train.fen1ijones34.monster
Open in
urlscan Pro
2606:4700:30::681b:9e25
Public Scan
Submission: On January 12 via api from BE
Summary
This is the only time train.fen1ijones34.monster was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 2606:4700:30:... 2606:4700:30::681b:9e25 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
5 | 1 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
train.fen1ijones34.monster |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
fen1ijones34.monster
train.fen1ijones34.monster |
63 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
5 | train.fen1ijones34.monster |
train.fen1ijones34.monster
|
5 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://train.fen1ijones34.monster/links/sXtQ9Q8qd/uei4pJrzK/wQBrbiLHC3/cPhg
Frame ID: 6B6DEF3F87574843154E11A5325892D5
Requests: 5 HTTP requests in this frame
Screenshot
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
cPhg
train.fen1ijones34.monster/links/sXtQ9Q8qd/uei4pJrzK/wQBrbiLHC3/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
flatly.min.css
train.fen1ijones34.monster/bootstrap/themes/ |
124 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
narrow.css
train.fen1ijones34.monster/css/ |
2 KB 1018 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-2.2.1.min.js
train.fen1ijones34.monster/javascript/ |
84 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
train.fen1ijones34.monster/bootstrap/js/ |
36 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
train.fen1ijones34.monster/ | Name: connect.sid Value: s%3A_ZXDNFVXXD3mKoZPI-yUzAVe2LbeTXkq.V51%2BgcTnyw46131g5Uv6Kc%2F%2BV%2BI85eUfGwbKgseUJmA |
|
.fen1ijones34.monster/ | Name: __cfduid Value: d276d327acf42d5c3c06c18f016e85eca1578862724 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
train.fen1ijones34.monster
2606:4700:30::681b:9e25
2979f9a6e32fc42c3e7406339ee9fe76b31d1b52059776a02b4a7fa6a4fd280a
4c11c1778d89dabbd513e4bb51c9b7955f31f488e95134143c973ab6d9d4397e
5061e93f5c62ec51861dbfa8a6ab652f89620e82fcd51254e6a95c8d5b7c9ab0
82f420005cd31fab6b4ab016a07d623e8f5773de90c526777de5ba91e9be3b4d
f4e1250267fd6926365d0053772e41a15c7b7c24c4bd618e4e7c9f40aa2fd7a8