveCommunity domains verified alive via DNSEvery 24h
Community ContentCommunity + verified phishing contentEvery 24h
AllowlistFalse positive protection listManual

Recommended: Use list.json or active_domains.json for production. Use blocklist.json for maximum coverage.

All feeds available in JSON and TXT format. Root domain lists (no subdomains, hosting providers excluded) also available separately.

What download formats are supported?

Every feed is available in 7 formats for instant integration:

FormatUse Case
TXTPlain domain list — universal
JSONStructured data — API integrations, scripts
HostsPi-hole, /etc/hosts, Windows hosts file
AdBlockuBlock Origin, AdGuard, AdGuard Home
DnsmasqDnsmasq DNS server
UnboundpfSense, OPNsense firewalls
RPZBIND, Knot DNS (Response Policy Zone)

All formats available at: github.com/phishdestroy/destroylist/tree/main/rootlist/formats/

How do I use the API in my code?

Python:

import requests

r = requests.get(f"https://api.destroy.tools/v1/check?domain={domain}")
data = r.json()
if data["threat"]:
    print(f"BLOCKED: {data['severity']} (score: {data['risk_score']})")

JavaScript:

const r = await fetch(`https://api.destroy.tools/v1/check?domain=${domain}`);
const data = await r.json();
if (data.threat) console.warn("PHISHING:", data.severity, data.risk_score);

Bulk Check (up to 500 domains):

curl -X POST "https://api.destroy.tools/v1/check/bulk" \
  -H "Content-Type: application/json" \
  -d '{"domains":["site1.com","site2.xyz","site3.top"]}'

Simple blocklist check (Bash):

curl -s https://raw.githubusercontent.com/phishdestroy/destroylist/main/list.txt \
  | grep -q "suspicious-domain.com" && echo "BLOCKED"

What are Root Lists and why should I use them?

Root lists contain only root-level domains — no subdomains, and hosting providers (Vercel, Pages.dev, Netlify, etc.) are excluded. This makes them ideal for:

  • Firewall rules — block entire domains, not just specific subdomains
  • DNS blocking — safe for DNS resolvers without risk of blocking legitimate hosting platforms
  • Registrar analysis — clean data for abuse rate calculations

Three variants available:

  • All Roots — all confirmed root domains
  • Live Only — DNS-verified active roots
  • Services Only — hosting platform subdomains separately (Vercel, Pages.dev, Netlify, etc.)

Domain Security Reports

Understanding our domain intelligence database

What information is in a domain security report?

Each domain report is a comprehensive intelligence dossier containing:

  • Risk score — 0-100 composite threat rating with severity classification
  • VirusTotal results — detections from 95 antivirus engines with per-vendor breakdown
  • Screenshot — visual snapshot captured at scan time (75K+ screenshots stored locally)
  • WHOIS data — registrar, creation date, registrant info, nameservers
  • DNS records — A, MX, NS, TXT with IP geolocation and country flags
  • SSL certificate — issuer, validity, Subject Alternative Names (SANs)
  • Blocklist status — presence on 11+ major security blocklists
  • Scam type — wallet drainer, seed phrase theft, airdrop scam, investment scam, etc.
  • Brand targeted — which legitimate brand is being impersonated (350+ tracked brands)
  • Related domains — other domains sharing infrastructure, favicon, or phishing kit
  • Cloudflare Radar — domain categorization status
  • URLQuery scan — additional security analysis

Why does my legitimate domain appear in your database?

Possible reasons:

  • Your domain was previously compromised and used for phishing without your knowledge
  • Your domain shares infrastructure (IP, nameservers) with known phishing domains
  • An automated classifier flagged a false positive — this occurs in <0.01% of cases
  • Someone reported your domain through community channels

Important: PhishDestroy does not block domains directly. We report to AV vendors and registrars who make their own blocking decisions. If your domain was flagged incorrectly, submit an appeal — we respond within 48 hours and add cleared domains to our permanent allowlist.

How often is data updated?

Data TypeFrequency
New domain detectionReal-time (CT logs, parsers)
VirusTotal scansEvery 12-24 hours
Alive/dead statusMultiple times per day
DNS/WHOIS enrichmentOn detection + on change
ScreenshotsAt first detection + periodic refresh
Blocklist syncEvery 4-6 hours (ETag caching)
API feed syncHourly
OG cards generationOn-demand + every 2 hours
Community blocklistEvery 2 hours (13+ sources)

Appeals & Delisting

How to resolve false positives and domain disputes

How do I appeal a false positive?

Two ways to appeal:

  1. Appeals Form (fastest) — submit your domain with proof of legitimacy
  2. GitHub Issue — open an issue with evidence

Process:

  • We review within 48 hours (most same-day)
  • If cleared, domain is added to our permanent allowlist
  • Allowlist is public: allowlist.json
  • Changes propagate to our API and database immediately

The entire process is completely free. We never charge for appeals or delistings — never have, never will.

How much does delisting cost?

Nothing. Zero. Free. Always.

Any third party claiming they can delist your domain from PhishDestroy for money is running a scam. We have no paid delisting program and never will. Report such services to us.

My domain was cleared but is still blocked elsewhere

PhishDestroy is one of many sources. Even after we clear your domain, other systems may still flag it:

  • Google Safe Browsing — submit at safebrowsing.google.com
  • Antivirus vendors — each maintains independent blocklists; contact each vendor's FP reporting channel
  • Browser warnings — may cache old data for 24-48 hours

Check your domain on VirusTotal to see which specific vendors are flagging it, then contact each one individually.

How does the ICANN compliance process work?

When we file abuse reports, we align with ICANN standards:

  • Formal abuse notifications to registrars via WHOIS abuse contacts
  • Complete evidence packages — scan results, screenshots, PDF reports with metadata
  • ICANN requires registrars to review abuse complaints within 24 hours
  • Conditional re-detection — if a domain remains active after 24h, we escalate with follow-up alerts

When a domain receives 10-30+ abuse reports and a registrar still ignores them for months, we document this publicly. The registrar is no longer passive — it effectively provides infrastructure for illegal activity. Our public database creates accountability.

Victim Resources

Emergency steps and protection guides

I was scammed. What should I do RIGHT NOW?

Time is critical. Act immediately:

  1. REVOKE token approvals NOW — go to revoke.cash immediately to revoke any pending wallet approvals. This stops ongoing drain.
  2. Contact SEAL 911 — emergency crypto incident response by security professionals. Visit phishdestroy.io/critical-action
  3. Move remaining funds — transfer all assets from the compromised wallet to a new, clean wallet
  4. Report to police — file a cybercrime report with your local police. Get a case number.
  5. Report publicly — file on Chainabuse to warn others and create a paper trail
  6. Preserve ALL evidence — wallet addresses, transaction IDs, screenshots, chat logs, emails, the phishing URL

DO NOT contact "recovery services" found online. 95%+ are secondary scams targeting victims.

Can stolen crypto be recovered?

Sometimes, but only if you act fast:

  • Token approvals not yet executed: If you only signed a malicious approval, revoking at revoke.cash immediately prevents further losses
  • CEX cashouts: If the attacker sends funds to Binance, Coinbase, etc., law enforcement can freeze accounts — but they need your police report
  • Bridge pauses: Some cross-chain bridges have paused transactions when fraud was reported quickly

Reality check: Most on-chain crypto theft is irreversible. Prevention is the best defense — use hardware wallets, verify URLs, never share seed phrases.

How do I spot a phishing website?

Red flags:

  • URL mismatch — "metamask-login.com" instead of "metamask.io"
  • Urgency language — "Act now or lose access", "Your wallet will be locked"
  • Seed phrase requests — NO legitimate service will EVER ask for your seed phrase
  • Unexpected wallet popups — WalletConnect or MetaMask prompts you didn't initiate
  • Too-good-to-be-true — free airdrops, guaranteed returns, "claim your reward"
  • Social media ads — phishing heavily uses paid ads on Twitter, Google, and Telegram
  • DM/reply scams — "customer support" reaching out to you first

Protection: Always check domains at phishdestroy.io/domain or use our Telegram bot before connecting your wallet. Read our full guide: Crypto Security Essentials

Are "crypto recovery services" legitimate?

Almost never. 95%+ of "recovery services" are secondary scams targeting people who already lost money.

Red flags:

  • They guarantee recovery (impossible to guarantee)
  • They require upfront payment
  • They found you through social media comments about being scammed
  • They claim to be "ethical hackers" who can "reverse transactions"
  • They ask for your seed phrase or wallet access

Legitimate help (all free): SEAL 911, local law enforcement, your exchange's support team, Chainabuse for public reporting.

Integration & Setup

How to integrate PhishDestroy into your security stack

How do I add Destroylist to Pi-hole?

Go to Pi-hole Admin → SettingsBlocklists → paste this URL:

https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/hosts.txt

Save and update gravity. The list auto-updates on your Pi-hole schedule.

How do I add Destroylist to uBlock Origin or AdGuard?

uBlock Origin: Settings → Filter lists → Import → paste:

https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/adblock.txt

AdGuard Home: Filters → DNS Blocklists → Add blocklist → paste the same URL.

How do I add Destroylist to pfSense / OPNsense?

For Unbound DNS resolver (pfSense/OPNsense):

https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/unbound.conf

For BIND or Knot DNS (RPZ format):

https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/rpz.zone

For Dnsmasq:

https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/dnsmasq.conf

Can I contribute to PhishDestroy?

Yes! Here's how:

  • Report phishing domainsTelegram bot or abuse@phishdestroy.io
  • Integrate our blocklists — add Destroylist to your DNS, firewall, or security tools
  • Use our API — build tools, bots, or dashboards using the Threat API
  • Submit PRs — detection algorithm improvements, integration tips, fresh intel
  • Spread awareness — share our research on social media

We don't accept donations — the best way to support us is by making our data useful.

What can I use PhishDestroy data for?

Our data (MIT license) is used for:

  • Network security — firewall rules, DNS blocking, email filtering
  • Automation — SIEM/SOC integration, automated incident response
  • Threat research — phishing campaign analysis, brand impersonation trends
  • ML/AI training — phishing detection model training datasets
  • Trend analysis — registrar abuse rates, TLD risk patterns, drainer evolution
  • Legal evidence — timestamped domain reports for law enforcement, insurance claims

Historical vault: 500,000+ domains archived over 5+ years. Contact contact@phishdestroy.io for access.

Helpful Resources

I Was Scammed — What Now?
Emergency steps: SEAL 911, revoke approvals, police report, evidence preservation.
Threat API Documentation
Free API: domain check, bulk check (500/req), keyword search, full feeds. No API key needed.
Destroylist on GitHub
Open-source blocklists: 7 feeds, 7 formats. Pi-hole, AdGuard, pfSense, BIND ready.
Crypto Security Essentials
Hardware wallets, 2FA, URL verification, social engineering defense.
Anatomy of a Takedown
Step-by-step: detection, 50+ vendor reports, ICANN compliance, evidence archival.
Security Checklist
Step-by-step hardening guide — wallets, browsers, DNS, 2FA best practices.

Still Have Questions?

Can't find what you're looking for? Reach out directly — we're always happy to help.