https://coinspot-desktop.calivaro.org/rgpae?utm_campaign=03.03+%2F+AU+%2F+213.1+%2F+FS+329+%2F+%234&utm_content=03.03+%2F+AU+%2F+213.1+%2F+FS+329+%2F+%231&cid=03.03+%2F+AU+%2F+213.1+%2F+FS+329+%2F+%231+%E2%80%94+5&fbid=900841959001305&utm_medium=paid&utm_source=fb&utm_id=120241752010530023&utm_term=120241752010580023
172.67.130.245 · Cloudflare, Inc.
Toronto, Canada
26 days
200 · 75.2s
Valid· WE1, Google Trust Services, US
COMPLETED
Registered-domain escalation
Submit calivaro.org as the primary IOC, enriched with evidence from hostile subdomains like coinspot-desktop.calivaro.org.
No KB/IOK detections were recorded for this scan.
finance | cryptocurrency | technology | ecommerce · 4/5/2026
The page at coinspot-desktop.calivaro.org is impersonating CoinSpot. The domain name itself includes the CoinSpot brand, and the HTML source shows a SPA-like interface with multiple image assets and scripts, likely to render a credential collection UI. Visual evidence from the screenshot indicates branding cues similar to CoinSpot, while the domain is newly registered and hosted behind Cloudflare, suggesting a typosquat/brand spoofing operation intended to harvest credentials or data.
This site is a high-risk credential-phishing attempt. The domain name explicitly embeds a known brand (CoinSpot), and the page appears to render a CoinSpot-like interface via JavaScript assets without static forms in the initial HTML, indicating a likely SPA designed to collect user credentials. The SSL certificate is issued to calivaro.org, with the real CoinSpot branding only inferred from the domain and page content, which strongly suggests impersonation. The domain age is very young (26 days), and multiple POSTs to a rum endpoint suggest beaconing or data exfiltration attempts. The WAF/CDN blocks are not explicitly confirmed, but the presence of Cloudflare-hosted resources and a large number of network calls are consistent with modern credential-grabbing clones. Immediate action is warranted to suspend the domain and block hosting, and to report to certificate authorities if needed.
Monitor