Domain Due Diligence
Report for Androeed.store
Why we think so
Androeed.store is a high-traffic site (≈3.5M monthly visits) that distributes Android APK mods and premium game builds. Technical signals are mixed: the site uses HTTPS and CloudFlare, but WHOIS is privacy-protected via a Russian registrar and hosting (TimeWeb/REG.RU). Automated reputation checks are also mixed — many scanners mark it as likely legitimate, while some services flag a high-risk score. There are no Google Safe Browsing or crypto-blacklist hits, but the site’s content (modded APKs) and anonymous registration raise real risk for malware or copyright issues. Verdict: treat as suspicious — don’t install APKs or enter payment details without extra verification.
Risk Insights
High usage but risky content
Anonymous registration
No immediate blacklist hits
Contradictory Signals
Large audience could indicate a popular but risky distribution hub (widely used does not equal safe for executable files).
Signal A: Very high traffic and engagement (positive signal for legitimacy)
Signal B: Anonymous WHOIS + APK mod distribution (negative signal for safety)
Category Scores
Red Flags & Warnings
-
Offers modded/hacked APKs — common vector for malware and copyright infringement.
-
Registrant information is privacy-protected through regprivate.ru; no verifiable company contact in WHOIS.
-
No clear business email addresses scraped from the site; only social links and a single numeric phone entry.
-
DMARC set to p=none and SPF is permissive (~all), which weakens email authenticity protections.
-
Third‑party reputation sources are inconsistent: several give decent trust scores but at least one flags the site as high-risk.
🔎 Detailed Checks & Analysis
Content type check (APK/mod distribution)
Content type check (APK/mod distribution)
"Sites offering cracked or modded Android packages commonly bundle trojans, adware, or require sideloading—activities that raise infection risk; treat downloads as untrusted unless scanned and tested in a sandbox."
Reason: The site openly distributes modded APKs and hacked/premium game builds, which increases malware and copyright risk.
Traffic and engagement
Traffic and engagement
"High traffic can indicate legitimate popularity or a widely circulated mirror; popularity alone does not prove safety for executable content like APKs."
Reason: High traffic (~3.5M monthly visits) and multi-page engagement suggest a broadly used distribution site.
WHOIS / registrar / age
WHOIS / registrar / age
"Age (since 2022) is not extremely new, but the absence of public registrant details reduces identity confidence; Russian registrar/hosting is common for content distribution sites but adds jurisdictional opacity."
Reason: Domain registered in 2022 but uses privacy protection through regprivate.ru and REG.RU registrar, limiting owner traceability.
SSL / TLS status
SSL / TLS status
"HTTPS confirms transport encryption but does not guarantee content safety or legitimacy of downloads."
Reason: Valid SSL certificate in place and HTTPS used sitewide.
Email / contact verification
Email / contact verification
"Reliable merchant sites usually provide verifiable contact email, address, and customer support channels; absence reduces trust."
Reason: No clear business email addresses were scraped; only social links and a numeric phone entry were found.
Blacklist / malware scanner checks
Blacklist / malware scanner checks
"Absence from major blacklists lowers immediate phishing/malware suspicion, but new malware can appear after these scans run."
Reason: No matches on Google Safe Browsing and not flagged on crypto scam lists.
Trademark / brand impersonation
Trademark / brand impersonation
"No US trademark hits do not guarantee absence of infringement; content (modded apps) may still violate third-party copyrights."
Reason: No USPTO trademark records found for the exact domain/brand, so no documented US-brand impersonation.
Third-party reputation consensus
Third-party reputation consensus
"Automated reputation scores differ; when aggregators disagree, lean on direct identity signals and content risk for decision-making."
Reason: Reputation sources are mixed: several scanners yield decent trust, but at least one flags the site as high-risk.
Your Next Steps
-
1Do not download or install APK files from this site on devices with sensitive data; use a sandbox or throwaway device if you must test.
-
2If you need an app, prefer the official Google Play Store or verified vendor websites and compare checksums when available.
-
3Avoid entering payment or personal data on androeed.store until you can verify the publisher (email + publicly verifiable company info).
-
4Scan any downloaded APKs with multiple reputable malware scanners (VirusTotal or similar) before installing.
-
5Report suspicious or malicious files to Google Play Protect and to your AV vendor if you encounter malware.
Evidence & Citations
-
SimilarTech profile — androeed.store (tech & category, monthly visits)
SimilarTech reports the site as a games/mods distribution with ~3.5M monthly visits and lists technologies (CloudFlare, nginx) and language hints (Russian).
-
SimilarWeb site analytics — androeed.store (traffic, geography, engagement)
SimilarWeb shows detailed traffic (≈3.5M visits, top countries include US and Germany), pages/visit ≈3.0 and bounce ~53% (snapshot dated 2025-09-01).
-
WHOIS / DNS / SSL lookup for androeed.store
WHOIS shows registration via REG.RU, creation 2022-03-12, privacy-protected registrant email (regprivate), TXT records include SPF and DMARC p=none; SSL valid (expires 2025-12-09).
-
Aggregated reputation and manual scans summary
Perplexity-style reputation checks show mixed results: several scanners mark the site as likely safe, while some services (e.g., EvenInsight) give a strong avoid/worst-safety warning; no clear user-reported monetary loss found in indexed results.
🕵🏻 Keep investigating
Run another instant due diligence scan on any website URL. Verify before you trust!
Phishing crews spin up carbon-copy login portals for CRM and finance tools, siphoning credentials before users realize t...
Read playbook →Giveaway pages entice with consoles or flights, then harvest card data and selfies “for verification.” ScamAI checks reg...
Read playbook →