Round 3 — April 20, 2026

April 2026 Round 3 Investigation: Global #3 Worst Registrar, UK Shell Company Proof & Connected Ecosystem

PhishDestroy's analysis of 342 million domains across 104 registrars ranks UltaHost as the #3 highest-risk registrar in the world. UK Companies House records prove the shell company structure. This is the most comprehensive evidence compilation to date.

1. UltaHost is Ranked #3 Worst Registrar Globally

PhishDestroy Registrar Risk Statistics — analyzing 342 million domains across 104 registrars

#3
Highest-Risk Registrar in the World
Risk Score: 68/100

Only two registrars scored worse:

#1
DomainRegistry.com LLC
70/100
#2
Eranet International
68/100 (worse secondary metrics)
#3
Ultahost, Inc.
68/100

UltaHost ranks WORSE than:

  • • Nicnames (#5 — 60/100)
  • • Unstoppable Domains (#6 — 53/100)
  • • NiceNIC (#7 — 53/100, the registrar PhishDestroy already called “powering global cybercrime”)
  • • Dynadot, Cloudflare, Namecheap, GoDaddy — all scored dramatically better

UltaHost Risk Breakdown

56%
Domains Lacking Active IP
abuse indicator — throwaway phishing
75.2%
Registered for Only 1 Year
transient criminal use
5.2%
Domains with WHOIS Email
accountability failure
33,427
Total Domains Analyzed
for this registrar

Top countries: Germany (3,175), US (2,552), Czechia (801), Singapore (633), Canada (540)

This is the single most damning independent data point: a cybersecurity organization that analyzes every major registrar on earth places UltaHost in the top 3 worst of 104 analyzed.

Source: phishdestroy.io/registrar-stats/

2. UK Shell Company Proof — Definitively Links UltaHost to Turkey

ULTAHOST LTD, UK Companies House Company No. 14567126

This publicly verifiable UK government record conclusively proves the HostScore reviewer's claim that UltaHost is “Turkish people with scam companies pretend names in the UK and US stealing money”:

Registered Office:71-75 Shelton Street, Covent Garden, London WC2H 9JQ — a mass-registration shell company address used by thousands of entities
Incorporated:3 January 2023
Sole Director AND Secretary:Elin Doughous (also spelled Doughouz) — one person filling both roles (textbook shell-company structure)
Nationality:Turkish
Country of Residence:Turkey
Personal Address:Topcular Mah. Gazanfer Bilge Bul, Tuana 3 Sitesi B Blok No: 172b Ic Kapi No: 15, Izmit, Kocaeli, Turkey
Share Capital:Only £10,000 (minimal)
Ownership of Shares:75% or more
Voting Rights:75% or more
Right to Appoint/Remove Directors:Yes

This means the entire multimillion-dollar UltaHost operation's UK arm is a one-person shell with £10,000 in capital, directed from a Turkish apartment, wholly controlled by a single individual.

Combined with the Delaware “registered agent” address (651 N Broad St Suite 206 — a mass-corporate-services address) and the confirmed Turkish phone number (+90 555 000 0111), this fully proves UltaHost is operationally Turkish while using US and UK shell structures for legitimacy.

3. Elin Doughouz — Multiple Aliases & Russian Birthplace

Crunchbase and ZoomInfo data reveal significant obscured-identity details:

Full Legal NameElin Ander Doughouz
Known AliasesAllen Doughouz, Elin Doughous, Elin Doughouz
Date of BirthJanuary 1, 1992
Place of BirthNalchik, southwestern Russia (Circassian ethnicity)
EducationYeditepe University, Turkey
Brother (CTO)Deen Doughouz, based in the United Arab Emirates

Multiple publicly used aliases combined with a shell-company UK entity, a registered-agent Delaware address, and a Turkish home address constitutes a clear pattern of identity and jurisdictional obfuscation.

4. UltaHost Runs Its Own Autonomous System — 49,239 Domains Hosted

ASN: AS214036 (ULTAHOST-AS) — assigned by RIPE NCC on October 15, 2024.

49,239
Domain Names Hosted
5,553
IP Addresses
7
Upstream Carriers
8
BGP Peers

CRITICAL:BGP.HE.net reports “AS214036 announces bogons” — bogons are invalid/unassigned IP ranges that legitimate networks should never advertise. Announcing bogons is a network hygiene failure strongly associated with spam-friendly and abuse-friendly infrastructure providers.

German IP range 84.200.154.0/24 via First Colo GmbH (Frankfurt) — abuse contact [email protected], confirming the Frankfurt operation despite the Delaware paper address.

5. WoWonder Backdoor Scandal — Connected Scam Operation

The Doughouz brothers don't just run UltaHost. They've been running what appears to be a coordinated scheme across multiple products. Their CodeCanyon brand “DoughouzForest” (9,982 purchases across 6 products) sells PHP scripts that cybersecurity professionals publicly accuse of containing backdoors.

Scam site. It has backdoors, and creates automatic accounts on the site to publish ads after you purchase it for a period of time.

— WoWonder Trustpilot review

These scammers have a back door in their script and hacked my site repeatedly blaming it on my host trying to get me to pay them money to use their host. TOTAL SCAMMERS! Any script with back doors is not secure! ... They cost me millions of dollars as they injected viruses in hundreds of my sites on my server.

— WoWonder Trustpilot review

I am associated with cyber security and w9wonder [sic] guys have developed really good script I can say but on other side what they have done is created and left backdoors in script means they can access your service anytime without your permission.

— WoWonder Trustpilot review

The Chain-of-Harm Pattern

  1. 1.Customer buys WoWonder script from DoughouzForest
  2. 2.Alleged backdoors allow unauthorized access
  3. 3.Site gets hacked
  4. 4.Scammer blames the customer's hosting provider
  5. 5.Customer gets upsold UltaHost as the "secure solution"
  6. 6.UltaHost then proceeds to provide the poor support documented in our existing evidence

The DoughouzDark account on CodeCanyon adds even more products. This is not an isolated hosting company — it's a connected ecosystem of alleged frauds run by the same brothers.

6. Hosting Industry Openly Categorizes UltaHost as “Bulletproof Hosting”

HostAdvice — a mainstream hosting-review directory — now explicitly lists UltaHost in their “Best Bulletproof Hosting Services by Reddit (Jan 2026)” guide:

“Ultahost is renowned for offering robust hosting services that ensure maximum uptime and security. Catering to clients who require high levels of anonymity and protection from DDoS attacks, Ultahost provides an excellent solution for businesses and individuals needing resilient and secure hosting.”

“Ultahost also offers flexible payment options, including cryptocurrencies, which add an extra layer of privacy for clients.”

— HostAdvice

The industry is openly marketing UltaHost to the very demographic that buys bulletproof hosting — those needing to hide identity and evade takedowns.

Source: hostadvice.com/bulletproof-hosting/reddit/

7. Criminal Domains Hosted/Registered by UltaHost

PhishDestroy's database contains 728 flagged UltaHost-registered phishing domains. Categorized sample showing the breadth of criminal operations:

Bank Impersonation Phishing

ubsnovus.com
VT 19
firstmidwestsbank.com
VT 16
webchasesavings.com
LiveVT 12
zelvionbank.com
VT 10
bcvbk.com
LiveVT 9
luzicbank.com
VT 9
precredunion.com
VT 8
virtabanks.net
LiveVT 8
fnbux.com
LiveVT 7
versatilebk.com
LiveVT 7
equityccu.com
LiveVT 6
irongatebank.com
veltraxbank.com
clearhavenb.com
creditvaultonline.com
puretrustonline.com
cremebank.com
venturebankcorp.com

Web3/Crypto Wallet Phishing (Wallet Drainer Sites)

metamaskusdt.com
VT 16
trezor.io-suite.org
VT 16
tether-claim.com
VT 11
trustwalletconnect.net
VT 10
secureauthweb3.net
VT 9
web3userauthentication.com
VT 9
web3userauthorization.com
VT 9
trustfbk.com
VT 9
customerweb3auth.net
VT 8
userweb3authenticate.com
VT 8
vortewallet.com
LiveVT 8
shieldweb3ledge.com
LiveVT 7
authsecureuser.net
LiveVT 6
rabbysecuredapp.com
trustwallcard.com
ledger-protect.xyz

Airdrop Scams (Fake Crypto Giveaways)

monadairdrops.xyz
Live
raylsairdrop.xyz
Live
zentryairdrop.xyz
Live
zkverifyairdrop.xyz
Live
d3airdrop.xyz
Live
archnetworkairdrop.xyz
Live
billionsairdrop.xyz
Live
abstractairdrops.xyz
fogoairdrop.xyz
gaiaairdrop.xyz
onefootballclubairdrop.xyz
polymarketairdrop.xyz
exabitsairdrop.xyz
humanpassportairdrop.xyz
adixairdrop.xyz
aprioriairdrop.xyz
endlessprotocolairdrop.xyz
fluentairdrop.xyz
chainversedrop.com

Token Presale Scams (Fake ICO Infrastructure)

kalshipresale.xyz
Live
edgenpresale.xyz
Live
rialotoken.xyz
Live
momentumpresale.xyz
alignedpresale.xyz
katanapresale.xyz
tabitoken.xyz
kiteaitoken.xyz
altiustoken.xyz

Investment Fraud / Trading Scams (Pig Butchering Infrastructure)

valoreal-capital.com
LiveVT 9
based-investment.com
VT 8
hudsondigitalcorporation.com
LiveVT 8
tenderlytradepro.com
VT 8
wealthtech-global.com
LiveVT 7
eurobit-international.com
LiveVT 7
bluetradesunionltd.com
VT 7
efxtrustforge.com
VT 7
fourpinesinvest.com
VT 6
bitcoretrade.com
LiveVT 6
pivotallife-investhub.com
capital-growsthenergy.com
metrocapitalpro.com
doubledoorcapital.com
granddominiontrust.org
interassetb.com
bluexvest.com
capitalflowonline.com
3capitalstrading.com
apexcoremarkets.net
digitaltrade-markets.com
fxipro.com
truvestapay.com

Trading Platform Fraud

elontrade-firm.com
Live
foxminingwayoption.com
Live
bara-ai.com
Live
24robinhoodtradingoption.com
fxultratradepro.com
groveroption.com
apexcopy-ai.com

Government Impersonation Fraud

maxdeptgov.com
masdeptgov.com
jandhanyojna.org
eamaar-properties.com

Meeting Phishing & Generic Scam Infrastructure

zooming-meeting-invite.online
VT 7
securemeetinvite.com
support-advertisiespollcy.com
globalradisson.com
buypassportsglobal.com
claim-provex.info
provex-app.com
outingyourself.com
izom.net
Carding / Fullz Infrastructure: The existing site mentions peeslow.group (counterfeit Euro banknotes). PhishDestroy data shows similar carding/money-laundering infrastructure also flows through UltaHost — the 728 total is only the phishing subset; carding forums and data-sale sites comprise a separate and larger category.

8. Updated Phishing Statistics

PhishDestroy data as of April 18, 2026:

Total flagged phishing domains728
Formal abuse reports sent433
Still alive245 (33.7%)
Taken down452
Active after report57–58%
VirusTotal confirmation98.4%
Domains with VT ≥ 5293

Wallet Drainer Malware (system-wide counts)

Angel Drainer (4,379)Solana Drainer (2,121)Wallet Connect Abuse (1,668)Ice Phishing (42)Inferno Drainer (41)MS Drainer (1+)Pink Drainer (1+)Venom Drainer (1+)

Brands Most Impersonated (system-wide)

Base (6,586)Ledger (4,574)Coinbase (3,231)Across (2,847)Solana (2,421)Kraken (2,223)Google (1,832)Ethereum (1,746)OKX (1,562)MetaMask (1,435)Trezor (1,369)Aave (1,136)Binance (1,048)SushiSwap (1,023)Facebook (866)Trust Wallet (820)Bitcoin (783)WalletConnect (747)

Scam Categories

3,845
Gambler Scam
488
Airdrop Scam
75
Token Presale
24
Giveaway Scam
10
Recovery Scam
6
Verification Scam
4
Staking Scam
3
NFT Mint

9. The “Registrar Liability” Legal Angle

PhishDestroy's investigation “When Abuse Reports Go Nowhere” establishes a powerful legal principle directly applicable to UltaHost:

“Once the registrar receives the report, they are no longer ignorant. They have been informed, with evidence, that a domain under their control is being used to steal money, credentials, and identities. From that moment, continued inaction is not negligence — it is a conscious decision to allow harm.”

“Is the registrar willing to accept liability for every dollar stolen through a domain they were warned about? Is the registrar prepared to compensate victims who lost funds after the abuse report was filed and ignored?”

PhishDestroy's public destroylist (hosted on GitHub) creates a timestamped public record — the exact moment UltaHost was notified of each malicious domain is now part of the public court record for any future victim lawsuit.

Source: github.com/phishdestroy/destroylist

10. The Upstream Carriers Enabling UltaHost

Seven networks provide upstream connectivity to UltaHost's AS214036. These companies could cut off UltaHost tomorrow:

AS6206 — Netrouting B.V. (Netherlands)
AS49127 — Asimo Networks B.V. (Netherlands)
AS48678 (small European carrier)
Plus 4 other upstreams (visible at bgp.tools/as/214036)

The Dutch carriers Netrouting and Asimo Networks, plus Frankfurt's First Colo GmbH (handling the 84.200.154.0/24 IP block), form the backbone of UltaHost's actual physical infrastructure. Pressuring these upstream carriers is a concrete leverage point because they can face their own abuse complaints for knowingly routing traffic from a PhishDestroy-confirmed #3 worst registrar.

Source: bgp.tools/as/214036

11. Action Steps & Leverage Points

UK Companies House Complaint

ULTAHOST LTD is a £10,000 shell with a Turkish resident director running a multimillion-dollar fraud-enabling operation. UK anti-money-laundering and shell company regulations may apply.

HMRC / UK Tax Scrutiny

The UK company's actual revenue reality vs. £10,000 capital filing may warrant scrutiny.

RIPE NCC Complaint

AS214036 'announces bogons,' a network-hygiene violation of RIPE policy.

Upstream Carrier Complaints

Netrouting B.V. and Asimo Networks B.V. in the Netherlands can be directly pressured via their own abuse channels.

First Colo GmbH (Frankfurt) Abuse

Handles the 84.200.154.0/24 IP block. Directly addressable at [email protected].

Envato / CodeCanyon Abuse Report

DoughouzForest's 9,982-purchase account with documented backdoor allegations should face Envato scrutiny.

Turkish Authorities

A Turkish resident running UK and US shell companies to deliver services that Turkey's own authorities may find concerning.

PhishDestroy Cross-Reference

UltaHost is in the same category as NiceNIC and NameSilo (both PhishDestroy-exposed). An equivalent UltaHost-specific deep-dive is the logical next escalation.

12. Complete Source List — Round 3

Compiled April 20, 2026. All information publicly sourced for accountability journalism purposes.