# PhishDestroy threat dossier — solana.claim-us.com ================================================================ Fetched: 2026-04-21 15:40:40 UTC Canonical: https://phishdestroy.io/domain/solana.claim-us.com/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Crypto Drainer Targeted brand: Solana Wallet drainer: Solana Drainer ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 1/95 security vendors flagged this domain Flagging vendors: Ermes URLQuery: 2 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 188.114.97.3 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: CloudFlare, Inc. Registrar: NameSilo, LLC !!! REGISTRAR INTEGRITY ALERT — NameSilo !!! NameSilo is a registrar documented by PhishDestroy as (1) publicly lying about received abuse reports, (2) shielding a $20M+ Monero-theft operation (xmrwallet.com) for 10 continuous years, and (3) retaliating against PhishDestroy by getting our X/Twitter account @Phish_Destroy banned after we published the evidence. Researchers/victims must ALWAYS CC compliance@icann.org on every abuse ticket — NameSilo has a track record of later claiming reports were never received. Primary sources: https://phishdestroy.io/namesilo-killed-our-twitter https://phishdestroy.io/xmrwallet-namesilo-exposed Nameservers: jerry.ns.cloudflare.com, kim.ns.cloudflare.com Registered: 2026-02-14 Page title: $SOL - Claim Airdrop HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-07-13 Status: INVALID chain Fingerprint: 6132d0c35c5f01f840388fe4bf9864972183ba123fd605e5bb0e124c170f193e Subject Alternative Names (related infrastructure — often same operator): - claim-us.com ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-02-14 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-21 09:23:14 UTC (by PhishDestroy tracker) First reported: 2026-04-21 06:24:07 UTC (abuse notice filed) Last verified: 2026-04-21 17:35:40 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019daeb3-2f27-751c-beca-85b4648d3f3e/ URLQuery: https://urlquery.net/report/e2163f22-1acb-4a76-9c1b-20d2694eba7b Wayback Machine: https://web.archive.org/web/*/solana.claim-us.com crt.sh CT logs: https://crt.sh/?q=%25.solana.claim-us.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=solana.claim-us.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/solana.claim-us.com URLhaus: https://urlhaus.abuse.ch/host/solana.claim-us.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-21 09:23:59 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] Domain solana.claim-us.com is an active crypto-draining campaign impersonating Solana, utilizing the Solana Drainer kit to deceive victims into surrendering crypto assets. PhishDestroy identifies this domain as a high-risk threat, leveraging brand recognition to trick users into connecting wallets or entering credentials on a fraudulent landing page. The infrastructure is designed to drain funds directly from compromised Solana wallets, posing immediate financial risk to any user who interacts with it. This domain exhibits multiple technical indicators confirming its malicious intent. PhishDestroy analysis reveals the domain was registered through NameSilo, LLC on February 14, 2026, and resolves to IP address 188.114.97.3. Security vendor detection remains critically low, with just 1 out of 95 engines on VirusTotal flagging the domain. Despite this, the domain holds a valid SSL certificate issued by Google Trust Services, which may falsely imply legitimacy to uninformed users. The drainer kit deployed is specifically designed for Solana ecosystems, reinforcing the targeting of Solana users. As of this investigation, the domain remains active and continues to operate without widespread blocklisting. PhishDestroy has flagged this domain and added it to its threat intelligence database for user protection. Immediate action is recommended to block network access to 188.114.97.3 and avoid solana.claim-us.com entirely. While the low detection score suggests evasion tactics, the presence of a functional drainer kit and brand impersonation elevates the risk to high. Users are urged to verify domains through trusted sources such as PhishDestroy before any wallet interaction. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260421-F41DFE TLS cert SHA-256: 6132d0c35c5f01f840388fe4bf9864972183ba123fd605e5bb0e124c170f193e ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/solana.claim-us.com/ JSON API: https://api.destroy.tools/v1/check?domain=solana.claim-us.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io