befjajh.offerdate.link
Open in
urlscan Pro
176.123.10.32
Malicious Activity!
Public Scan
Effective URL: https://befjajh.offerdate.link/s/62cf1c2250951?track=looker3
Submission: On May 28 via manual from PL — Scanned from PL
Summary
TLS certificate: Issued by R3 on April 25th 2024. Valid for: 3 months.
This is the only time befjajh.offerdate.link was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Porn Scam (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 67.199.248.11 67.199.248.11 | 396982 (GOOGLE-CL...) (GOOGLE-CLOUD-PLATFORM) | |
2 | 173.201.177.53 173.201.177.53 | 398101 (GO-DADDY-...) (GO-DADDY-COM-LLC) | |
1 | 88.214.27.56 88.214.27.56 | 209272 (AS-ALVIVA) (AS-ALVIVA) | |
1 | 13.32.99.103 13.32.99.103 | 16509 (AMAZON-02) (AMAZON-02) | |
9 | 176.123.10.32 176.123.10.32 | 200019 (ALEXHOST) (ALEXHOST) | |
1 | 216.58.212.138 216.58.212.138 | 15169 (GOOGLE) (GOOGLE) | |
2 | 142.250.186.163 142.250.186.163 | 15169 (GOOGLE) (GOOGLE) | |
16 | 6 |
ASN398101 (GO-DADDY-COM-LLC, US)
PTR: ip-173-201-177-53.ip.secureserver.net
www.ziangzhao.com |
ASN16509 (AMAZON-02, US)
PTR: server-13-32-99-103.fra60.r.cloudfront.net
openfpcdn.io |
ASN15169 (GOOGLE, US)
PTR: ams15s21-in-f10.1e100.net
fonts.googleapis.com |
ASN15169 (GOOGLE, US)
PTR: fra24s08-in-f3.1e100.net
fonts.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
offerdate.link
befjajh.offerdate.link |
89 KB |
2 |
gstatic.com
fonts.gstatic.com |
36 KB |
2 |
ziangzhao.com
www.ziangzhao.com |
571 B |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 33 |
968 B |
1 |
openfpcdn.io
openfpcdn.io — Cisco Umbrella Rank: 17607 |
5 KB |
1 |
blueredapple.com
blueredapple.com |
1 KB |
1 |
bit.ly
1 redirects
bit.ly — Cisco Umbrella Rank: 6755 |
326 B |
16 | 7 |
Domain | Requested by | |
---|---|---|
9 | befjajh.offerdate.link |
blueredapple.com
befjajh.offerdate.link |
2 | fonts.gstatic.com |
befjajh.offerdate.link
|
2 | www.ziangzhao.com | |
1 | fonts.googleapis.com |
befjajh.offerdate.link
|
1 | openfpcdn.io |
blueredapple.com
|
1 | blueredapple.com | |
1 | bit.ly | 1 redirects |
16 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ziangzhao.com ziangzhao.com |
2022-09-16 - 2023-09-16 |
a year | crt.sh |
localhost localhost |
2019-11-05 - 2047-03-22 |
27 years | crt.sh |
openfpcdn.io Amazon RSA 2048 M02 |
2023-12-27 - 2025-01-25 |
a year | crt.sh |
offerdate.link R3 |
2024-04-25 - 2024-07-24 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-05-13 - 2024-08-05 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-05-13 - 2024-08-05 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://befjajh.offerdate.link/s/62cf1c2250951?track=looker3
Frame ID: AEFA4E08A81D7C1C469B0549BB2FCF13
Requests: 16 HTTP requests in this frame
Screenshot
Page Title
Ważne!Page URL History Show full URLs
-
https://bit.ly/3K61k0F
HTTP 301
http://www.ziangzhao.com/Sandbox/unsprinklered/meathook_cholesteatoma.html?ote=o14vg5l HTTP 307
https://www.ziangzhao.com/Sandbox/unsprinklered/meathook_cholesteatoma.html?ote=o14vg5l Page URL
-
http://blueredapple.com/
HTTP 307
https://blueredapple.com/ Page URL
- https://befjajh.offerdate.link/s/62cf1c2250951?track=looker3 Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://bit.ly/3K61k0F
HTTP 301
http://www.ziangzhao.com/Sandbox/unsprinklered/meathook_cholesteatoma.html?ote=o14vg5l HTTP 307
https://www.ziangzhao.com/Sandbox/unsprinklered/meathook_cholesteatoma.html?ote=o14vg5l Page URL
-
http://blueredapple.com/
HTTP 307
https://blueredapple.com/ Page URL
- https://befjajh.offerdate.link/s/62cf1c2250951?track=looker3 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://bit.ly/3K61k0F HTTP 301
- http://www.ziangzhao.com/Sandbox/unsprinklered/meathook_cholesteatoma.html?ote=o14vg5l HTTP 307
- https://www.ziangzhao.com/Sandbox/unsprinklered/meathook_cholesteatoma.html?ote=o14vg5l
- http://blueredapple.com/ HTTP 307
- https://blueredapple.com/
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
meathook_cholesteatoma.html
www.ziangzhao.com/Sandbox/unsprinklered/ Redirect Chain
|
96 B 206 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
blueredapple.com/ Redirect Chain
|
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
www.ziangzhao.com/ |
315 B 365 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
v1
openfpcdn.io/botd/ |
15 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
62cf1c2250951
befjajh.offerdate.link/s/ |
45 KB 18 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
befjajh.offerdate.link/bundle/224/assets/css/ |
9 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
befjajh.offerdate.link/bundle/224/assets/js/ |
86 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
functions.js
befjajh.offerdate.link/bundle/224/assets/js/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1__4_.mp4
befjajh.offerdate.link/bundle/224/assets/img/ |
80 KB 0 |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 968 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1__4_.mp4
befjajh.offerdate.link/bundle/224/assets/img/ |
33 KB 34 KB |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
JTUSjIg1_i6t8kCHKm459Wlhyw.woff2
fonts.gstatic.com/s/montserrat/v14/ |
19 KB 19 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
JTUSjIg1_i6t8kCHKm459Wdhyzbi.woff2
fonts.gstatic.com/s/montserrat/v14/ |
17 KB 17 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
track.php
befjajh.offerdate.link/ |
0 277 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1__4_.mp4
befjajh.offerdate.link/bundle/224/assets/img/ |
2 MB 0 |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.png
befjajh.offerdate.link/bundle/224/assets/img/ |
2 KB 2 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Porn Scam (Online)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery string| cf boolean| exitPopunder string| fpDataEncoded function| sendTrack function| Fingerprint2 function| fingerprintGo function| collectTrackParams function| closingConfirm function| handleError function| getParameterByName function| collectParams function| checkRequired function| setLeadInfo function| setCF3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.bit.ly/ | Name: _bit Value: o4sljD-b10a8df2c418b4c9f9-00h |
|
.offerdate.link/ | Name: s Value: fMpyOaXlIbbumB9EY2Cjn59mJXuekLwcPlSXVN5pQVDShvZI7w19E4bVzUGJA%2BibciSJGhRK7kovPk%2BgXXiwlCB%2B3vmTHpxV%2FQy4d6xLDUdy%2FbgqbAImsVzfMOOvmpg4LOn2ZxW5RoL3h5uA5OsK17w0CIworQkHsklGoQE%2FG0vx38mN%2BJ5b7ZdjeDhCnIo5qivje5xuOvO%2FTcnkIn7XsDAHdYB%2FNEP0QtpdshvkcU%2FQzNE85ERTIVxsuZc5nX%2BRLutgDLfyRHAe9sb6BwroM2Y6IRnKMnNCoeev0MA65ste1eewcs6atX5%2BsxpL656hbUws%2BVg0cwoVlf9myU7RTRsrkhs%2FKiA8O3LA4Kjcwq4UbO9Xca2nGvq16lLg3%2F90Ehj%2BZq6ou4b3HhSZiewo0OCR5LzwOOhPwgu5Oi7Wxuesy5EuKv5MetNO6WS4ge2hFJYwHhlsp%2B5G7%2FHUucR3RGG2iAab9UNrN1PYfYoQzKBczKy8RAGwpclV5hlMHxoT3a9X0ESNLJuMhEhI7F%2B473yMhbJC3i1Bc0wGAsfrErsYZNTv7VZjzKF3Q2HKjYSEB6x21zx%2BwWl2qI3Qm%2FvPRJUqK7L0AScZ2tDhVrNfzJkvZDZZeKdTwPPHM4prWjfiEsGfx94%2F02twlOIPjHpTFZ%2BNDN0IP%2BkDqrcsaKhAzZolt9bjrHmUsuv2HXP208RxXpZ%2FwRoebAlOb0MB6GRgOEViFAtVJIjSdRoPJXumuuEfGScu6h532pWj1yw8OFsfzVx1fIbqUnBlIxecgWnyj2xtR4Wb8Ze4laLt4h%2B5OtpAfOA5curLJ0dbWsGA%2FL%2FBI9Qj8%2BPF3E08VXak7Qgo63WyPeaCAAIZnGCx2kbaI08gSGAwCgbCNH%2BK0z58WgLm2Fq4NM4NUpqoezClN9b4zef0My2CaJeSdljkaybRnSij1Nk%2BNBqK2aWNhFzuQR9qYwuZIAn9Sr3DiKQ0JBG2cmK0s%2FIVO%2B42JOwVbR0FFzWC5zRHQD%2FNIdFQ4LCZWAWKkzYkABLqQLOuZ1HnLLLKJqhDNT3B76HDOknfuocPq3646IQvJzCpAuFotjn2a72SiWP0Vz854EEGX0IxflwQQcIsvT79MVF0OWc23p0UmQuySzz0zP9tQOJ6EEtElwLKaZhy5QD3oyZJkxWJrxkWwoT3wEddhQ10UL9SvcuRZgoEpE0Qttt%2FrU6cRaOAd%2FTytZ6eNi%2BLESY5W%2FhxZOzxetvTW%2FW%2FmiQjqH3nWKcmxF5bBOg%2BWkDVledEdSC%2FkMplBUcurDt4OFdzGG7P%2Fnx6VQF91M6mzDL00yyv3AX3sYr0ha16Q5ZV7oO08rVIXjhpcf%2FzAXxn3YDkzwozUISuiFXV8oq7lEQwTp7zQbzfG1aAsFVewtiRxBdEsz6ZIda%2B3ah0YsolLFfrpr0vYUsaTy1cNms4eW5PCAZFNdUuAy%2Ft0y6wMr7dtkkwOVZo0gUGlfwsjQMZExnNSNO8O3Pdy5z%2FTzwXaOCRkkpGN466FH7U0c%2F02TlCOM7O6Zhr1TqEj3AZhMd1%2BbBpw8plPPUv25OiGw9dIALXE76ddVclCOYR%2FuHrLkf5HKPdt%2BpsJeJB8bY4kQlJmrxjOK3RSo1UI5LlDpPQspfZowQ%2FBJuz3CnmbTSV1x%2B6rDfvM%2FU7hg4CAL6oSioD3Hu22QEUhImLl37%2Fn12nl4noEjbAGmuYzitPnrsC%2B7tThdJd55KHX5dPK2AdwOJaQ%2F%2FqT9VW6e8l4R3Qap83KmJlsRfBcPI1PVy10aJvbCl1mQxv4wC5Z6y0QHf4Vnu%2F2mlo9IuxeiHL%2FViirbbR2dthEDmpORhVKq3ityf59vq7giVXkbFOYS4odcjPLmuQmy7L%2Fj2xxD5FAA0F%2FsZ2Uff3rFxVcm4Ki57Ci85F1yIBh3wG1QwLqbE%3D |
|
befjajh.offerdate.link/ | Name: CF Value: f0neh86CTeE2N/GSSnydUA__ |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
befjajh.offerdate.link
bit.ly
blueredapple.com
fonts.googleapis.com
fonts.gstatic.com
openfpcdn.io
www.ziangzhao.com
13.32.99.103
142.250.186.163
173.201.177.53
176.123.10.32
216.58.212.138
67.199.248.11
88.214.27.56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