Report Overview
Visitedpublic
2026-03-18 18:51:09
Tags
Submit Tags
URL
pumpclaimed.fun/
Finishing URL
pumpclaimed.fun/
IP / ASN
172.67.168.224
#13335 CLOUDFLARENET
Title
Pump

Detections

urlquery
0
Network Intrusion Detection
7
Threat Detection Systems
10

Host Summary

HostRankRegisteredFirst SeenLast Seen
cdnjs.cloudflare.com
12222009-02-172012-05-232026-03-15
pub-14c1504681d2427684ac1f489338d075.r2.dev
unknown2022-08-232026-02-252026-03-12
fonts.googleapis.com
3132005-01-252012-05-232026-03-15
fonts.gstatic.com
unknown2008-02-112014-04-022026-03-15
pumpclaimed.fun
unknown2026-03-162026-03-182026-03-18
pump.fun
174012023-09-192024-01-162026-03-13
verify-modal-2735.vercel.app
unknownunknown2026-03-182026-03-18
www.googletagmanager.com
2832011-11-112012-10-042026-03-15
dns.google
1582018-04-162018-10-262026-03-12

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
lowClient IP
8.8.4.4
ET INFO Observed Google DNS over HTTPS Domain (dns .google in TLS SNI)
lowClient IP
104.18.50.34
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.50.34
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.50.34
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.50.34
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.50.34
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.50.34
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
Threat Detection Systems
Detection SystemIndicatorVerdictAlert
Private YARA rulesverify-modal-2735.vercel.app/solana?id=69a44c0328d9f4cf47ed21c5&bundle=1audit
Hunting_JS_WebAssembly
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/phantom-bypass1-desktop.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/phantom-bypass1-mobile.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/solflare-bypass2-mobile.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/phantom-bypass2-desktop.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/solflare-bypass2-desktop.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/solflare-bypass1-mobile.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/solflare-bypass1-desktop.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/phantom-bypass2-mobile.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
DNS4EUpumpclaimed.funmalicious
Sinkholed

JavaScript (9)

HTTP Transactions (36)

URLIPResponseSize