https://solana.monstagon.com/wrsj1?utm_campaign=AU01_REG_SHR_AGE_23_040825%3D01&cid=1247122060645865&fbid=1805166066772149&bid=VV&utm_medium=paid&utm_source=fb&utm_id=120244721261610333&utm_content=120244721261630333&utm_term=120244721261670333
104.21.77.40 · Cloudflare, Inc.
Toronto, Canada
290 days
200 · 54.5s
Valid· WE1, Google Trust Services, US
COMPLETED
Registered-domain escalation
Submit monstagon.com as the primary IOC, enriched with evidence from hostile subdomains like solana.monstagon.com.
No KB/IOK detections were recorded for this scan.
cryptocurrency | finance | technology · 4/5/2026
The page at solana.monstagon.com presents a mininghorizon branding, including the page title mininghorizon and visual UI resembling a crypto/mining service. The domain contains the word 'solana', suggesting impersonation of a known crypto brand, while the SSL cert is issued to monstagon.com and the domain is under Cloudflare, but the page title and shown branding indicate mininghorizon rather than the legitimate Solana site. This indicates a credential collection attempt through a SPA that renders forms via JavaScript, with multiple external script bundles loaded to replicate a legitimate service interface.
The observed page impersonates Mining Horizon branding on a domain that includes the Solana name, solana.monstagon.com, creating a strong impersonation signal. The static HTML contains no forms, but a large set of external JavaScript assets suggests a SPA that renders credential capture interfaces at runtime, indicating phishing intent to harvest user data. The page title and visible branding align with Mining Horizon, while the domain hints at Solana impersonation, increasing risk of credential theft tied to a crypto service. The SSL cert is tied to monstagon.com, not the impersonated brand, and the site is hosted behind Cloudflare with a questionable certificate scope, raising suspicion of domain spoofing and rapid lifecycle changes. This combination of brand mismatch, SPA-based credential capture potential, multiple external assets, and WAF-related characteristics constitutes a high-risk credential-phishing operation that demands immediate containment.
Suspend Domain