nrb2mr0.spotfakes.shop
Open in
urlscan Pro
172.67.173.125
Malicious Activity!
Public Scan
Effective URL: https://nrb2mr0.spotfakes.shop/t62p7e0?t=Dating-telegram&cid=1
Submission: On December 15 via api from US — Scanned from NZ
Summary
TLS certificate: Issued by WE1 on November 23rd 2024. Valid for: 3 months.
This is the only time nrb2mr0.spotfakes.shop was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Porn Scam (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 2606:4700:303... 2606:4700:3036::ac43:cf29 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 2 | 172.67.207.41 172.67.207.41 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
10 | 172.67.173.125 172.67.173.125 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2404:6800:400... 2404:6800:4006:809::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 142.251.221.67 142.251.221.67 | 15169 (GOOGLE) (GOOGLE) | |
13 | 4 |
ASN15169 (GOOGLE, US)
PTR: syd09s31-in-f3.1e100.net
fonts.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
spotfakes.shop
nrb2mr0.spotfakes.shop |
579 KB |
4 |
mytgmodel.my
3 redirects
mytgmodel.my |
3 KB |
1 |
gstatic.com
fonts.gstatic.com |
23 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 29 |
838 B |
13 | 4 |
Domain | Requested by | |
---|---|---|
10 | nrb2mr0.spotfakes.shop |
nrb2mr0.spotfakes.shop
|
4 | mytgmodel.my | 3 redirects |
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
nrb2mr0.spotfakes.shop
|
13 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
mytgmodel.my WE1 |
2024-12-14 - 2025-03-15 |
3 months | crt.sh |
spotfakes.shop WE1 |
2024-11-23 - 2025-02-21 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-11-04 - 2025-01-27 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-11-04 - 2025-01-27 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://nrb2mr0.spotfakes.shop/t62p7e0?t=Dating-telegram&cid=1
Frame ID: 042F4B8CB77F2D132B8039856E683CCE
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
Get Laid TonightPage URL History Show full URLs
-
https://mytgmodel.my/
HTTP 302
https://mytgmodel.my/verify.php Page URL
-
https://mytgmodel.my/verify.php
HTTP 302
https://mytgmodel.my/ HTTP 302
https://nrb2mr0.spotfakes.shop/t62p7e0?t=Dating-telegram&cid=1 Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://mytgmodel.my/
HTTP 302
https://mytgmodel.my/verify.php Page URL
-
https://mytgmodel.my/verify.php
HTTP 302
https://mytgmodel.my/ HTTP 302
https://nrb2mr0.spotfakes.shop/t62p7e0?t=Dating-telegram&cid=1 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://mytgmodel.my/ HTTP 302
- https://mytgmodel.my/verify.php
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
verify.php
mytgmodel.my/ Redirect Chain
|
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
t62p7e0
nrb2mr0.spotfakes.shop/ Redirect Chain
|
5 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
style.css
nrb2mr0.spotfakes.shop/media/dating/toon9/css/ |
9 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
js.cookie.js
nrb2mr0.spotfakes.shop/cookie/ |
4 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
utils.js
nrb2mr0.spotfakes.shop/util/ |
7 KB 4 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
123.png
nrb2mr0.spotfakes.shop/media/dating/toon9/images/ |
406 KB 407 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery-2.2.4.min.js
nrb2mr0.spotfakes.shop/media/dating/toon9/js/ |
84 KB 32 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bb.js
nrb2mr0.spotfakes.shop/media/ |
639 B 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
exit1.js
nrb2mr0.spotfakes.shop/media/exit-new/ |
3 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
774 B 838 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bg.jpg
nrb2mr0.spotfakes.shop/media/dating/toon9/images/ |
122 KB 123 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
S6uyw4BMUTPHjx4wXg.woff2
fonts.gstatic.com/s/lato/v24/ |
23 KB 23 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
nrb2mr0.spotfakes.shop/ |
0 635 B |
Other
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Porn Scam (Online)27 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| requestLink object| geoInfo string| ip string| devInfo number| exDays function| wireUpEvents function| Cookies function| docReady function| getParameterByName function| hideUnsub function| languageDetection function| writeLocation function| showLocation function| appendPixels function| getCookie function| getBackendParamsByName function| addSessionId function| $ function| jQuery function| getUrlParameter function| getUrlWithParam string| exitsplashpage function| DisplayExitSplash function| addLoadEvent function| addClickEvent function| disablelinksfunc function| disableformsfunc2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
mytgmodel.my/ | Name: PHPSESSID Value: mb56di4isdvfgf8uhenuj53fl4 |
|
nrb2mr0.spotfakes.shop/ | Name: sid Value: t2~tvkz5ycrrsntjveynvvmexcw |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
mytgmodel.my
nrb2mr0.spotfakes.shop
142.251.221.67
172.67.173.125
172.67.207.41
2404:6800:4006:809::200a
2606:4700:3036::ac43:cf29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