Scam Detective
Domain

rl.ammyy.com

First seen Feb 22, 2026

Suspicious
  • No SSL certificate
  • WHOIS registration hidden
  • 28 community reports from users

Campaign Intelligence

This cluster centers on 2764 connected domains tagged as BeaverTail, Kaiji, fbf543. 645 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1132 phone numbers (7638857447, 8664372914, 2157987305) with 10266 FTC complaints; 146 companies (JPMORGAN CHASE & CO., Advanced Resolution Services Inc., EVERBANK, NATIONAL ASSOCIATION) with 8616274 CFPB complaints; 298 email addresses (xxxxxxxxxxxxxxxxxxxxxxxx@vm...

This cluster centers on 3287 connected domains tagged as HijackLoader, RemcosRAT, screenconnect. 617 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1649 phone numbers (5408463620, 8552597377, 8007873903) with 7110 FTC complaints; 143 companies (Informative LLC, HomePlus Corporation, Doral Capital Corporation) with 8547081 CFPB complaints; 807 email addresses (kellymoore_64@yahoo.com, schantzsybg7@...

This cluster centers on 2874 connected domains tagged as QuasarRAT, StealitStealer, pw-k53mv9bc. 652 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1375 phone numbers (2157987305, 2025069230, 2028641298) with 14635 FTC complaints; 160 companies (JPMORGAN CHASE & CO., Advanced Resolution Services Inc., EVERBANK, NATIONAL ASSOCIATION) with 8680419 CFPB complaints; 299 email addresses (abuse@fb.com, ...

This cluster centers on 1486 connected domains tagged as None, keylogger. 5 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1364 phone numbers (3124141737, 3163966869, 8553892999) with 17909 FTC complaints; 170 companies (EQUIFAX, INC., TRANSUNION INTERMEDIATE HOLDINGS, INC., BANK OF AMERICA, NATIONAL ASSOCIATION) with 8747332 CFPB complaints; 187 email addresses (xxxxxxxxxxxxxxxxxxxxxxxx@vmh5.grup...

Details

Registrar
NAMECHEAP INC
Registration Date
1/29/2008
First Seen
2/22/2026

Related Domains

Community Reports

HoneyPot VM After reading /r/scambait I can see a pattern in their script as well as the tools and tricks they use. As such I'm planning on setting up a Honeypot for them to scambait. Please let me know if I'm missing anything or give me some suggestions Setup: Hyper-V running a Windows 7 VM. Both host and VM have VPN's installed (Although I really should do this at the router level) host is a laptop connected to the Guest WiFi of my router. Alternate is to put laptop on DMZ in case of some really clever malware leaking out of the hypervisor and infecting the host and thus the rest of my internal network Honey Pot VM: ------------------------------ 1) HOSTS FILES: A) redirect Paypal website to Sandbox Paypal website with fake account and fake sums B) 127.0.0.1 for rl.Ammyy.com (favorite remote connection tool from what I read of scammers) 2) Rename/Delete CMD.exe and Syskey.exe and replace with custom fake versions that still look like the real thing but doesn't do anything. Any command entered into CMD.exe will return output of "No virus found, your safe and clean! HOoorayyy". and Syskey will probably say, "Nice try scammer" 3) Load and setup the AMMYY 3.5 metasploit so I can remote control their PC's (if they use AMMYY) 4) Clear EventViewer of all logs. Scammers love pointing to Critical alerts in here to show you have a virus! They'll be so confused when it's empty 5) On desktop as well as Document folders. All kinds of the latest campaigns of malware/ransomware/cryptolocker grabbed from the usual repositories online and renamed as things like "My Passwords" "My Bank account info" "Naked Photos of Girlfriends" etc. Better yet, I imagine there probably is already Word/Excel Docs with malicious macros all ready to go if I find them. Anything to entice them to steal. 6) Use Fake Address Generator site to generate fake CC numbers that will never go through. 7) Figure out how to edit Hyper-V so the "Virtualization" labels do not show up within

3270 days ago12 upvotes

HoneyPot VM After reading /r/scambait I can see a pattern in their script as well as the tools and tricks they use. As such I'm planning on setting up a Honeypot for them to scambait. Please let me know if I'm missing anything or give me some suggestions Setup: Hyper-V running a Windows 7 VM. Both host and VM have VPN's installed (Although I really should do this at the router level) host is a laptop connected to the Guest WiFi of my router. Alternate is to put laptop on DMZ in case of some really clever malware leaking out of the hypervisor and infecting the host and thus the rest of my internal network Honey Pot VM: ------------------------------ 1) HOSTS FILES: A) redirect Paypal website to Sandbox Paypal website with fake account and fake sums B) 127.0.0.1 for rl.Ammyy.com (favorite remote connection tool from what I read of scammers) 2) Rename/Delete CMD.exe and Syskey.exe and replace with custom fake versions that still look like the real thing but doesn't do anything. Any command entered into CMD.exe will return output of "No virus found, your safe and clean! HOoorayyy". and Syskey will probably say, "Nice try scammer" 3) Load and setup the AMMYY 3.5 metasploit so I can remote control their PC's (if they use AMMYY) 4) Clear EventViewer of all logs. Scammers love pointing to Critical alerts in here to show you have a virus! They'll be so confused when it's empty 5) On desktop as well as Document folders. All kinds of the latest campaigns of malware/ransomware/cryptolocker grabbed from the usual repositories online and renamed as things like "My Passwords" "My Bank account info" "Naked Photos of Girlfriends" etc. Better yet, I imagine there probably is already Word/Excel Docs with malicious macros all ready to go if I find them. Anything to entice them to steal. 6) Use Fake Address Generator site to generate fake CC numbers that will never go through. 7) Figure out how to edit Hyper-V so the "Virtualization" labels do not show up within

3270 days ago12 upvotes

HoneyPot VM After reading /r/scambait I can see a pattern in their script as well as the tools and tricks they use. As such I'm planning on setting up a Honeypot for them to scambait. Please let me know if I'm missing anything or give me some suggestions Setup: Hyper-V running a Windows 7 VM. Both host and VM have VPN's installed (Although I really should do this at the router level) host is a laptop connected to the Guest WiFi of my router. Alternate is to put laptop on DMZ in case of some really clever malware leaking out of the hypervisor and infecting the host and thus the rest of my internal network Honey Pot VM: ------------------------------ 1) HOSTS FILES: A) redirect Paypal website to Sandbox Paypal website with fake account and fake sums B) 127.0.0.1 for rl.Ammyy.com (favorite remote connection tool from what I read of scammers) 2) Rename/Delete CMD.exe and Syskey.exe and replace with custom fake versions that still look like the real thing but doesn't do anything. Any command entered into CMD.exe will return output of "No virus found, your safe and clean! HOoorayyy". and Syskey will probably say, "Nice try scammer" 3) Load and setup the AMMYY 3.5 metasploit so I can remote control their PC's (if they use AMMYY) 4) Clear EventViewer of all logs. Scammers love pointing to Critical alerts in here to show you have a virus! They'll be so confused when it's empty 5) On desktop as well as Document folders. All kinds of the latest campaigns of malware/ransomware/cryptolocker grabbed from the usual repositories online and renamed as things like "My Passwords" "My Bank account info" "Naked Photos of Girlfriends" etc. Better yet, I imagine there probably is already Word/Excel Docs with malicious macros all ready to go if I find them. Anything to entice them to steal. 6) Use Fake Address Generator site to generate fake CC numbers that will never go through. 7) Figure out how to edit Hyper-V so the "Virtualization" labels do not show up within

3270 days ago12 upvotes

HoneyPot VM After reading /r/scambait I can see a pattern in their script as well as the tools and tricks they use. As such I'm planning on setting up a Honeypot for them to scambait. Please let me know if I'm missing anything or give me some suggestions Setup: Hyper-V running a Windows 7 VM. Both host and VM have VPN's installed (Although I really should do this at the router level) host is a laptop connected to the Guest WiFi of my router. Alternate is to put laptop on DMZ in case of some really clever malware leaking out of the hypervisor and infecting the host and thus the rest of my internal network Honey Pot VM: ------------------------------ 1) HOSTS FILES: A) redirect Paypal website to Sandbox Paypal website with fake account and fake sums B) 127.0.0.1 for rl.Ammyy.com (favorite remote connection tool from what I read of scammers) 2) Rename/Delete CMD.exe and Syskey.exe and replace with custom fake versions that still look like the real thing but doesn't do anything. Any command entered into CMD.exe will return output of "No virus found, your safe and clean! HOoorayyy". and Syskey will probably say, "Nice try scammer" 3) Load and setup the AMMYY 3.5 metasploit so I can remote control their PC's (if they use AMMYY) 4) Clear EventViewer of all logs. Scammers love pointing to Critical alerts in here to show you have a virus! They'll be so confused when it's empty 5) On desktop as well as Document folders. All kinds of the latest campaigns of malware/ransomware/cryptolocker grabbed from the usual repositories online and renamed as things like "My Passwords" "My Bank account info" "Naked Photos of Girlfriends" etc. Better yet, I imagine there probably is already Word/Excel Docs with malicious macros all ready to go if I find them. Anything to entice them to steal. 6) Use Fake Address Generator site to generate fake CC numbers that will never go through. 7) Figure out how to edit Hyper-V so the "Virtualization" labels do not show up within

3270 days ago12 upvotes

HoneyPot VM After reading /r/scambait I can see a pattern in their script as well as the tools and tricks they use. As such I'm planning on setting up a Honeypot for them to scambait. Please let me know if I'm missing anything or give me some suggestions Setup: Hyper-V running a Windows 7 VM. Both host and VM have VPN's installed (Although I really should do this at the router level) host is a laptop connected to the Guest WiFi of my router. Alternate is to put laptop on DMZ in case of some really clever malware leaking out of the hypervisor and infecting the host and thus the rest of my internal network Honey Pot VM: ------------------------------ 1) HOSTS FILES: A) redirect Paypal website to Sandbox Paypal website with fake account and fake sums B) 127.0.0.1 for rl.Ammyy.com (favorite remote connection tool from what I read of scammers) 2) Rename/Delete CMD.exe and Syskey.exe and replace with custom fake versions that still look like the real thing but doesn't do anything. Any command entered into CMD.exe will return output of "No virus found, your safe and clean! HOoorayyy". and Syskey will probably say, "Nice try scammer" 3) Load and setup the AMMYY 3.5 metasploit so I can remote control their PC's (if they use AMMYY) 4) Clear EventViewer of all logs. Scammers love pointing to Critical alerts in here to show you have a virus! They'll be so confused when it's empty 5) On desktop as well as Document folders. All kinds of the latest campaigns of malware/ransomware/cryptolocker grabbed from the usual repositories online and renamed as things like "My Passwords" "My Bank account info" "Naked Photos of Girlfriends" etc. Better yet, I imagine there probably is already Word/Excel Docs with malicious macros all ready to go if I find them. Anything to entice them to steal. 6) Use Fake Address Generator site to generate fake CC numbers that will never go through. 7) Figure out how to edit Hyper-V so the "Virtualization" labels do not show up within

3270 days ago12 upvotes

HoneyPot VM After reading /r/scambait I can see a pattern in their script as well as the tools and tricks they use. As such I'm planning on setting up a Honeypot for them to scambait. Please let me know if I'm missing anything or give me some suggestions Setup: Hyper-V running a Windows 7 VM. Both host and VM have VPN's installed (Although I really should do this at the router level) host is a laptop connected to the Guest WiFi of my router. Alternate is to put laptop on DMZ in case of some really clever malware leaking out of the hypervisor and infecting the host and thus the rest of my internal network Honey Pot VM: ------------------------------ 1) HOSTS FILES: A) redirect Paypal website to Sandbox Paypal website with fake account and fake sums B) 127.0.0.1 for rl.Ammyy.com (favorite remote connection tool from what I read of scammers) 2) Rename/Delete CMD.exe and Syskey.exe and replace with custom fake versions that still look like the real thing but doesn't do anything. Any command entered into CMD.exe will return output of "No virus found, your safe and clean! HOoorayyy". and Syskey will probably say, "Nice try scammer" 3) Load and setup the AMMYY 3.5 metasploit so I can remote control their PC's (if they use AMMYY) 4) Clear EventViewer of all logs. Scammers love pointing to Critical alerts in here to show you have a virus! They'll be so confused when it's empty 5) On desktop as well as Document folders. All kinds of the latest campaigns of malware/ransomware/cryptolocker grabbed from the usual repositories online and renamed as things like "My Passwords" "My Bank account info" "Naked Photos of Girlfriends" etc. Better yet, I imagine there probably is already Word/Excel Docs with malicious macros all ready to go if I find them. Anything to entice them to steal. 6) Use Fake Address Generator site to generate fake CC numbers that will never go through. 7) Figure out how to edit Hyper-V so the "Virtualization" labels do not show up within

3270 days ago12 upvotes

HoneyPot VM After reading /r/scambait I can see a pattern in their script as well as the tools and tricks they use. As such I'm planning on setting up a Honeypot for them to scambait. Please let me know if I'm missing anything or give me some suggestions Setup: Hyper-V running a Windows 7 VM. Both host and VM have VPN's installed (Although I really should do this at the router level) host is a laptop connected to the Guest WiFi of my router. Alternate is to put laptop on DMZ in case of some really clever malware leaking out of the hypervisor and infecting the host and thus the rest of my internal network Honey Pot VM: ------------------------------ 1) HOSTS FILES: A) redirect Paypal website to Sandbox Paypal website with fake account and fake sums B) 127.0.0.1 for rl.Ammyy.com (favorite remote connection tool from what I read of scammers) 2) Rename/Delete CMD.exe and Syskey.exe and replace with custom fake versions that still look like the real thing but doesn't do anything. Any command entered into CMD.exe will return output of "No virus found, your safe and clean! HOoorayyy". and Syskey will probably say, "Nice try scammer" 3) Load and setup the AMMYY 3.5 metasploit so I can remote control their PC's (if they use AMMYY) 4) Clear EventViewer of all logs. Scammers love pointing to Critical alerts in here to show you have a virus! They'll be so confused when it's empty 5) On desktop as well as Document folders. All kinds of the latest campaigns of malware/ransomware/cryptolocker grabbed from the usual repositories online and renamed as things like "My Passwords" "My Bank account info" "Naked Photos of Girlfriends" etc. Better yet, I imagine there probably is already Word/Excel Docs with malicious macros all ready to go if I find them. Anything to entice them to steal. 6) Use Fake Address Generator site to generate fake CC numbers that will never go through. 7) Figure out how to edit Hyper-V so the "Virtualization" labels do not show up within

3270 days ago12 upvotes

HoneyPot VM After reading /r/scambait I can see a pattern in their script as well as the tools and tricks they use. As such I'm planning on setting up a Honeypot for them to scambait. Please let me know if I'm missing anything or give me some suggestions Setup: Hyper-V running a Windows 7 VM. Both host and VM have VPN's installed (Although I really should do this at the router level) host is a laptop connected to the Guest WiFi of my router. Alternate is to put laptop on DMZ in case of some really clever malware leaking out of the hypervisor and infecting the host and thus the rest of my internal network Honey Pot VM: ------------------------------ 1) HOSTS FILES: A) redirect Paypal website to Sandbox Paypal website with fake account and fake sums B) 127.0.0.1 for rl.Ammyy.com (favorite remote connection tool from what I read of scammers) 2) Rename/Delete CMD.exe and Syskey.exe and replace with custom fake versions that still look like the real thing but doesn't do anything. Any command entered into CMD.exe will return output of "No virus found, your safe and clean! HOoorayyy". and Syskey will probably say, "Nice try scammer" 3) Load and setup the AMMYY 3.5 metasploit so I can remote control their PC's (if they use AMMYY) 4) Clear EventViewer of all logs. Scammers love pointing to Critical alerts in here to show you have a virus! They'll be so confused when it's empty 5) On desktop as well as Document folders. All kinds of the latest campaigns of malware/ransomware/cryptolocker grabbed from the usual repositories online and renamed as things like "My Passwords" "My Bank account info" "Naked Photos of Girlfriends" etc. Better yet, I imagine there probably is already Word/Excel Docs with malicious macros all ready to go if I find them. Anything to entice them to steal. 6) Use Fake Address Generator site to generate fake CC numbers that will never go through. 7) Figure out how to edit Hyper-V so the "Virtualization" labels do not show up within

3270 days ago12 upvotes

HoneyPot VM After reading /r/scambait I can see a pattern in their script as well as the tools and tricks they use. As such I'm planning on setting up a Honeypot for them to scambait. Please let me know if I'm missing anything or give me some suggestions Setup: Hyper-V running a Windows 7 VM. Both host and VM have VPN's installed (Although I really should do this at the router level) host is a laptop connected to the Guest WiFi of my router. Alternate is to put laptop on DMZ in case of some really clever malware leaking out of the hypervisor and infecting the host and thus the rest of my internal network Honey Pot VM: ------------------------------ 1) HOSTS FILES: A) redirect Paypal website to Sandbox Paypal website with fake account and fake sums B) 127.0.0.1 for rl.Ammyy.com (favorite remote connection tool from what I read of scammers) 2) Rename/Delete CMD.exe and Syskey.exe and replace with custom fake versions that still look like the real thing but doesn't do anything. Any command entered into CMD.exe will return output of "No virus found, your safe and clean! HOoorayyy". and Syskey will probably say, "Nice try scammer" 3) Load and setup the AMMYY 3.5 metasploit so I can remote control their PC's (if they use AMMYY) 4) Clear EventViewer of all logs. Scammers love pointing to Critical alerts in here to show you have a virus! They'll be so confused when it's empty 5) On desktop as well as Document folders. All kinds of the latest campaigns of malware/ransomware/cryptolocker grabbed from the usual repositories online and renamed as things like "My Passwords" "My Bank account info" "Naked Photos of Girlfriends" etc. Better yet, I imagine there probably is already Word/Excel Docs with malicious macros all ready to go if I find them. Anything to entice them to steal. 6) Use Fake Address Generator site to generate fake CC numbers that will never go through. 7) Figure out how to edit Hyper-V so the "Virtualization" labels do not show up within

3270 days ago12 upvotes

HoneyPot VM After reading /r/scambait I can see a pattern in their script as well as the tools and tricks they use. As such I'm planning on setting up a Honeypot for them to scambait. Please let me know if I'm missing anything or give me some suggestions Setup: Hyper-V running a Windows 7 VM. Both host and VM have VPN's installed (Although I really should do this at the router level) host is a laptop connected to the Guest WiFi of my router. Alternate is to put laptop on DMZ in case of some really clever malware leaking out of the hypervisor and infecting the host and thus the rest of my internal network Honey Pot VM: ------------------------------ 1) HOSTS FILES: A) redirect Paypal website to Sandbox Paypal website with fake account and fake sums B) 127.0.0.1 for rl.Ammyy.com (favorite remote connection tool from what I read of scammers) 2) Rename/Delete CMD.exe and Syskey.exe and replace with custom fake versions that still look like the real thing but doesn't do anything. Any command entered into CMD.exe will return output of "No virus found, your safe and clean! HOoorayyy". and Syskey will probably say, "Nice try scammer" 3) Load and setup the AMMYY 3.5 metasploit so I can remote control their PC's (if they use AMMYY) 4) Clear EventViewer of all logs. Scammers love pointing to Critical alerts in here to show you have a virus! They'll be so confused when it's empty 5) On desktop as well as Document folders. All kinds of the latest campaigns of malware/ransomware/cryptolocker grabbed from the usual repositories online and renamed as things like "My Passwords" "My Bank account info" "Naked Photos of Girlfriends" etc. Better yet, I imagine there probably is already Word/Excel Docs with malicious macros all ready to go if I find them. Anything to entice them to steal. 6) Use Fake Address Generator site to generate fake CC numbers that will never go through. 7) Figure out how to edit Hyper-V so the "Virtualization" labels do not show up within

3270 days ago12 upvotes

Share Your Experience

What's Your Exposure?

Know your risk exposure to this message with a Thorough Analysis. It returns a detailed report covering the complaint history, your data breach exposure, related scam entities, and risk signals tied to this email message. Check the box and enter your email address now.

NordVPN Block threats and hide your IP from trackers

NordVPN encrypts your internet traffic and blocks malicious websites, ads, and trackers before they reach your device.