Report Overview
Visitedpublic
2026-03-17 15:50:42
Tags
Submit Tags
URL
pumpbacks.xyz/
Finishing URL
pumpbacks.xyz/
IP / ASN
87.120.84.245
#214943 Railnet LLC
Title
Pump.fun Cashback - Get 30% Back on Your Losses

Detections

urlquery
0
Network Intrusion Detection
7
Threat Detection Systems
11

Host Summary

HostRankRegisteredFirst SeenLast Seen
verify-modal-7619.vercel.app
unknownunknownNo dataNo data
cashbackspump.fun
unknown2026-03-102026-03-172026-03-17
pub-14c1504681d2427684ac1f489338d075.r2.dev
unknown2022-08-232026-02-252026-03-12
pumpbacks.xyz
unknown2026-03-162026-03-172026-03-17
cloudflare-dns.com
1122018-03-282015-04-092026-03-16

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
lowClient IP
104.16.248.249
ET INFO Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)
lowClient IP
104.18.54.45
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.54.45
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.54.45
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.54.45
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.54.45
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.54.45
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
Threat Detection Systems
Detection SystemIndicatorVerdictAlert
Private YARA rulesverify-modal-7619.vercel.app/solana?id=69b7e132cd9a2a4b1a14424c&bundle=1audit
Hunting_JS_WebAssembly
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/phantom-bypass1-desktop.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/phantom-bypass2-mobile.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/solflare-bypass1-mobile.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/solflare-bypass2-desktop.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/phantom-bypass2-desktop.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/phantom-bypass1-mobile.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/solflare-bypass1-desktop.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/solflare-bypass2-mobile.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
DNS4EUcashbackspump.funmalicious
Sinkholed
DigiCert UltraDNScloudflare-dns.commalicious
Sinkholed

JavaScript (6)

HTTP Transactions (27)

URLIPResponseSize