Report Overview
Visitedpublic
2026-03-04 22:17:52
Submit Tags
URL
xn--pump-oza.fun
Finishing URL
xn--pump-oza.fun/live/9BB6NFEcjBCtnNLFko2FqVQBq8HHM13kCyYcdQbgpump
IP / ASN
104.21.83.188
#13335 CLOUDFLARENET
Title
pump

Suspicious - Anti-debugging code

Detections

urlquery
2
Network Intrusion Detection
10
Threat Detection Systems
11

Host Summary

HostRankRegisteredFirst SeenLast Seen
ipfs.io
192712014-05-162015-09-092026-02-27
api.dexscreener.com
20856592021-06-112022-05-192026-02-28
imagedelivery.net
158762021-04-092021-09-202026-03-04
frontend-api.pump.fun
18530782023-09-192024-06-062026-03-03
api.codetabs.com
31316492016-09-072018-11-132026-02-27
pub-14c1504681d2427684ac1f489338d075.r2.dev
unknown2022-08-232026-02-252026-03-04
b7c1dj.vercel.app
unknown2020-01-282026-03-042026-03-04
mainnet.helius-rpc.com
18725452023-04-062023-04-112026-02-25
api.allorigins.win
18969072019-03-052019-03-272026-03-01
thingproxy.freeboard.io
66346122013-11-192014-10-082026-03-01
corsproxy.io
1755282022-01-302016-05-192026-03-04
xn--pump-oza.fun
unknown2026-02-272026-03-042026-03-04
api.dicebear.com
8682852013-06-212021-11-132026-03-03
pump.mypinata.cloud
14417382020-01-282024-04-122026-02-28
public-api.birdeye.so
52620072021-11-172024-01-062026-03-03
cloudflare-dns.com
1122018-03-282015-04-092026-03-02
raw.githubusercontent.com
220212014-02-062014-03-012026-03-04

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
lowClient IP
104.16.249.249
ET INFO Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)
mediumClient IP
209.94.90.1
ET INFO Observed Peer-to-Peer File Sharing Service Domain (ipfs .io in TLS SNI)
lowClient IP
104.18.54.45
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.54.45
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.54.45
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.54.45
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.54.45
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.54.45
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.54.45
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
lowClient IP
104.18.54.45
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
Threat Detection Systems
Detection SystemIndicatorVerdictAlert
Private YARA rulesb7c1dj.vercel.app/demo.php?id=699d00a2c3f30de9582805e6&parent_url=xn--pump-oza.fun%2Flive%2F9BB6NFEcjBCtnNLFko2FqVQBq8HHM13kCyYcdQbgpumpaudit
Hunting_JS_WebAssembly
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/solflare-bypass2-desktop.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/phantom-bypass2-desktop.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/solflare-bypass1-desktop.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/solflare-bypass1-mobile.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/phantom-bypass1-desktop.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/phantom-bypass1-mobile.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/solflare-bypass2-mobile.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
Nextron YARA rulespub-14c1504681d2427684ac1f489338d075.r2.dev/phantom-bypass2-mobile.gifmalware
Detects files with GIF headers and format anomalies - which means that this image could be an obfuscated file of a different type
DigiCert UltraDNScloudflare-dns.commalicious
Sinkholed
DigiCert UltraDNSipfs.iomalicious
Sinkholed

JavaScript (6)

HTTP Transactions (191)

URLIPResponseSize