Report Overview
Visitedpublic
2026-03-24 13:26:26
Submit Tags
URL
xn--ve-pump-qfba.fun
Finishing URL
xn--ve-pump-qfba.fun/live/9BB6NFEcjBCtnNLFko2FqVQBq8HHM13kCyYcdQbgpump
IP / ASN
104.21.40.108
#13335 CLOUDFLARENET
Title
pump

Suspicious - Anti-debugging code

Detections

urlquery
2
Network Intrusion Detection
8
Threat Detection Systems
12

Host Summary

HostRankRegisteredFirst SeenLast Seen
cloudflare-dns.com
1122018-03-282015-04-092026-03-23
corsproxy.io
1755282022-01-302016-05-192026-03-20
pump.mypinata.cloud
14417382020-01-282024-04-122026-03-23
api.codetabs.com
31316492016-09-072018-11-132026-03-20
frontend-api.pump.fun
18530782023-09-192024-06-062026-03-23
xn--ve-pump-qfba.fun
unknown2026-03-122026-03-242026-03-24
api.dexscreener.com
20856592021-06-112022-05-192026-03-23
secure-modal-3371.vercel.app
unknownunknownNo dataNo data
ipfs.io
192712014-05-162015-09-092026-03-20
thingproxy.freeboard.io
66346122013-11-192014-10-082026-03-18
public-api.birdeye.so
52620072021-11-172024-01-062026-03-23
pub-14c1504681d2427684ac1f489338d075.r2.dev
unknown2022-08-232026-02-252026-03-20
fonts.reown.com
unknown2000-01-282025-09-262026-03-21
imagedelivery.net
158762021-04-092021-09-202026-03-18
api.dicebear.com
8682852013-06-212021-11-132026-03-18
raw.githubusercontent.com
220212014-02-062014-03-012026-03-18
mainnet.helius-rpc.com
18725452023-04-062023-04-112026-03-20
api.allorigins.win
18969072019-03-052019-03-272026-03-18

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
lowClient IP
104.16.248.249
ET INFO Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)
mediumClient IP
209.94.90.1
ET INFO Observed Peer-to-Peer File Sharing Service Domain (ipfs .io in TLS SNI)
lowClient IP
104.18.54.45
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.54.45
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.54.45
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.54.45
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.54.45
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.54.45
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
Threat Detection Systems
Detection SystemIndicatorVerdictAlert
Private YARA rulessecure-modal-3371.vercel.app/demo.php?id=699d00a2c3f30de9582805e6&parent_url=xn--ve-pump-qfba.fun%2Faudit
Hunting_JS_WebAssembly
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/solflare-bypass2-mobile.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/phantom-bypass1-mobile.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/solflare-bypass1-desktop.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/phantom-bypass1-desktop.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/solflare-bypass2-desktop.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/solflare-bypass1-mobile.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/phantom-bypass2-desktop.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/phantom-bypass2-mobile.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
DNS4EUxn--ve-pump-qfba.funmalicious
Sinkholed
DigiCert UltraDNSipfs.iomalicious
Sinkholed
DigiCert UltraDNScloudflare-dns.commalicious
Sinkholed

JavaScript (6)

HTTP Transactions (234)

URLIPResponseSize