Scam Detective
Phone Number

602-672-7557

Last reported Apr 21, 2026

Low Activity
  • 2 community reports from users

Campaign Intelligence

This cluster centers on 2451 connected domains tagged as GuLoader, NorthKorea, trojan. The domains include cdn.discordapp.com, 91.92.241.152, 91.92.240.222, 158.94.208.174, 178.16.52.44, 158.94.211.102, 158.94.210.93, 158.94.208.52, i.postimg.cc, s3.us-east-2.amazonaws.com, storage.googleapis.com, 178.16.52.18, 158.94.211.101, 158.94.211.100, local-host.life, dropmefiles.com, limewire.com, 62.60.226.159, id8965.com, valfanto.com and 2431 more. 633 of these domains have been flagged by threat int...

This cluster centers on 1486 connected domains tagged as AgentTesla, None, js. The domains include i.postimg.cc, cdn.discordapp.com, s3.us-east-2.amazonaws.com, pastes.io, dl.dropboxusercontent.com, ltcexchange.bitparking.com, bitcoin.sipa.be, litecoinpool.org, cryptocoincharts.com, sigaintevyh2rzvw.onion, toremail.net, lelantos.org, www.sigaint.org, epjhlyfgxenf2q4o.onion~~, inocncymyac2mufx.onion, torbox3uiot6wchz.onion, 344c6kbnjnljjzlz.onion, mailtor.net, bscscan.com, securitized.io and 1466...

This cluster centers on 2957 connected domains tagged as GuLoader, NorthKorea, censys. The domains include salelegalsteroids.com, 192.210.186.208, gharnt.com, cloflart.com, id3702579photo-image-docs.com, www.almacensantangel.com, 64.95.12.162, blue-oceans.net, sixmexicos.com, baritonclick.online, 185.252.24.15, un1rw11q4u.com, ameyiando.com, niril.sbs, bursaelektriktamir.com, blankeyeo.com, umxtxhub.za.com, sunchernical.com, 18.194.67.137, servecdn.my and 2937 more. 606 of these domains have bee...

This cluster centers on 2107 connected domains tagged as GuLoader, NorthKorea, censys. The domains include storage.googleapis.com, cdn.discordapp.com, pastes.io, s3.us-east-2.amazonaws.com, dl.dropboxusercontent.com, 188.137.230.45, touchskins.io, 158.94.208.7, 74.0.32.149, 74.0.32.141, api.touchskins.io, 80.89.237.190, 188.137.254.207, api.wewpwsw.su, 188.137.229.136, 196.251.107.24, 104.194.152.180, link.storjshare.io, s3.g.s4.mega.io, 62.60.226.159 and 2087 more. 562 of these domains have bee...

This cluster centers on 2121 connected domains tagged as GuLoader, NorthKorea, censys. The domains include 59.182.90.199, 178.50.166.61, 113.168.249.76, 123.209.193.86, 113.165.6.38, 120.157.72.234, 171.235.194.253, 120.157.159.171, 37.142.77.163, 46.124.33.133, 46.124.40.3, 83.224.151.243, 88.86.246.233, 41.146.1.154, 59.182.119.128, 14.236.247.68, 120.157.72.59, 95.127.248.192, 116.110.179.199, cdn.discordapp.com and 2101 more. 576 of these domains have been flagged by threat intelligence feed...

This cluster centers on 1630 connected domains tagged as BABADEDA, pw-2026, wsh. The domains include storage.googleapis.com, cdn.discordapp.com, implementing-theft-metal-justin.trycloudflare.com, staying-heavily-meaning-blowing.trycloudflare.com, creations-venture-traditional-stainless.trycloudflare.com, arilprivate.storexyz.web.id, 206.123.145.26, 103.125.219.204, 45.87.43.154, 10cricofficial.com, justwatch.life, 195.16.44.75, advise-visual-playstation-closer.trycloudflare.com, 91.92.241.197, 6...

This cluster centers on 2141 connected domains tagged as GuLoader, NorthKorea, censys. The domains include 59.182.90.199, 91.80.129.100, 123.28.175.23, 120.61.247.2, 178.50.166.61, 113.168.249.76, 123.209.193.86, 113.165.6.38, 120.157.72.234, 171.235.194.253, 120.157.159.171, 37.142.77.163, 171.241.208.124, 120.157.229.220, 171.117.30.233, 91.80.136.9, 46.124.33.133, 46.124.40.3, 83.224.151.243, 88.86.246.233 and 2121 more. 596 of these domains have been flagged by threat intelligence feeds incl...

This cluster centers on 2559 connected domains tagged as GuLoader, NorthKorea, trojan. The domains include 83.224.148.34, 14.236.247.68, 120.157.72.59, 95.127.248.192, 116.110.179.199, 116.101.73.68, 95.127.250.241, 152.173.199.182, 91.80.129.100, 59.88.45.188, 117.216.5.20, 182.60.11.164, 41.146.14.165, 120.157.46.38, 59.182.90.199, 113.168.249.76, 78.132.114.25, 171.241.208.124, 120.157.229.220, 14.236.84.25 and 2539 more. 640 of these domains have been flagged by threat intelligence feeds inc...

Details

First Seen
2/22/2026
Last Reported
4/21/2026
Area Code
602

Linked Company Activity

EQUIFAX, INC.
1 BBB complaint · Credit Cards] [Business: Equifax Impersonator] [Location: MD, USA- 21207]
TRANSUNION INTERMEDIATE HOLDINGS, INC.
4 BBB complaints · Phishing] [Business: TransUnion Imposter Sc
JPMORGAN CHASE & CO.
16 BBB complaints
CITIBANK, N.A.
23 BBB complaints
SELECT PORTFOLIO SERVICING, INC.
1 BBB complaint · Advance Fee Loan] [Business: Said they were from Select Portfolio Servicing] [Location:
WELLS FARGO & COMPANY
205 BBB complaints

Connected Entities

Community Reports

New (to me) phishing attempt Got a new to me phishing attempt. What do you all think? Spear-phishing or just more effort than I'm used to seeing? It started with a strange email: >Greetings I am David. Joaqun from PESHGLOBAL TRADING COMPANY, LLC. We will like to inquire about your product(Woodpulp for wipes,paper sheeter) Could you please provide information? 1. MOQ and FOB price 2. What is your price + shipping cost for Sample with and without OEM Sample? 3. Payment terms (We prefer 30% Deposit and Balance before shipment) 4. Do you have complete catalogue/price list? pls you can send them to me by return email Waiting for your reply, Best Regards David.Joaqun International Department Chief Engineer Estimation Purchase & Procurement Department. Head Office 1232 Dogwood Road, Phoenix, Arizona, United States. Mob: +16026727557 Email: David.Joaqun@yandex.com Skype: David235 Branch Office PO Box 1826, Salwa Road. Opposite Quality Hyper, Doha Qatar Email: David.Joaqun@yandex.com Tel: (00974) 48022013 Business Hours: 9: 00 am to 12:00 pm, 4:30 pm to 9.30 pm (Saturdays to Thursdays); 4:30 pm to 9:30 pm (Fridays) Now there are several things wrong here: * Free Russian email address, yet claims to be in headquartered in the USA. * Bad formatting * Mentions Qatar for some reason * We don't sell woodpulp. * A google maps search on their headquarters address turned up no match. By itself definitely at least a yellow flag. A google search on some key phrases on this didn't turn up any matches, so whatever this is - I didn't know then the intent - it's not a spray and pray attempt. Curious about the goal since there was no attachment or even link, I created a email address on another domain to reply to get more info about the goal. Sure enough I got a rather long reply. In that reply was a link to their website. When I clicked the link in my sandbox (after altering "my" embedded email address slightly to see how filtered it was), I got a [phishing page](https://reddit-upl

2940 days ago1 upvote

New (to me) phishing attempt Got a new to me phishing attempt. What do you all think? Spear-phishing or just more effort than I'm used to seeing? It started with a strange email: >Greetings I am David. Joaqun from PESHGLOBAL TRADING COMPANY, LLC. We will like to inquire about your product(Woodpulp for wipes,paper sheeter) Could you please provide information? 1. MOQ and FOB price 2. What is your price + shipping cost for Sample with and without OEM Sample? 3. Payment terms (We prefer 30% Deposit and Balance before shipment) 4. Do you have complete catalogue/price list? pls you can send them to me by return email Waiting for your reply, Best Regards David.Joaqun International Department Chief Engineer Estimation Purchase & Procurement Department. Head Office 1232 Dogwood Road, Phoenix, Arizona, United States. Mob: +16026727557 Email: David.Joaqun@yandex.com Skype: David235 Branch Office PO Box 1826, Salwa Road. Opposite Quality Hyper, Doha Qatar Email: David.Joaqun@yandex.com Tel: (00974) 48022013 Business Hours: 9: 00 am to 12:00 pm, 4:30 pm to 9.30 pm (Saturdays to Thursdays); 4:30 pm to 9:30 pm (Fridays) Now there are several things wrong here: * Free Russian email address, yet claims to be in headquartered in the USA. * Bad formatting * Mentions Qatar for some reason * We don't sell woodpulp. * A google maps search on their headquarters address turned up no match. By itself definitely at least a yellow flag. A google search on some key phrases on this didn't turn up any matches, so whatever this is - I didn't know then the intent - it's not a spray and pray attempt. Curious about the goal since there was no attachment or even link, I created a email address on another domain to reply to get more info about the goal. Sure enough I got a rather long reply. In that reply was a link to their website. When I clicked the link in my sandbox (after altering "my" embedded email address slightly to see how filtered it was), I got a [phishing page](https://reddit-upl

2940 days ago1 upvote

Share Your Experience

What's Your Exposure?

Know your risk exposure to this message with a Thorough Analysis. It returns a detailed report covering the complaint history, your data breach exposure, related scam entities, and risk signals tied to this email message. Check the box and enter your email address now.