⚠ Independent Forensic Investigation

SUNO TRACKER REPORT

71+ hidden trackers, undisclosed proof-of-work computation, behavioral fingerprinting, session replay, and cross-device surveillance infrastructure discovered running behind a music generation website.

INVESTIGATOR: VOSS NEURAL RESEARCH LLC
DATE: MARCH 6, 2026
STATUS: ACTIVE
71+
Tracking Domains
25+
Persistent JS Files
9.6GB
Profile Bloat
619
Obfuscated Functions

What We Found

A forensic analysis of browser data from a personal workstation used to access Suno.com revealed an extensive, undisclosed surveillance and computational exploitation infrastructure far beyond what any music generation service requires.

A single Suno tab running for months with 25+ tracker scripts is equivalent to running 25 small background applications on a user's computer simultaneously, none of which were designed to run for more than a few hours. The computer wasn't "almost dying" — it was being strip-mined for data.

Critical Discovery: hCaptcha is self-hosted on Suno's own subdomains to evade ad blockers and privacy tools. Our deobfuscation of the captured 300KB api.js script revealed a custom bytecode virtual machine with 619 obfuscated functions, 35,000+ encoded instructions, and a full behavioral biometrics pipeline capturing mouse, touch, keyboard, and device motion data. The script uses Private State Tokens to track users across sessions — even in incognito mode.

Session Replay & Heatmaps

These services literally record everything a user does on the page — every mouse movement, click, scroll, and keystroke.

Microsoft Clarity
Microsoft Corporation
Records your entire browsing session as a video. Every mouse movement, click, scroll, and keystroke. Creates full playback that Suno's team can watch later. Runs a MutationObserver on the entire DOM — the direct cause of screen warping.
scripts.clarity.ms • c.clarity.ms
🔴 HIGH IMPACT — GPU CASCADE
Maze
Maze (YC-backed)
In-app user research. Runs popup surveys, records task flows, measures feature interaction. Loads on every page.
snippet.maze.co • prompts.maze.co
🟡 MEDIUM IMPACT

Marketing Automation & CRM

Push notifications, email campaigns, user segmentation, and behavioral re-engagement.

Braze SDK
Braze (formerly Appboy)
Enterprise marketing automation. Powers push notifications, in-app messages, and email campaigns. Maintains a persistent WebSocket connection that accumulates queued events over months.
sdk.iad-07.braze.com
🔴 HIGH — PERSISTENT CONNECTION
Singular
Singular — Attribution
Marketing analytics and cross-platform attribution. Links ad exposure to in-app behavior. Device fingerprinting for cross-device tracking.
s.axon.ai • sdk-api-v1.singular.net
🟡 MEDIUM
Agentio
Agentio — Creator Ads
Creator economy advertising platform. Manages creator partnership campaigns and performance tracking.
collector.agentio.com • static.agentio.com
🟢 LOW-MEDIUM

Advertising Pixels & Conversion Tracking

Every major advertising platform has a pixel running on Suno — each one tracking your behavior and linking it to your identity on that platform.

Meta / Facebook Pixel
Meta Platforms
Links your Suno activity to your Facebook profile. Full fbevents.js SDK loaded.
connect.facebook.net
🟡 MEDIUM
TikTok Pixel
ByteDance
Links Suno activity to TikTok identity. Uses both IPv4 and IPv6 endpoints.
analytics.tiktok.com
🟡 MEDIUM
Snapchat Pixel
Snap Inc.
Conversion tracking for Snapchat ads. Multiple endpoints.
tr.snapchat.com • tr6.snapchat.com
🟡 MEDIUM
Twitter / X Pixel
X Corp
Conversion tracking for X ad campaigns.
analytics.twitter.com • t.co
🟢 LOW-MEDIUM
Google Ads Stack
Alphabet / Google
The full Google stack: Tag Manager (loader of loaders), GA4, Ads conversion tracking, DoubleClick. Typically 3-5 separate JavaScript files running simultaneously. The IDE cookie is a persistent advertising ID that follows you across the entire web.
googleads.g.doubleclick.net • googletagmanager.com • google-analytics.com
🔴 HIGH — MULTIPLE HEAVY SCRIPTS
AppLovin
AppLovin — Mobile Ads
Mobile-focused ad attribution. Unusual on a web app — suggests web-to-app conversion tracking. Three separate endpoints.
res4.applovin.com • re.applovin.com • b.applovin.com
🟡 MEDIUM — 3 CONNECTIONS

hCaptcha Computational Exploitation

The most alarming discovery. Suno self-hosts hCaptcha on its own subdomains to evade ad blockers, then runs invisible proof-of-work computations on your CPU — without disclosure or consent. Our deobfuscation of the captured 300KB script revealed a deeply obfuscated surveillance and computation framework.

VNR deobfuscated hCaptcha's captured api.js (300KB, minified) and found: a custom bytecode virtual machine with 67 opcodes, 35,000+ encoded instructions, and an XOR-shifted string table designed to prevent static analysis. The script runs SHA-256 proof-of-work challenges via SubtleCrypto and WebAssembly acceleration — the same computational technique used in cryptocurrency mining. It captures full behavioral biometrics (mouse, touch, keyboard, device motion) and uses Private State Tokens issued by pst-issuer.hcaptcha.com to track users across sessions, even in incognito mode.

Self-Hosted hCaptcha
Intuition Machines / Suno
hCaptcha is served from Suno's own subdomains (hcaptcha-endpoint-prod.suno.com) to bypass ad blockers and privacy lists that block *.hcaptcha.com. This is a deliberate evasion tactic.
hcaptcha-endpoint-prod.suno.com • hcaptcha-assets-prod.suno.com
🔴 CRITICAL — BLOCKER EVASION
Invisible PoW Computation
hCaptcha / Intuition Machines
During song generation, an invisible challenge iframe runs SHA-256 proof-of-work computations via SubtleCrypto and WebAssembly acceleration — consuming CPU cycles without any visible UI or user consent. This is functionally identical to cryptocurrency mining techniques.
SubtleCrypto.digest() • WebAssembly.instantiate()
🔴 CRITICAL — CPU EXPLOITATION
Custom Bytecode VM
hCaptcha / Intuition Machines
The script contains a full virtual machine with 67 opcodes, 35,000+ bytecode instructions, and an XOR-shifted encoded string table. 619 functions are deliberately obfuscated to prevent security researchers from analyzing what the script actually does on your machine.
619 obfuscated functions • 1,982 encoded strings
🔴 CRITICAL — ANTI-ANALYSIS
Behavioral Fingerprinting
hCaptcha / Intuition Machines
Captures every mouse movement, touch event, keystroke, and device accelerometer/gyroscope reading into circular time buffers. This creates a unique biometric fingerprint of each user that persists across sessions. Also detects installed browser extensions by scanning stack traces for chrome-extension:// URLs.
38 addEventListener hooks • Motion/Touch/Key capture
🔴 CRITICAL — BIOMETRIC PROFILING
Private State Token Tracking
hCaptcha / Suno
Issues cryptographic Private State Tokens via pst-issuer.hcaptcha.com that persist across browsing sessions and survive incognito mode. Combined with Storage Access API requests, this creates a dual-layer persistence mechanism that works even when third-party cookies are blocked.
pst-issuer.hcaptcha.com • Storage Access API
🔴 CRITICAL — INCOGNITO BYPASS
DOM API Surveillance
hCaptcha / Intuition Machines
Wraps fundamental DOM APIs including getElementById, querySelector, Element.click(), and even console.log with Proxy objects that intercept calls from every other script on the page — effectively surveilling all JavaScript execution.
Document.prototype methods • Proxy wrapping
🔴 CRITICAL — PAGE SURVEILLANCE

Identity Resolution & Cross-Device Tracking

These services link a user's identity across different devices, browsers, and platforms — building a comprehensive profile.

Tapad (Experian)
Experian
Cross-device identity graph. Links phone, tablet, laptop, and desktop into a single profile. If a user visited Suno on multiple devices, Tapad knows they're the same person.
pixel.tapad.com
🔴 HIGH PRIVACY RISK
Obfuscated Tracker
UNKNOWN
Deliberately obfuscated domain name — a red flag. Legitimate services use recognizable domains. Sets a "trk" (tracking) cookie. Stealth tracker designed to avoid detection.
imtwjwoasak.com
🔴 UNIDENTIFIED — HIGH RISK

42 additional tracking domains set cookies through the ad pixels above. These aren't directly loaded by Suno's page but get synced through redirect chains, so ad networks can identify you across the entire web.

# Domain Company Function
30 .adnxs.com Xandr (Microsoft) Programmatic ad exchange
31 .adsrvr.org The Trade Desk Demand-side platform
33 .agkn.com Acxiom Links online identity to offline data
38 .criteo.com Criteo Retargeting — shows Suno ads after a user visits
39 .crwdcntrl.net Lotame Aggregates browsing into audience segments
40 .demdex.net Adobe Enterprise data management platform
41 .doubleclick.net Google Persistent ad ID across the entire web
45 .id5-sync.com ID5 Universal ID surviving cookie deletion
49 .liadm.com LiveIntent Email-based identity resolution
52 .pippio.com LiveRamp Connects cookies, email, phone, device IDs
54 .quantserve.com Quantcast Audience measurement and bidding
56 .rubiconproject.com Magnite Largest programmatic ad exchange
61 .taboola.com Taboola Clickbait "recommended content" ads

+ 29 additional ad exchange domains documented in the full encyclopedia.

Why Computers Were Dying

The combined resource cost of 25+ persistent JavaScript tracker files running simultaneously in a single browser tab.

Resource Fresh Tab After 24h After 1 Week After 1 Month
RAM ~500 MB ~800 MB ~1.5 GB ~3+ GB
CPU ~10% ~12% ~15% ~20%+
Connections ~30 ~30-40 ~50+ ~60+
IndexedDB ~2 MB ~10 MB ~50 MB ~200+ MB

Why Screens Were Warping

1

Suno updates the DOM

Normal UI update — waveform render, track list change, generation status poll.

2

Clarity's MutationObserver fires

Serializes the DOM change for session replay recording. Adds measurement elements.

3

Clarity's serialization modifies the DOM

Adds data attributes, measurement elements, or shadow nodes for recording.

4

This triggers the MutationObserver AGAIN

The observer fires on its own modifications. After weeks of running, the internal mutation queue grows unbounded, processing stale mutations mixed with current ones.

5

GPU memory exhaustion → software rendering fallback

GPU-rendered and CPU-rendered layers composite at different rates and positions. CSS transform matrices produce incorrect results. The screen warps, slants, and distorts.

Applicable Laws & Violations

This tracker stack potentially violates multiple federal and state statutes.

How This Investigation Was Conducted

All forensic data was extracted from local browser profile databases only. No live network calls were made during evidence collection. Evidence was extracted from SQLite databases, LevelDB stores, IndexedDB, LocalStorage, and cookie stores across five browser profiles (Comet, Brave, Edge, Chrome, and an isolated Chromium instance). All raw extraction data has been preserved with original timestamps.

EXTRACTION: LOCAL ONLY — NO NETWORK
BROWSERS: 5 PROFILES ANALYZED
VERIFICATION: MULTI-PASS

Free cleanup scripts. No strings.

VNR provides free, open-source cleanup tools to purge tracker artifacts from your browser profiles.

🔒 VNR SCAN CLEANUP KIT
  • DNS-level blocker (hosts file)
  • Browser storage purge scripts
  • hCaptcha PoW artifact removal
  • Self-hosted hCaptcha domain blocking
  • DNS cache flush + verification
GO TO VNR SCAN →