Submitted URL: http://hotsamuraiapp.monster/
Effective URL: https://hotsamuraiapp.monster/
Submission: On October 30 via manual from US — Scanned from DE

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 172.67.157.178, located in United States and belongs to CLOUDFLARENET, US. The main domain is hotsamuraiapp.monster.
TLS certificate: Issued by WE1 on October 29th 2024. Valid for: 3 months.
This is the only time hotsamuraiapp.monster was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 172.67.157.178 13335 (CLOUDFLAR...)
1 2
Apex Domain
Subdomains
Transfer
1 hotsamuraiapp.monster
hotsamuraiapp.monster
43 KB
1 1
Domain Requested by
1 hotsamuraiapp.monster
1 1

This site contains links to these domains. Also see Links.

Domain
www.aapanel.com
Subject Issuer Validity Valid
hotsamuraiapp.monster
WE1
2024-10-29 -
2025-01-27
3 months crt.sh

This page contains 1 frames:

Primary Page: https://hotsamuraiapp.monster/
Frame ID: 2A65CC109D89D218C171FEFFD70F8ABA
Requests: 2 HTTP requests in this frame

Screenshot

Page Title

Sorry, the website has been stopped

Page URL History Show full URLs

  1. http://hotsamuraiapp.monster/ HTTP 307
    https://hotsamuraiapp.monster/ Page URL

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

43 kB
Transfer

98 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://hotsamuraiapp.monster/ HTTP 307
    https://hotsamuraiapp.monster/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
hotsamuraiapp.monster/
Redirect Chain
  • http://hotsamuraiapp.monster/
  • https://hotsamuraiapp.monster/
57 KB
43 KB
Document
General
Full URL
https://hotsamuraiapp.monster/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
172.67.157.178 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
d7fac4a9399fb45adc1f0145912815c81c4e7df8d347d74ab881a3859f97b716

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

alt-svc
h3=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
8dace0d52fb5365d-FRA
content-encoding
br
content-type
text/html
date
Wed, 30 Oct 2024 16:45:52 GMT
last-modified
Fri, 19 Apr 2024 06:28:10 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=o35Yiwom9rH2XmATZPXamrlhsVvdN%2BppeUxTwCfFjO65c3%2BVBjs%2B%2B4kmsYDTCQq%2B3vdD0wGRQA0ItlIT6ZNm%2FytLcq30xFz88D2NacdliOIdEqSyT3eq8wk1yIFVF%2BqzMg7ajhLEqT8%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
server-timing
cfL4;desc="?proto=QUIC&rtt=16802&sent=12&recv=9&lost=0&retrans=0&sent_bytes=4172&recv_bytes=4445&delivery_rate=25023&cwnd=12000&unsent_bytes=0&cid=ded9de2f48941d1b&ts=70&x=1" cfHdrFlush;dur=0
vary
Accept-Encoding

Redirect headers

Location
https://hotsamuraiapp.monster/
Non-Authoritative-Reason
HttpsUpgrades
truncated
/
42 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
dad2c33b8c6fe061643b92ad1665b5f4a06f5c70821d60bd4d31bc765d6156cb

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

hotsamuraiapp.monster
172.67.157.178
d7fac4a9399fb45adc1f0145912815c81c4e7df8d347d74ab881a3859f97b716
dad2c33b8c6fe061643b92ad1665b5f4a06f5c70821d60bd4d31bc765d6156cb