shipments-opensea.idcapital[.]top
Forensic brief
Read full brief
PhishDestroy identifies shipments-opensea.idcapital.top as a malicious domain posing as OpenSea to facilitate crypto drainer operations. This site is engineered to deceive users by mimicking the legitimate OpenSea platform, tricking visitors into connecting cryptocurrency wallets under the guise of shipment verification or transaction processing. Once a wallet connection is established, the threat actor silently drains assets through smart contract interactions, leaving victims with significant financial losses without immediate awareness.
The operational window of this domain extends from its creation date of December 10, 2020, indicating sustained malicious activity over several years. Technical analysis confirms the elevated risk profile of this domain. According to VirusTotal, only 3 out of 95 security vendors flagged this domain as malicious as of the latest scan, highlighting a critical gap in widespread detection coverage.
The domain was registered through PDR Ltd. d/b/a PublicDomainRegistry.com, a registrar frequently associated with bulk domain acquisitions used in malicious campaigns. It resolves to IP address 50.31.176.165 and utilizes a Let's Encrypt SSL certificate to appear legitimate. Notably, this domain has been flagged and blocked by prominent security tools including MetaMask and SEAL, reinforcing its malicious classification.
The combination of brand impersonation, cryptocurrency targeting, and evasion techniques results in an elevated risk rating. If you have visited shipments-opensea.idcapital.top, immediately disconnect your wallet from the site and revoke any unauthorized permissions through your wallet’s connected app interface. Do not interact with any further prompts or pop-ups from this domain.
Scan your device using updated antivirus software and consider rotating wallet credentials if suspicious transactions are detected. Report the incident to your wallet provider and relevant cryptocurrency platforms. Enable multi-factor authentication on all crypto-related accounts and avoid clicking links from unsolicited messages or emails.
Stay vigilant for unusual transaction confirmations or unauthorized asset transfers, and consult your organization’s security team if this domain appeared in a corporate context.
Threat response pipeline
Cloudflare Radar
VirusTotal
Forensic Evidence CollectionEvidence capture
Domain Intelligence
PDR Ltd.
Technical details
Public blocklist status
Technologies
Technologies · 3 identified
VirusTotal consensus
Aggregated detection across 95 security vendors.
Site performance
Site performance analysis
Google PageSpeed Insights — mobile audit of shipments-opensea.idcapital.top
Evidence & external reports
Were you affected by this site?
Were You Affected?
Recommendations & Advice for Victims
- Do not pay anything else. Recovery agents demanding upfront fees are a second-stage scam.
- Disconnect compromised wallets. Move remaining funds to a fresh seed phrase generated offline.
- Preserve evidence. Screenshot transactions, save URLs, archive emails — chain-of-custody matters for prosecution.
- Report to authorities (see section 15 below) — even small reports help build case patterns.
- Notify your bank/exchange. Some chargebacks may still be possible within 24-72h.
Report to your local authorities
Email template — registrar abuse
abuse@deft.com, domitec-peru@hotmail.com, lromay@pacpelsac.com, abuse-contact@publicdomainregistry.com
Registrar: PDR Ltd. Case: PD-
Embed this report
About this report
About this report: shipments-opensea.idcapital.top
This domain security report is maintained by PhishDestroy's automated threat-intelligence pipeline. Our system continuously monitors this domain across 95 security vendors on VirusTotal and 3 public blocklists.
The site displays a page titled “Google”.
shipments-opensea.idcapital.top has been flagged by 3 security vendors as of May 17, 2026.
If you believe this listing is inaccurate, you can submit an appeal. For more information about our methodology, visit our FAQ page.