URL: http://arcush.xyz/
Submission: On May 27 via api from DE

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 2 HTTP transactions. The main IP is 207.174.213.34, located in United States and belongs to PUBLIC-DOMAIN-REGISTRY - PDR, US. The main domain is arcush.xyz.
This is the only time arcush.xyz was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Scam (Online)

Domain & IP information

IP Address AS Autonomous System
1 207.174.213.34 394695 (PUBLIC-DO...)
1 2 5.189.219.30 202023 (LLHOST //...)
2 2
Apex Domain
Subdomains
Transfer
2 dirtyflirtbooks1.com
dirtyflirtbooks1.com
224 B
1 arcush.xyz
arcush.xyz
553 B
2 2
Domain Requested by
2 dirtyflirtbooks1.com 1 redirects arcush.xyz
1 arcush.xyz
2 2

This site contains no links.

Subject Issuer Validity Valid
dirtyflirtbooks1.com
Let's Encrypt Authority X3
2019-04-21 -
2019-07-20
3 months crt.sh

This page contains 2 frames:

Primary Page: http://arcush.xyz/
Frame ID: 62FC5138A9EF092F893A83D33DB19DE3
Requests: 1 HTTP requests in this frame

Frame: https://dirtyflirtbooks1.com/?u=b5ekd0x&o=xmwp0zg
Frame ID: 790C1AD844D8399608EC0118786B6D8C
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

2
Requests

50 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

1 kB
Transfer

0 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • http://dirtyflirtbooks1.com/?u=b5ekd0x&o=xmwp0zg HTTP 301
  • https://dirtyflirtbooks1.com/?u=b5ekd0x&o=xmwp0zg

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
arcush.xyz/
352 B
553 B
Document
General
Full URL
http://arcush.xyz/
Protocol
HTTP/1.1
Server
207.174.213.34 , United States, ASN394695 (PUBLIC-DOMAIN-REGISTRY - PDR, US),
Reverse DNS
Software
nginx /
Resource Hash
9254d0304c97bcb773ea80e99aa0e74dadad534cceedb3f13fa4a7921fa4d768
Security Headers
Name Value
X-Frame-Options GOFORIT

Request headers

Host
arcush.xyz
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Server
nginx
Date
Mon, 27 May 2019 09:47:45 GMT
Content-Type
text/html; charset=utf-8
Transfer-Encoding
chunked
Connection
keep-alive
X-Frame-Options
GOFORIT
Cookie set /
dirtyflirtbooks1.com/ Frame 790C
Redirect Chain
  • http://dirtyflirtbooks1.com/?u=b5ekd0x&o=xmwp0zg
  • https://dirtyflirtbooks1.com/?u=b5ekd0x&o=xmwp0zg
0
0
Document
General
Full URL
https://dirtyflirtbooks1.com/?u=b5ekd0x&o=xmwp0zg
Requested by
Host: arcush.xyz
URL: http://arcush.xyz/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
5.189.219.30 , Germany, ASN202023 (LLHOST // M247, RO),
Reverse DNS
Software
nginx/1.12.0 / ASP.NET
Resource Hash

Request headers

Host
dirtyflirtbooks1.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://arcush.xyz/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
http://arcush.xyz/

Response headers

Server
nginx/1.12.0
Date
Mon, 27 May 2019 09:47:45 GMT
Content-Type
text/html
Content-Length
6970
Connection
keep-alive
Cache-Control
private
Set-Cookie
ASP.NET_SessionId=kvwhgwg0wpjymdqto23pxvev; path=/; HttpOnly
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET

Redirect headers

Server
nginx/1.12.0
Date
Mon, 27 May 2019 09:47:45 GMT
Content-Type
text/html
Content-Length
185
Connection
keep-alive
Location
https://dirtyflirtbooks1.com/?u=b5ekd0x&o=xmwp0zg

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Scam (Online)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask

1 Cookies

Domain/Path Name / Value
dirtyflirtbooks1.com/ Name: ASP.NET_SessionId
Value: kvwhgwg0wpjymdqto23pxvev

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Frame-Options GOFORIT

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

arcush.xyz
dirtyflirtbooks1.com
207.174.213.34
5.189.219.30
9254d0304c97bcb773ea80e99aa0e74dadad534cceedb3f13fa4a7921fa4d768