Report Overview
Visitedpublic
2026-03-09 06:06:20
Submit Tags
URL
pump.fun-watch.dev
Finishing URL
pump.fun-watch.dev/
IP / ASN
31.57.34.181
#834 IPXO
Title
Pump

Suspicious - Anti-debugging code

Detections

urlquery
2
Network Intrusion Detection
6
Threat Detection Systems
9

Host Summary

HostRankRegisteredFirst SeenLast Seen
pub-14c1504681d2427684ac1f489338d075.r2.dev
unknown2022-08-232026-02-252026-03-04
connect.sol.ms
unknown2026-01-102026-01-182026-02-25
pump.fun-watch.dev
unknownunknownNo dataNo data
vdvepl.vercel.app
unknownunknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
lowClient IP
104.18.50.34
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.50.34
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.50.34
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.50.34
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.50.34
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.50.34
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
Threat Detection Systems
Detection SystemIndicatorVerdictAlert
Private YARA rulesvdvepl.vercel.app/demo.php?antibot=false&id=69952686c8df00fbc3e2b8ec&parent_url=pump.fun-watch.dev%2F&source=solana-iframeaudit
Hunting_JS_WebAssembly
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/phantom-bypass1-desktop.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/phantom-bypass2-mobile.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/solflare-bypass1-mobile.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/solflare-bypass2-mobile.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/phantom-bypass2-desktop.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/solflare-bypass2-desktop.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/phantom-bypass1-mobile.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/solflare-bypass1-desktop.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type

JavaScript (4)

HTTP Transactions (36)

URLIPResponseSize