looking4fuck.com
Open in
urlscan Pro
2600:9000:26e8:8c00:17:d7cd:1540:93a1
Malicious Activity!
Public Scan
Submission: On June 26 via api from GB — Scanned from GB
Summary
TLS certificate: Issued by Amazon RSA 2048 M02 on November 1st 2023. Valid for: a year.
This is the only time looking4fuck.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 2600:9000:26e... 2600:9000:26e8:8c00:17:d7cd:1540:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
1 18 | 3.161.82.87 3.161.82.87 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 18.195.253.181 18.195.253.181 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2a00:1450:400... 2a00:1450:4001:810::2008 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2600:9000:211... 2600:9000:211e:c200:10:a4a1:21c0:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
24 | 5 |
ASN16509 (AMAZON-02, US)
PTR: server-3-161-82-87.fra56.r.cloudfront.net
looking4fuck.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-18-195-253-181.eu-central-1.compute.amazonaws.com
bts.insigit.com |
ASN15169 (GOOGLE, US)
www.googletagmanager.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
22 |
looking4fuck.com
1 redirects
looking4fuck.com |
172 KB |
1 |
retarget2core.com
retarget2core.com — Cisco Umbrella Rank: 589451 |
679 B |
1 |
googletagmanager.com
www.googletagmanager.com — Cisco Umbrella Rank: 81 |
78 KB |
1 |
insigit.com
bts.insigit.com — Cisco Umbrella Rank: 657345 |
9 KB |
24 | 4 |
Domain | Requested by | |
---|---|---|
22 | looking4fuck.com |
1 redirects
looking4fuck.com
|
1 | retarget2core.com |
looking4fuck.com
|
1 | www.googletagmanager.com |
looking4fuck.com
|
1 | bts.insigit.com |
looking4fuck.com
|
24 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
looking4fuck.com Amazon RSA 2048 M02 |
2023-11-01 - 2024-11-29 |
a year | crt.sh |
*.google-analytics.com WR2 |
2024-06-03 - 2024-08-26 |
3 months | crt.sh |
retarget2core.com Amazon RSA 2048 M02 |
2023-11-02 - 2024-11-30 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://looking4fuck.com/jump?tds_campaign=b6935tro&utm_source=dda&s1=ddn&utm_term=mob_lvh_ita_g4556shm_tab&utm_campaign=tj_tab&tds_host=looking4fuck.com&utm_content={BanName}&tds_id=b6935tro_jump_a_1616077043302&tds_cid=74179576498dd1743f53b03441b00775e4ea523a&s2=general&tds_ac_id=s1988kro&tds_oid=22001&id=22001&dci=5c235ad0374e91eb84f9a686df7c6c2ad385ae75&_tgUrl=aHR0cHM6Ly9sb29raW5nNGZ1Y2suY29tL3Rkcy90Zy9zLzY3YTU5NGJhOWYwMjk1ZDM4YTAwZWNkMDJkYmE2ZmQwP19fdD0xNzExMDQ5MDI3NDU0Jl9fbD0zNjAwJl9fYz03NDE3OTU3NjQ5OGRkMTc0M2Y1M2IwMzQ0MWIwMDc3NWU0ZWE1MjNh&tds_ao=1
Frame ID: E9852757F6A837FF4E5992FEBF0AF8FA
Requests: 24 HTTP requests in this frame
Screenshot
Detected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Google Tag Manager (Tag Managers) Expand
Detected patterns
- <!-- (?:End )?Google Tag Manager -->
- googletagmanager\.com/gtm\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 5- https://looking4fuck.com/bts.js HTTP 301
- https://bts.insigit.com/bts.js
24 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
jump
looking4fuck.com/ |
13 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bd5bac3b03b0d3b25a723cd5778ad0ce.css
looking4fuck.com/landings/22001/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
479a9ecc07b5fdccd3eb1d2b82c8b2fa.js
looking4fuck.com/landings/22001/js/ |
96 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pic.gif
looking4fuck.com/landings/22001/images/ |
116 KB 117 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
intg.js
looking4fuck.com/bridge/ |
339 B 623 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
web-vitals.iife.js
looking4fuck.com/web-vitals@3.3.0/dist/ |
7 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bts.js
bts.insigit.com/ Redirect Chain
|
9 KB 9 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
gtm.js
www.googletagmanager.com/ |
219 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
index.js
looking4fuck.com/bridge/ |
18 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
integration.js
looking4fuck.com/ |
2 KB 1 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ac3fc68831981c704535980c826941a5
retarget2core.com/43fbb6270523e1760fa5f0d2579dea07/ |
35 B 679 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 231 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 231 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 232 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 232 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 231 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 231 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 231 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 231 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 231 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.js
looking4fuck.com/ufis/ |
199 B 454 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 231 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jump-favicon.ico
looking4fuck.com/images/ |
1 KB 442 B |
Other
image/vnd.microsoft.icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
interlayer
looking4fuck.com/tds/ |
0 430 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| event object| fence object| sharedStorage function| $ function| jQuery object| bts object| __bts_p object| adsLayer object| webVitals function| attachScript function| getMainScriptUrl function| checkIsIpad object| google_tag_manager object| google_tag_data2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
looking4fuck.com/ | Name: __bts_cid Value: f1fdc662ffc446ca99d3168300cb09f6 |
|
.retarget2core.com/ | Name: dci Value: 03bcab2bd34cabaf614947f2e661cad6a156495c |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bts.insigit.com
looking4fuck.com
retarget2core.com
www.googletagmanager.com
18.195.253.181
2600:9000:211e:c200:10:a4a1:21c0:93a1
2600:9000:26e8:8c00:17:d7cd:1540:93a1
2a00:1450:4001:810::2008
3.161.82.87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