dou1.bin4tgla.com Open in urlscan Pro
2606:4700:3036::6815:555c  Malicious Activity! Public Scan

URL: https://dou1.bin4tgla.com/fpI2Ggql/
Submission: On November 05 via manual from US — Scanned from DE

Summary

This website contacted 4 IPs in 2 countries across 3 domains to perform 4 HTTP transactions. The main IP is 2606:4700:3036::6815:555c, located in United States and belongs to CLOUDFLARENET, US. The main domain is dou1.bin4tgla.com.
TLS certificate: Issued by WE1 on October 3rd 2024. Valid for: 3 months.
This is the only time dou1.bin4tgla.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Google (Online)

Domain & IP information

IP Address AS Autonomous System
2 2606:4700:303... 13335 (CLOUDFLAR...)
1 2a04:4e42::649 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
4 4
Apex Domain
Subdomains
Transfer
2 bin4tgla.com
dou1.bin4tgla.com
19 KB
1 googleusercontent.com
blogger.googleusercontent.com — Cisco Umbrella Rank: 10512
86 KB
1 jquery.com
code.jquery.com — Cisco Umbrella Rank: 791
31 KB
4 3
Domain Requested by
2 dou1.bin4tgla.com
1 blogger.googleusercontent.com dou1.bin4tgla.com
1 code.jquery.com dou1.bin4tgla.com
4 3

This site contains no links.

Subject Issuer Validity Valid
bin4tgla.com
WE1
2024-10-03 -
2025-01-01
3 months crt.sh
*.jquery.com
Sectigo ECC Domain Validation Secure Server CA
2024-06-25 -
2025-06-25
a year crt.sh
*.googleusercontent.com
WR2
2024-10-07 -
2024-12-30
3 months crt.sh

This page contains 1 frames:

Primary Page: https://dou1.bin4tgla.com/fpI2Ggql/
Frame ID: 29A783FC6F632E550DF72F5775805B2D
Requests: 5 HTTP requests in this frame

Screenshot

Page Title


Detected technologies

Overall confidence: 100%
Detected patterns

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

4
Requests

100 %
HTTPS

100 %
IPv6

3
Domains

3
Subdomains

4
IPs

2
Countries

136 kB
Transfer

244 kB
Size

2
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
dou1.bin4tgla.com/fpI2Ggql/
63 KB
18 KB
Document
General
Full URL
https://dou1.bin4tgla.com/fpI2Ggql/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3036::6815:555c , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
eac35ab37a9042783e5620498e4dc60e14628f937de007b9cdf402e7024e7efe

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

alt-svc
h3=":443"; ma=86400
cache-control
no-cache, private
cf-cache-status
DYNAMIC
cf-ray
8ddd8272bae89f48-FRA
content-encoding
br
content-type
text/html; charset=UTF-8
date
Tue, 05 Nov 2024 14:24:49 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mOwVDE4D8A%2Flk87qbuauDX4mAWJgNjjK%2B506Ue4p8tWG4PJA6xA2ZsEOt8q8nedX0FiEbcpCMRm8RyXUdh8QAWQVy68zVg22p%2BoyTr3rh3VyjAdjXvFBfJGZdg5lVg%3D%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
server-timing
cfL4;desc="?proto=TCP&rtt=35895&sent=552&recv=318&lost=0&retrans=0&sent_bytes=511831&recv_bytes=69443&delivery_rate=1858958&cwnd=255&unsent_bytes=0&cid=ec7d60991db94150&ts=1053910&x=0" cfL4;desc="?proto=QUIC&rtt=24462&sent=11&recv=10&lost=0&retrans=0&sent_bytes=4144&recv_bytes=4434&delivery_rate=610&cwnd=12000&unsent_bytes=0&cid=a84d55328b71e6fd&ts=438&x=1" cfHdrFlush;dur=0
vary
accept-encoding
jquery-3.6.0.min.js
code.jquery.com/
87 KB
31 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.6.0.min.js
Requested by
Host: dou1.bin4tgla.com
URL: https://dou1.bin4tgla.com/fpI2Ggql/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42::649 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"
Referer
https://dou1.bin4tgla.com/

Response headers

content-encoding
gzip
etag
W/"28feccc0-15d9d"
age
4768147
x-cache
HIT, HIT
date
Tue, 05 Nov 2024 14:24:49 GMT
content-type
application/javascript; charset=utf-8
last-modified
Fri, 18 Oct 1991 12:00:00 GMT
x-cache-hits
8, 196001
x-served-by
cache-lga21931-LGA, cache-fra-etou8220063-FRA
vary
Accept-Encoding
cache-control
public, max-age=31536000, stale-while-revalidate=604800
x-timer
S1730816690.679134,VS0,VE0
cross-origin-resource-policy
cross-origin
via
1.1 varnish, 1.1 varnish
accept-ranges
bytes
access-control-allow-origin
*
content-length
30875
server
nginx
truncated
/
8 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
93eb80dc01e920eaa7f23f998f67e5a5fc55e02b8e66bd3d8f5fef097d88565f

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
userinter.png
blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdrhY6zM7txEf61nPO67_Cl7rOyCGsyEb9GaIEqe3M-p-yN2nJeBUGCXkDygK7t8xYVcKwSgu4v0_u6EZF5srUh16p0vNl1K8hBeBV8dg-KcOpt7y8vrkamMOU2HxW0STp0JDEp21FWuCWxDXZ...
86 KB
86 KB
Image
General
Full URL
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdrhY6zM7txEf61nPO67_Cl7rOyCGsyEb9GaIEqe3M-p-yN2nJeBUGCXkDygK7t8xYVcKwSgu4v0_u6EZF5srUh16p0vNl1K8hBeBV8dg-KcOpt7y8vrkamMOU2HxW0STp0JDEp21FWuCWxDXZX0EtxoLPSBWR6WwhXZglXIvWXbh24ojuyofD6htY8D4/s3396/userinter.png
Requested by
Host: dou1.bin4tgla.com
URL: https://dou1.bin4tgla.com/fpI2Ggql/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
fife /
Resource Hash
fbbbc78e85dfa4f2b390e6dc2f3850d0f5247d16b5fd525093331572aa79ae84
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://dou1.bin4tgla.com/

Response headers

access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
etag
"v367e"
x-content-type-options
nosniff
expires
Wed, 06 Nov 2024 14:24:49 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
87859
date
Tue, 05 Nov 2024 14:24:49 GMT
x-xss-protection
0
content-type
image/png
vary
Origin
server
fife
content-disposition
inline;filename="userinter.png"
favicon.ico
dou1.bin4tgla.com/
0
749 B
Other
General
Full URL
https://dou1.bin4tgla.com/favicon.ico
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3036::6815:555c , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://dou1.bin4tgla.com/fpI2Ggql/

Response headers

cache-control
max-age=14400
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
content-encoding
br
cf-cache-status
HIT
age
502
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9lzfWJbEGQH8Hv%2B9MthtA33eIN52Vp60zy4HPphyVYYBCEf5wUmz2j9Ha81qDM10Iiv6Fj11PyDp454hK4M5pcHxBYTNRfSEqs8%2B6vgvV70utMszo%2FT8jN2Arj5zXg%3D%3D"}],"group":"cf-nel","max_age":604800}
cf-ray
8ddd8278e8d19f48-FRA
alt-svc
h3=":443"; ma=86400
server-timing
cfL4;desc="?proto=TCP&rtt=35790&sent=367&recv=184&lost=0&retrans=1&sent_bytes=384634&recv_bytes=39116&delivery_rate=1262551&cwnd=4&unsent_bytes=0&cid=11df2d792fffacf6&ts=406843&x=0", cfL4;desc="?proto=QUIC&rtt=22388&sent=31&recv=21&lost=0&retrans=0&sent_bytes=23553&recv_bytes=5807&delivery_rate=364667&cwnd=12000&unsent_bytes=0&cid=a84d55328b71e6fd&ts=1031&x=1", cfHdrFlush;dur=0
date
Tue, 05 Nov 2024 14:24:50 GMT
content-type
text/html; charset=UTF-8
vary
Accept-Encoding
server
cloudflare

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Google (Online)

15 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| YYFFoaKoUP function| $ function| jQuery function| isNumber number| anwser function| loadCaptcha function| verifyCaptcha function| onCheckboxClick function| getRandomInt function| drawRandomLines function| drawRandomDots function| drawRandomEllipses function| drawCaptchaText function| drawCaptcha function| ZiqmgfoUvE

2 Cookies

Domain/Path Name / Value
dou1.bin4tgla.com/ Name: XSRF-TOKEN
Value: eyJpdiI6ImRVZFZIRWdMTTdNM2QwUm1XSjdTeEE9PSIsInZhbHVlIjoieEdyaUlUOFZURDFzRW1rbTkxOGxsRW1Lb3d4alZxSmVXVW5tQnFxMm43UzVCK1R1RHRJOE1XTE05SWJHdUhLUmt2TUlNK05ZUTRDUWVLN2hZMUlZR0VZNnFuY0luNXlqSGE2cUpkOE81MjNLZzZOKzhZbHNBcVVOd2xqS1VhUWMiLCJtYWMiOiI3YzQ0NWE3MWE1Y2RmMTdjMWFjYTA0N2FmYmRhMDdiNjE1MWYwYjAxNGIzZmVjZDFlN2M4ZDE0NTkxNzI3N2ViIiwidGFnIjoiIn0%3D
dou1.bin4tgla.com/ Name: laravel_session
Value: eyJpdiI6Ii9PbmdLb1p2alZ1TVgwT0x0ZEFmK2c9PSIsInZhbHVlIjoiclRxa3VLczF4NmlBdmtuRFJTZ3NTQ1k3bUoxVTA1VFN0eVl6b1R4SmtuMlI1L3E5ZmFrbW9zMk9sdEdNdVpVbEVrYlJNbUNkRzZndXAxSUh4WDZVYVUzcW9tWk1Lb2JMUmRUY0VDdHQyaEYwOWl5VkdVSDBYdUpKR2lsVDJJQ3IiLCJtYWMiOiJjMzhlZjVjZTlkM2M1ZTM1YjY2YmM0NjEzYmY1ZjkxNzkxNGU2NTRmY2RkZjZlNjYzZGUxNTQyZWYwMGZkYzY3IiwidGFnIjoiIn0%3D

3 Console Messages

Source Level URL
Text
javascript warning URL: https://dou1.bin4tgla.com/fpI2Ggql/(Line 21)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://code.jquery.com/jquery-3.6.0.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://dou1.bin4tgla.com/fpI2Ggql/(Line 21)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://code.jquery.com/jquery-3.6.0.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
network error URL: https://dou1.bin4tgla.com/favicon.ico
Message:
Failed to load resource: the server responded with a status of 404 ()