Github Actions
c214572154
[CI Skip] release/stable 0.6.116
...
skip-checks: true
2021-04-27 09:51:01 +00:00
Mich
c92c921723
Update all.json ( #290 )
...
Add new bad URL
AFAIK PanCakeSwap is on BSC, but for some reason the scam template has polkadot as well, thus adding.
2021-04-27 11:49:01 +02:00
Github Actions
d150dc97b5
[CI Skip] release/stable 0.6.113
...
skip-checks: true
2021-04-26 16:04:27 +00:00
Mich
3ce726378c
Update all.json ( #286 )
...
add new bad url
2021-04-26 19:02:17 +03:00
Github Actions
b8095aa333
[CI Skip] release/stable 0.6.112
...
skip-checks: true
2021-04-26 09:03:40 +00:00
Mich
fbb0097e47
Update all.json ( #285 )
...
adding 6 wallet connect clones stealing mnemonic seed phrase (polkadot included)
cryptowalletconnect.com
cryptowalletconnects.org
cryptowalletconnects.penhax.com
walletconnect-sync.org
walletconnect-support.ml
walletconnect-dapp.online
2021-04-26 11:01:46 +02:00
Github Actions
bb9b76f385
[CI Skip] release/stable 0.6.111
...
skip-checks: true
2021-04-26 05:29:41 +00:00
Mich
b8ee07d52e
Update all.json ( #284 )
...
One of the mysterious blockchain st cyber squat TLDs and two wallet connect clones (revoked, see
2021-04-26 07:27:31 +02:00
Github Actions
5037992b4e
[CI Skip] release/stable 0.6.106
...
skip-checks: true
2021-04-24 04:59:02 +00:00
Mich
d8a92070dd
Update all.json ( #278 )
...
fresh scam registered yesterday via namecheap
2021-04-24 06:56:54 +02:00
Github Actions
e2254d08ff
[CI Skip] release/stable 0.6.105
...
skip-checks: true
2021-04-22 12:03:15 +00:00
michalisFr
53450fdfdb
Update all.json ( #277 )
...
Added:
coinrau[.]com (usual, fake exchange template we've seen before)
minaprotocols[.]tech (scam token sale)
mina[.]limited (another one, offline now)
winxcrypt[.]com (scam trading site)
2021-04-22 14:01:27 +02:00
Github Actions
1994c316f8
[CI Skip] release/stable 0.6.104
...
skip-checks: true
2021-04-21 12:15:22 +00:00
michalisFr
a874ee8e5e
Update all.json ( #276 )
...
Also, parity[.]site, polkadot[.]money, polkadot[.]gg (all without content currently but scheduled for takedown by our partners)
2021-04-21 14:13:14 +02:00
Github Actions
c25d3849e1
[CI Skip] release/stable 0.6.103
...
skip-checks: true
2021-04-21 12:08:52 +00:00
michalisFr
3c14f50f43
Update all.json ( #275 )
...
Adding wallet-connect[.]cloud (already taken down)
2021-04-21 14:06:46 +02:00
Jaco
f9038fb496
Add polkastater.link ( #274 )
...
* Add polkastater.link
* Use matching fo category
2021-04-21 13:25:31 +02:00
Github Actions
9aac817d02
[CI Skip] release/stable 0.6.100
...
skip-checks: true
2021-04-19 19:00:06 +00:00
Mich
8dba2e774e
Update all.json ( #271 )
...
freshly registered new bad URLs
2021-04-19 21:57:50 +03:00
Github Actions
cd97cadd9b
[CI Skip] release/stable 0.6.99
...
skip-checks: true
2021-04-19 12:42:12 +00:00
Mich
a74ec4ecec
Update all.json ( #270 )
...
2 bad urls
one of them targets uniswap, but also had polkadot option (site already revoked)
the other one is is the usual fake multi wallet connect protocol
also saw
MyPolkaDotWallet.com
polkadotwallet.io
No eminent danger, just cyber squatting, same vendor that wanted 200K for a domain polkadot.co (lol nice high hopes)
2021-04-19 15:40:20 +03:00
Github Actions
c811b7f5e4
[CI Skip] release/stable 0.6.98
...
skip-checks: true
2021-04-18 06:17:49 +00:00
Mich
a4f529fedd
Update all.json ( #269 )
...
* Update all.json
one polka and a few wallet connect clones
* Update all.json
Co-authored-by: Jaco <jacogr@gmail.com >
2021-04-18 08:15:49 +02:00
Dan Shields
2c5c234b9f
web-unlock[dot]net ( #266 )
...
is this redundant? as subdomains are covered? so we could remove any subdomains?
2021-04-16 21:45:13 +03:00
Dan Shields
b273c4fa92
phishing from tech support ( #265 )
...
wallet address given to "tech support", `walletfirmware.web-unlock[dot]net/wallets.html` was given as a way to "sync" my problems away.
2021-04-16 20:05:10 +03:00
Mich
d8be393d69
Update all.json ( #261 )
...
add new bad URL registered yesterday
2021-04-16 07:53:28 +02:00
Mich
ba00c14cc7
Update all.json ( #254 )
...
just registered
2021-04-13 19:19:47 +02:00
Github Actions
16a1907e77
[CI Skip] release/stable 0.6.86
...
skip-checks: true
2021-04-13 17:05:29 +00:00
michalisFr
6de10d5789
Update all.json ( #252 )
...
Added bscpad[.]in
for https://bscpad[.]in/whitelist/polkadotwallet.html
2021-04-13 19:03:32 +02:00
Github Actions
7db9454eb4
[CI Skip] release/stable 0.6.85
...
skip-checks: true
2021-04-13 15:24:37 +00:00
michalisFr
0ea72bf56f
Update all.json ( #251 )
...
Added
polkadotchain[.]net
polkadotparachain[.]com
polkadottoken[.]org
from PR #243 pre-emptively
2021-04-13 18:22:49 +03:00
Github Actions
70ac205c29
[CI Skip] release/stable 0.6.84
...
skip-checks: true
2021-04-13 06:08:32 +00:00
Mich
507dc35256
Update all.json ( #243 )
...
I am seeing a lot of domains which I am having trouble classify.
They are all named polkadot something (gold, advanced, bank) and always come up with a blank page only with an email address.
advancedpolkadot[.]com - "info@blockchain.st "
goldpolkadot[.]com - "info@blockchain.st "
polkado[.]com - "info@blockchain.st "
polkadotbank[.]com - "info@blockchain.st "
I would like to check with the team if this email rings any bells.
If not I suggest to blacklist those just in case, despite them not serving bad content right now.
My suspicion is that those could be used for
- cybersquatting (re-sell domains for higher price)
- SEO reputation gains (and future advertisement placement on yahoo, duckduckgo or google leading to the fake polkadot clones showing on top)
- GeoFenced phish - serving contents only to users of a particular country.
2021-04-13 08:06:43 +02:00
Github Actions
12096ad39d
[CI Skip] release/stable 0.6.83
...
skip-checks: true
2021-04-13 05:09:12 +00:00
michalisFr
91c5f1dea0
Update all.json ( #248 )
...
Added dot-give[.]com
2021-04-13 07:06:39 +02:00
Mich
bf968f25f1
Update all.json ( #249 )
...
add new bad url
promoted via twitter fake impersonator profile
2021-04-13 07:06:16 +02:00
michalisFr
9cf2d4c6df
Update all.json ( #247 )
...
Added polkagiveaway[.]com. Site is currently down but a user fell for it.
Also, oxy[.]dev which is copycat of a W3F grant recipient. The original project is oxydev.ir
2021-04-12 13:59:17 +02:00
Github Actions
81c070aa92
[CI Skip] release/stable 0.6.81
...
skip-checks: true
2021-04-12 09:20:26 +00:00
michalisFr
1002a81fa1
Update all.json ( #246 )
2021-04-12 11:18:02 +02:00
Github Actions
d60935e4cd
[CI Skip] release/stable 0.6.77
...
skip-checks: true
2021-04-11 19:13:28 +00:00
Mich
2d0f0a7f84
Update all.json ( #237 )
...
scam is not even set up yet
relatively high confidence this is ripe for blocking, based on where it is hosted.
(many other scams on the same IP)
2021-04-11 07:44:48 +02:00
Github Actions
0c4b0e5f05
[CI Skip] release/stable 0.6.74
...
skip-checks: true
2021-04-09 19:05:39 +00:00
Mich
20a8921e16
Update all.json ( #236 )
...
new bad url
also dodgy: polkadot-mixer[.]to
2021-04-09 21:03:28 +02:00
Mich
3e3d63ce02
Update all.json ( #235 )
...
Scam is not set up yet but based on where it i hosted adding in advance.
2021-04-08 14:03:07 +02:00
Github Actions
1e8deae4e4
[CI Skip] release/stable 0.6.70
...
skip-checks: true
2021-04-08 07:10:04 +00:00
Mich
51efb16b2e
Update all.json ( #230 )
...
* Update all.json
2 more bad "polkastarter" URLs
Both share the same hoting IP via DNS A 185.104.45.68
* Update all.json
Co-authored-by: Jaco Greeff <jacogr@gmail.com >
2021-04-08 09:07:46 +02:00
Github Actions
51a431116b
[CI Skip] release/stable 0.6.69
...
skip-checks: true
2021-04-08 06:59:57 +00:00
Mich
b7918c5dbf
Update all.json ( #231 )
...
Found one more, adding TLD only + full FQDN and the end URL they redirect users to to steal the mnemonic seed phrase.
2021-04-08 08:57:50 +02:00
Github Actions
2f90d5bde4
[CI Skip] release/stable 0.6.68
...
skip-checks: true
2021-04-08 06:57:26 +00:00
Mich
3c7601959a
Add new bad URL registered yesterday ( #229 )
...
Domain: polkastarter.fund
Registrar: NameCheap, Inc.
Registered On: 2021-04-07
https://cdn.discordapp.com/attachments/807400385642889286/829465778566725662/Screenshot_2021-04-08_at_0.18.24.png
https://urlscan.io/result/7c6d1356-0331-47a4-b0f7-d3bfdf239468/
2021-04-08 08:55:21 +02:00