URL: http://aeroman.su/
Submission Tags: ae su 💩 ru l4ing mass h8 Search All
Submission: On January 21 via manual from UA — Scanned from DE

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 2 HTTP transactions. The main IP is 185.50.25.35, located in Russian Federation and belongs to BEGET-AS, RU. The main domain is aeroman.su.
This is the only time aeroman.su was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 185.50.25.35 198610 (BEGET-AS)
2 2
Apex Domain
Subdomains
Transfer
1 aeroman.su
aeroman.su
276 B
0 meeetandfuck.com Failed
lnevd.meeetandfuck.com Failed
2 2
Domain Requested by
1 aeroman.su
0 lnevd.meeetandfuck.com Failed
2 2

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Frame: https://lnevd.meeetandfuck.com/c/da57dc555e50572d?s1=17006&s2=798058&j1=1&j3=1
Frame ID: 32C0B1A48238BE9FB203513B9C98E099
Requests: 2 HTTP requests in this frame

Screenshot


Page Statistics

2
Requests

0 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

0 kB
Transfer

0 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • https://clck.ru/H3unj HTTP 302
  • https://sba.yandex.net/redirect?url=https%3A%2F%2Flnevd.meeetandfuck.com%2Fc%2Fda57dc555e50572d%3Fs1%3D17006%26s2%3D798058%26j1%3D1%26j3%3D1&client=clck&sign=0f8670dc55a2856ce88eb2f9019d2c08 HTTP 302
  • https://lnevd.meeetandfuck.com/c/da57dc555e50572d?s1=17006&s2=798058&j1=1&j3=1

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
aeroman.su/
69 B
276 B
Document
General
Full URL
http://aeroman.su/
Protocol
HTTP/1.1
Server
185.50.25.35 , Russian Federation, ASN198610 (BEGET-AS, RU),
Reverse DNS
m2.free2.beget.com
Software
nginx-reuseport/1.21.1 / PHP/5.6.40
Resource Hash
1caf6fef922565645a569b15f047678193e61a1fe33f77165971553101832a7c

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.5414.74 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Connection
keep-alive
Content-Length
69
Content-Type
text/html
Date
Sat, 21 Jan 2023 16:42:26 GMT
Keep-Alive
timeout=30
Server
nginx-reuseport/1.21.1
X-Powered-By
PHP/5.6.40
da57dc555e50572d
lnevd.meeetandfuck.com/c/
Redirect Chain
  • https://clck.ru/H3unj
  • https://sba.yandex.net/redirect?url=https%3A%2F%2Flnevd.meeetandfuck.com%2Fc%2Fda57dc555e50572d%3Fs1%3D17006%26s2%3D798058%26j1%3D1%26j3%3D1&client=clck&sign=0f8670dc55a2856ce88eb2f9019d2c08
  • https://lnevd.meeetandfuck.com/c/da57dc555e50572d?s1=17006&s2=798058&j1=1&j3=1
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
lnevd.meeetandfuck.com
URL
https://lnevd.meeetandfuck.com/c/da57dc555e50572d?s1=17006&s2=798058&j1=1&j3=1

Verdicts & Comments Add Verdict or Comment

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| oncontentvisibilityautostatechange

1 Cookies

Domain/Path Name / Value
.clck.ru/ Name: _yasc
Value: Rd/uT5RBtDh+ahHP1cTBO6y5bynjYhm8QgyKMrBMqmWSOGY9ntnn6PKlvW7f

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

aeroman.su
lnevd.meeetandfuck.com
lnevd.meeetandfuck.com
185.50.25.35
1caf6fef922565645a569b15f047678193e61a1fe33f77165971553101832a7c