-
Notifications
You must be signed in to change notification settings - Fork 162
Description
What are the subjects of the phishing (domains, URLs or IPs)?
Malicious domains, IPs, IPFS hashes, or IPNS names:
ethereum-mixer.com
ethereum-mixer.io
ethereum-mixer.org
bestmix.ltd
blender.biz
boltchange.cc
boltchange.com
boomchange.com
boomchange.io
argoswap.io
redtor2.de
redtor3.de
kryptomixer.io
criptomixer.io
usdtmixer.com
usdtmixer.net
usdtmixer.to
usdt-erc20-mixer.com
solmix.tech
solana2mix.to
secretcryptos.com
trx-mixer.com
tether-mixer.to
unijoin22.com
unijoin77.com
unijoin.top
best-coin-mixers.com
dogehero.pro
ethhero.pro
xmr-mixer.to
criptomixer.io
kryptomixer.io
mixeraggregator.com
whir.live
mixero.biz
coinomize.sbs
cryptomixer.at
anonymixer.biz
yomix.top
mixtum.at
gumusokambalaj.com
Please explain why this content is malicious:
Multiple cryptomixer phishing websites that also target Polkadot user
Where or how did you discover this phishing?
I discovered the crypto mixer scam websites through search engines, primarily by identifying newly registered domains that often used fake registrar data. Many of these domains were linked to Chinese registrars and hosting services known for malicious activities.
Additional Information or Context
A scam fake crypto mixer phishing website such as all in this case are fraudulent platforms that masquerades as a legitimate cryptocurrency mixing service. It aims to deceive users into depositing their cryptocurrencies, promising anonymity and laundering services, but instead, it steals their funds. They are also clone former or actual real services, to trick victims and steal their crypto money. Some of the domains are also phishing redirect sites, which redirect to their newest phishing site if the links are clicked through search engines such as Google.