agentfuck.com
Open in
urlscan Pro
2606:4700:3033::ac43:8973
Public Scan
Effective URL: https://agentfuck.com/se/121-brd/index.html?src=%7Bsource%7D&email=%7Bemail%7D&sxid=b1817f92awuu
Submission: On June 18 via api from BE
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on February 4th 2020. Valid for: 8 months.
This is the only time agentfuck.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 200.234.148.129 200.234.148.129 | 10704 (ML Telecom) (ML Telecom) | |
1 1 | 2606:4700:303... 2606:4700:3037::ac43:be51 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 1 | 2606:4700:303... 2606:4700:3031::681b:9c8e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 2 | 34.82.213.51 34.82.213.51 | 15169 (GOOGLE) (GOOGLE) | |
1 1 | 2606:4700:303... 2606:4700:3031::ac43:9912 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 2606:4700:303... 2606:4700:3033::ac43:8973 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:814::200a | 15169 (GOOGLE) (GOOGLE) | |
10 | 2 |
ASN15169 (GOOGLE, US)
PTR: 51.213.82.34.bc.googleusercontent.com
leveluptraffic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
agentfuck.com
agentfuck.com |
1 MB |
2 |
leveluptraffic.com
2 redirects
leveluptraffic.com |
893 B |
2 |
inboxmen.com
2 redirects
inboxmen.com ma.inboxmen.com |
1 KB |
2 |
fidelityfun.com
2 redirects
fidelityfun.com |
1 KB |
1 |
googleapis.com
ajax.googleapis.com |
32 KB |
1 |
trackingzen.com
1 redirects
trackingzen.com |
1 KB |
10 | 6 |
Domain | Requested by | |
---|---|---|
9 | agentfuck.com |
agentfuck.com
|
2 | leveluptraffic.com | 2 redirects |
2 | fidelityfun.com | 2 redirects |
1 | ajax.googleapis.com |
agentfuck.com
|
1 | trackingzen.com | 1 redirects |
1 | ma.inboxmen.com | 1 redirects |
1 | inboxmen.com | 1 redirects |
10 | 7 |
This site contains links to these domains. Also see Links.
Domain |
---|
trackingzen.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2020-02-04 - 2020-10-09 |
8 months | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-05-26 - 2020-08-18 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://agentfuck.com/se/121-brd/index.html?src=%7Bsource%7D&email=%7Bemail%7D&sxid=b1817f92awuu
Frame ID: 083295BD626ED38BACC98F9C4F0AE553
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://fidelityfun.com/ZGNjMGNiZGZiNDBmNWU0NTY5MDZiYThjMmRhMTI5NWYuaGhoLkZjbnFoUG5BaXhlRmNWWmVVeUFq...
HTTP 302
http://fidelityfun.com/hhh/dcc0cbdfb40f5e456906ba8c2da1295f HTTP 302
http://inboxmen.com/ret/eml/?eml=willihermann1@gmail.com&comp=ex&mdi=dcc0cbdfb40f5e456906ba8c2da... HTTP 302
http://ma.inboxmen.com/almightyclick.php HTTP 302
https://leveluptraffic.com/smart.track?VID=328&AFID=415946&SID= HTTP 302
https://leveluptraffic.com/sanitize.go?u=https%3A%2F%2Ftrackingzen.com%2Fpath%2Flp.php%3Ftrvid%3D11858%... HTTP 301
https://trackingzen.com/path/lp.php?trvid=11858&trvx=671b7967&src={source}&email={email} HTTP 302
https://agentfuck.com/se/121-brd/index.html?src=%7Bsource%7D&email=%7Bemail%7D&sxid=b1817f92awuu Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: AVTAL >>
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://fidelityfun.com/ZGNjMGNiZGZiNDBmNWU0NTY5MDZiYThjMmRhMTI5NWYuaGhoLkZjbnFoUG5BaXhlRmNWWmVVeUFqSnZJUUtNRGlGUXpORk1vT2pzdW1vdXFpU1JyQm1hclhOZUFxSWV5blZZYUJLcFVIS2hWZXhkV3B2eUJ2
HTTP 302
http://fidelityfun.com/hhh/dcc0cbdfb40f5e456906ba8c2da1295f HTTP 302
http://inboxmen.com/ret/eml/?eml=willihermann1@gmail.com&comp=ex&mdi=dcc0cbdfb40f5e456906ba8c2da1295f&dom=platformclick.com HTTP 302
http://ma.inboxmen.com/almightyclick.php HTTP 302
https://leveluptraffic.com/smart.track?VID=328&AFID=415946&SID= HTTP 302
https://leveluptraffic.com/sanitize.go?u=https%3A%2F%2Ftrackingzen.com%2Fpath%2Flp.php%3Ftrvid%3D11858%26trvx%3D671b7967%26src%3D%7Bsource%7D%26email%3D%7Bemail%7D&v=4093d71cd875db4494d7c50b1b42a052b46ec244af15e0e4059f48f07cff10f3 HTTP 301
https://trackingzen.com/path/lp.php?trvid=11858&trvx=671b7967&src={source}&email={email} HTTP 302
https://agentfuck.com/se/121-brd/index.html?src=%7Bsource%7D&email=%7Bemail%7D&sxid=b1817f92awuu Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index.html
agentfuck.com/se/121-brd/ Redirect Chain
|
7 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.9.1/ |
90 KB 32 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
agentfuck.com/se/121-brd/css/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vegas.css
agentfuck.com/se/121-brd/css/ |
14 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cartoon-animatie-01.gif
agentfuck.com/se/121-brd/images/ |
301 KB 302 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vegas.js
agentfuck.com/se/121-brd/js/ |
21 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
slide3.b0c074e71bd96abd7babbe9f60a01ea2.jpg
agentfuck.com/se/121-brd/images/ |
176 KB 177 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
slide2.e7d43de31dac9feb437534d15a8b726e.jpg
agentfuck.com/se/121-brd/images/ |
177 KB 177 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
slide1.786fa74e13d0a7a49c8c4a65e1351357.jpg
agentfuck.com/se/121-brd/images/ |
200 KB 200 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
slide3.b0c074e71bd96abd7babbe9f60a01ea2.jpg
agentfuck.com/se/121-brd/images/ |
176 KB 177 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery function| center function| loading function| clickMe string| rel1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.agentfuck.com/ | Name: __cfduid Value: de0c86ef0be3fb86c7196917f4f8395cc1592497813 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
agentfuck.com
ajax.googleapis.com
fidelityfun.com
inboxmen.com
leveluptraffic.com
ma.inboxmen.com
trackingzen.com
200.234.148.129
2606:4700:3031::681b:9c8e
2606:4700:3031::ac43:9912
2606:4700:3033::ac43:8973
2606:4700:3037::ac43:be51
2a00:1450:4001:814::200a
34.82.213.51
37d7863d64ff9ca8a906fc6093e25991612540a562e1f1685932d7e4f3a58206
38ae64707bb5b81879187ddbfd8c6839e550baa53a63bf81b14f0f3d7ab36ab5
46f2916316f1f474f212ff4dd168feff81999b3542e485fe0aef7c020176bc52
53dceb03ece22c6299796b5bbae84ba23614eb0f3d90f1fe763320de1fa2f563
8534b48586ae9c975f6f22bf22439162d26c1d60f0e57e558d6bd7bc18677bc4
8b1f72690547191dd05c20d91cc88e101e37940e23c57adb50484d1659575619
c12f6098e641aaca96c60215800f18f5671039aecf812217fab3c0d152f6adb4
c8590ce1d552cd71139fcd7e13577ba7c1703901eab3f2188cd72b881a4185e4
dc3c919ae1d56bd7b4995266e77a66fb51358585c0c832b34ca070d51d6518ba