dirty.games
Open in
urlscan Pro
34.192.98.156
Public Scan
Submission: On July 25 via manual from IL — Scanned from ES
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on December 2nd 2023. Valid for: a year.
This is the only time dirty.games was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 34.192.98.156 34.192.98.156 | 14618 (AMAZON-AES) (AMAZON-AES) | |
5 | 2400:52e0:1e0... 2400:52e0:1e00::1047:1 | 60068 (CDN77 _) (CDN77 _) | |
1 | 2a04:4e42:200... 2a04:4e42:200::649 | 54113 (FASTLY) (FASTLY) | |
1 | 2a00:1450:400... 2a00:1450:4001:810::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 15.197.129.109 15.197.129.109 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2a00:1450:400... 2a00:1450:4001:808::2003 | 15169 (GOOGLE) (GOOGLE) | |
14 | 6 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-34-192-98-156.compute-1.amazonaws.com
dirty.games |
ASN16509 (AMAZON-02, US)
PTR: aa350294f8d5785ea.awsglobalaccelerator.com
www.urlsafe.link |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
b-cdn.net
dg-videos.b-cdn.net — Cisco Umbrella Rank: 34977 |
4 MB |
5 |
dirty.games
dirty.games — Cisco Umbrella Rank: 657768 |
54 KB |
1 |
gstatic.com
fonts.gstatic.com |
33 KB |
1 |
urlsafe.link
www.urlsafe.link |
|
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 110 |
1 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 1211 |
29 KB |
14 | 6 |
Domain | Requested by | |
---|---|---|
5 | dg-videos.b-cdn.net |
dirty.games
|
5 | dirty.games |
dirty.games
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | www.urlsafe.link |
dirty.games
|
1 | fonts.googleapis.com |
dirty.games
|
1 | code.jquery.com |
dirty.games
|
14 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dirty.games Sectigo RSA Domain Validation Secure Server CA |
2023-12-02 - 2025-01-01 |
a year | crt.sh |
*.b-cdn.net Sectigo RSA Domain Validation Secure Server CA |
2023-11-05 - 2024-11-11 |
a year | crt.sh |
*.jquery.com Sectigo ECC Domain Validation Secure Server CA |
2024-06-25 - 2025-06-25 |
a year | crt.sh |
upload.video.google.com WR2 |
2024-07-01 - 2024-09-23 |
3 months | crt.sh |
urlsafe.link R3 |
2024-06-06 - 2024-09-04 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-07-01 - 2024-09-23 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://dirty.games/ld/id20.php?clk=w6glqogn752d1sv2jrmok4om&cid=&countryname=Israel®ion=Tel%20Aviv&os=Android&browser=Firefox%20Mobile&brand=Mozilla&campaign=5ef2a5a2-bd94-4e63-8edf-42f62c3dd1e0&SID=www.google.com&SID3=index&td=www.securegfm.com
Frame ID: E37A8644272A2675166A2084F24F118C
Requests: 13 HTTP requests in this frame
Frame:
https://www.urlsafe.link/?autocamp=Israel&clickid=w6glqogn752d1sv2jrmok4om&lg=sp
Frame ID: F9B4D3D3E993CF1B887BB43CCFE0B545
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Juegos Sucios - Te correrĂ¡s en 30 segundosDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
id20.php
dirty.games/ld/ |
10 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style4_form.css
dirty.games/ld/fs_files/ |
14 KB 14 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
redirect3_1step.js
dirty.games/files/ |
633 B 955 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sf_logo.png
dg-videos.b-cdn.net/bg/img/fs/ |
113 KB 113 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
720x1280_sf_bg215.jpg
dg-videos.b-cdn.net/bg/img/ |
250 KB 251 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1280x720_sf_bg215.jpg
dg-videos.b-cdn.net/bg/img/ |
258 KB 259 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-2.2.4.min.js
code.jquery.com/ |
84 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main_script.js
dirty.games/ld/fs_files/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
32 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
www.urlsafe.link/ Frame F9B4 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
JTUSjIg1_i6t8kCHKm459Wlhyw.woff2
fonts.gstatic.com/s/montserrat/v26/ |
32 KB 33 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Tondu_Beta.woff
dirty.games/ld/fs_files/ |
27 KB 27 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1280x720_sf_bg215.mp4
dg-videos.b-cdn.net/bg/ |
4 MB 4 MB |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ico.png
dg-videos.b-cdn.net/bg/img/fs/ |
10 KB 10 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 string| SID string| SID3 string| page_name string| url function| refreshSession function| $ function| jQuery string| loadIframe string| url21 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.urlsafe.link/ | Name: AWSALBCORS Value: S5emYnZvGZRQW7q5u1uU+P0yrpDVndBsWpEntYU2IsOCsL9lo5Thtc87s9eYtQfVpO0vY93vmJJTWkOvpfzP521DJZzlu9XDxeJlT959OV11eQ4TFLAjNeEGswfP |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
dg-videos.b-cdn.net
dirty.games
fonts.googleapis.com
fonts.gstatic.com
www.urlsafe.link
15.197.129.109
2400:52e0:1e00::1047:1
2a00:1450:4001:808::2003
2a00:1450:4001:810::200a
2a04:4e42:200::649
34.192.98.156
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
2249afd09ab89cd1772945caef749cccb6d92b118546107a12cba685b0d9bc89
2cd14766b89f74025ca3c64c833dbdad8066543dfae0575f629008367168bedd
4896b0ce121a3d7732ab41d115e2c006716f05b453ec3c273ea820ba6c6a24e6
51698055502813cd29205292dfcb7517bd803cf9deb22e21d06bd24fb3bcdf4b
59a5cf46d45c21e89fe68a514541878e0daed9efe3eff6b5416fcb5b379030d2
7e60ec604d88b520fe5394cdde1317fbfa0c9f327a689f95044eb823bd82eb2c
9b826290c18409f4acf68df29ee1a20265ded31d4c6ececa7e6acf4f94f3a68d
bb2f90081933c0f2475883ca2c5cfee94e96d7314a09433fffc42e37f4cffd3b
dc479620e53e4040c80b9775ccbf54d40adb28418431ca41f89dd06f3ca935bb
dd5985fa8dc6cfcedd786436db0800078b20fc5a23ea8af1ba56a0c1ce151152
e6f9e5a2074af893414a4043cae18b36cf730a0849ba45d71750a2fa5d5e715c
fa5069598de9936274fcd45b8c0ce5f8881d4bd42e204326c8e89cb53bf10287