# PhishDestroy threat dossier — solboost.fun ================================================================ Fetched: 2026-04-23 02:33:04 UTC Canonical: https://phishdestroy.io/domain/solboost.fun/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 86/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Solana ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 1/94 security vendors flagged this domain URLQuery: 1 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 63.176.8.218 (DE, Frankfurt am Main) ASN: AS16509 Amazon.com, Inc. Hosting org: AWS EC2 (eu-central-1) Registrar: GoDaddy.com, LLC Nameservers: dns1.p01.nsone.net, dns2.p01.nsone.net, dns3.p01.nsone.net, dns4.p01.nsone.net Registered: 2026-02-15 Page title: SolBoost — #1 Solana Volume Bot | Boost Token Volume & Market Making ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E8 Expires: 2026-05-16 Status: INVALID chain Fingerprint: e24e7f0840d7026242ee16cd7b984d064ad05e24757627006e820ac353a0460e ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-02-15 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-15 09:25:08 UTC (by PhishDestroy tracker) First reported: 2026-04-15 06:26:02 UTC (abuse notice filed) Last verified: 2026-04-23 03:14:16 UTC Neutralised: 2026-04-23 02:14:14 UTC Current status: taken down (registrar suspended or DNS dead) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d8fcf-10a3-75a8-bd92-41d98ac53a0f/ URLQuery: https://urlquery.net/report/3cdcce3a-7841-4d69-a31f-3e939c064526 Wayback Machine: https://web.archive.org/web/*/solboost.fun crt.sh CT logs: https://crt.sh/?q=%25.solboost.fun Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=solboost.fun AlienVault OTX: https://otx.alienvault.com/indicator/domain/solboost.fun URLhaus: https://urlhaus.abuse.ch/host/solboost.fun/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-15 09:25:33 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies solboost.fun as an active crypto drainer posing as a fraudulent 'boost' service. The domain is currently under investigation with a generic phishing threat type, indicating a high-risk attempt to deceive users into connecting cryptocurrency wallets under false pretenses. The site’s infrastructure and recent registration suggest opportunistic malicious activity targeting crypto enthusiasts seeking 'boosts' or incentives. This domain was flagged with a risk level marked as 'under_investigation' and exhibits multiple red flags: registered through GoDaddy.com, LLC on February 15, 2026, resolving to IP 63.176.8.218, and secured with a Let’s Encrypt SSL certificate. VirusTotal scans show 0 detections out of 95 engines, indicating it has evaded current detection mechanisms. No brand impersonation was detected, but the generic phishing label aligns with crypto drainer tactics. The domain’s recent creation and unflagged status make it a prime candidate for malicious activity, particularly in the crypto space where users are accustomed to high-risk interactions. Mitigation for crypto drainer threats involves avoiding any wallet connections or data entry on such sites. Users should verify domains through official channels, cross-check URLs with known legitimate services, and use hardware wallets or transaction simulation tools to preview wallet interactions. Blocking the IP 63.176.8.218 and reporting the domain to security platforms like VirusTotal or browser-based phishing reporting tools can help mitigate spread. Always prioritize verifying incentives or 'boosts' through trusted, official communication channels before engaging. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260415-C34815 Favicon MD5: 4d741b1c9624f1aa75e1a722bf2f67ef TLS cert SHA-256: e24e7f0840d7026242ee16cd7b984d064ad05e24757627006e820ac353a0460e ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/solboost.fun/ JSON API: https://api.destroy.tools/v1/check?domain=solboost.fun Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io