This domain has been flagged as malicious
Detected by 12 of 12 security vendors and listed in 2 public blocklists. Do not connect a wallet; do not paste a seed phrase.

royalfityneardelhiairport.spahotel[.]guru

Domain Security & Threat Intelligence Report
“Hotel Royal Infinity Near Delhi Airport New Delhi - New Delhi, India”
12/12 VT Malicious May 17, 2026 2 Blocklists
0 Risk Score
Data coverage VirusTotal 12 / 12 URLQuery no det. OTX no pulses CF Radar malicious URLScan report ready DNS blocks none SSL valid, 74d WHOIS Screenshot captured Redirect chain not probed CDN bypass n/a
VirusTotal
12 det.
URLQuery
no det.
URLScan
Report ↗
SSL
Let's Encrypt
Age
Status
Live
DestroyList
Listed
Reports Sent
0
02

Forensic brief

auto-generated · PhishDestroy AI
PhishDestroy AI
probe: May 17, 2026
score: 100/100
vendors12/12
blocklists2
Analyst brief · auto-generated

PhishDestroy identifies royalfityneardelhiairport.spahotel.guru as a fake airline spa booking phishing site that impersonates Delhi Airport’s premium spa services to steal payment and login details. The domain mimics a legitimate Royal Fityne Airline spa portal, luring users with false promises of discounted or exclusive spa treatments. Once victims enter their personal or payment information, attackers harvest the data for fraudulent transactions or identity theft. This is an elevated-risk threat designed to exploit trust in airline-branded services. This domain was flagged by PhishDestroy after 12 out of 95 VirusTotal security vendors detected malicious content. It resolved to IP address 52.29.26.157 and uses a Let’s Encrypt SSL certificate to appear legitimate. The domain was registered through a privacy-protected registrar and shows signs of recent creation, with no prior reputation in threat intelligence feeds. The mismatch between the domain name (spahotel.guru) and the claimed airline service further indicates malicious intent, as legitimate businesses rarely use .guru top-level domains. If you visited this site, stop entering any information immediately. Clear your browser cache and cookies, and scan your device with updated antivirus software. Do not trust follow-up emails claiming to help ‘secure your account’—they are likely part of the same campaign. Report the domain to your IT team or use PhishDestroy’s lookup tool to verify future links. Always navigate directly to official airline websites using verified URLs or bookmarked links to avoid similar scams.

Phishing clean drainer
03

Threat response pipeline

May 17, 2026 · 0 reports submitted
Discovery
Submission
Legal
Takedown
10/19
30+ Proprietary Parsers
Distributed scanning of Google Ads, SEO-manipulated results, Twitter/X, YouTube & Telegram campaigns.
Infrastructure Analysis
dnstwist & typosquatting detection.
Community Intelligence
Real-time ingestion via Telegram Bot & partner intelligence feeds.
Threat Ingested
royalfityneardelhiairport.spahotel.guru detected and queued for full analysis.
May 17, 2026
54+ Vendor Submissions
Threat data submitted to 54+ security vendors & threat-intel platforms. 12 flagged this domain.
Cloudflare Radar
View scan — verdict: malicious
VirusTotal
12 / 12 vendors flagged on VirusTotal.
Blocklist Detection
Found in 2 blocklists: OpenPhish, PhishDestroy.
Forensic Evidence Collection
URLScan.io, URLQuery & Cloudflare Radar — DOM snapshots, HTTP transactions, DNS & certificate data.
Open Threat Database
Real-time commits to GitHub repository & live monitoring at phishdestroy.io/live.
Social Broadcasting
Automated alerts on X, Telegram & Mastodon.
Awaiting Takedown
Domain still active — monitoring & re-reporting continues. 0h since first report.
04

Evidence capture

urlscan snapshot · domain intelligence
Live Snapshot
2026-05-17 04:11 UTC
Malicious · 12/12 engines
Forensic screenshot of royalfityneardelhiairport.spahotel.guru
IP: 52.29.26.157
Let's Encrypt
Page Title
Hotel Royal Infinity Near Delhi Airport New Delhi - New Delhi, India
Favicon Hash
f64ad864d87e446dc9f89caf5522936c

Domain Intelligence

Domainroyalfityneardelhiairport.spahotel.guru
IP Address 52.29.26.157
ASN 16509 · Amazon.com, Inc.
SSL Let's Encrypt · valid 74d · expires 2026-07-30
Hosting DE Frankfurt am Main , DE · AWS EC2 (eu-central-1)
Nameservers NS_NOT_FOUND
Page title “Hotel Royal Infinity Near Delhi Airport New Delhi - New Delhi, India”
HTTP status 200 · redirects to royalfityneardelhiairport.spahotel.guru
Technical details DNS, hashes, case ID
Favicon hashf64ad864d87e446dc9f89caf5522936c
SSL fingerprint6673fc5704a8083a941f5941be5b22294274992e098ffe43e01c35663f810601
08

Public blocklist status

cross-vendor confirmation
2
Listed in 2 public blocklists — confirmed by independent sources
Sources with no listing are omitted.
09

Technologies

Wappalyzer · Cloudflare Radar
Technologies · 5 identified
WordPress
MySQL
PHP
Nginx
HTTP/3
Detected via Cloudflare Radar · Wappalyzer engine
10

VirusTotal consensus

12 vendors · 3-col matrix
12/12
vendors flagging
Unanimous malicious verdict

Aggregated detection across 12 security vendors.

Per-vendor breakdown not available — view raw report on VirusTotal ↗
11

Site performance

PageSpeed Insights · mobile
Site performance analysis

Google PageSpeed Insights — mobile audit of royalfityneardelhiairport.spahotel.guru

71
Needs Work
Performance
FCP
3.16
First Contentful Paint
LCP
5.86
Largest Contentful Paint
CLS
0.009
Cumulative Layout Shift
TBT
130
Total Blocking Time
SI
3.16
Speed Index
12

Evidence & external reports

cross-reference this domain
14

Were you affected by this site?

immediate response · authorities

Were You Affected?

You are not alone and there is nothing to be ashamed of. Reporting is the most powerful weapon against fraud — your report can prevent others from becoming victims.
Beware of recovery scammers! No legitimate service will ask for upfront payment to recover stolen crypto. Learn more about recovery fraud →
15

Report to your local authorities

geo-aware · authorities · AI complaint
Your country (auto-detected)
Germany

  Email template — registrar abuse

To: abuse@ Case: PD-
Open in mail client Appeal (if false-positive)
16

Embed this report

iframe · sizer · CC-BY

Embed this report

Drop a live, self-updating risk widget anywhere — blog, DAO forum, Discord webhook, X post. Free, no API key, CC-BY.

royalfityneardelhiairport[.]spahotel[.]guru 100/100 MALICIOUS · 12/12 VT · 0h View full report ↗
Live preview at 100% width
Canonical: https://phishdestroy.io/domain/royalfityneardelhiairport.spahotel.guru/ JSON API llm.txt
17

About this report

methodology · appeals · API

About this report: royalfityneardelhiairport.spahotel.guru

This domain security report is maintained by PhishDestroy's automated threat-intelligence pipeline. Our system continuously monitors this domain across 12 security vendors on VirusTotal and 2 public blocklists.

The site displays a page titled “Hotel Royal Infinity Near Delhi Airport New Delhi - New Delhi, India”.

royalfityneardelhiairport.spahotel.guru has been flagged by 12 security vendors as of May 17, 2026.

If you believe this listing is inaccurate, you can submit an appeal. For more information about our methodology, visit our FAQ page.