Submitted URL: https://aestu.su/l/BoxNewYear
Effective URL: https://pay1z.pw/d/6399bf98ca352
Submission: On January 03 via manual from AU — Scanned from DE

Summary

This website contacted 2 IPs in 2 countries across 3 domains to perform 3 HTTP transactions. The main IP is 190.115.26.243, located in Belize City, Belize and belongs to DDOS-GUARD CORP., BZ. The main domain is pay1z.pw.
TLS certificate: Issued by R3 on January 2nd 2023. Valid for: 3 months.
This is the only time pay1z.pw was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 2 136.243.14.123 24940 (HETZNER-AS)
2 190.115.26.243 262254 (DDOS-GUAR...)
3 2
Apex Domain
Subdomains
Transfer
2 pay1z.pw
pay1z.pw
30 KB
2 aestu.su
aestu.su
401 B
0 invest-rost-tsc.click Failed
hd.invest-rost-tsc.click Failed
3 3
Domain Requested by
2 pay1z.pw pay1z.pw
2 aestu.su 2 redirects
0 hd.invest-rost-tsc.click Failed pay1z.pw
3 3

This site contains no links.

Subject Issuer Validity Valid
pay1z.pw
R3
2023-01-02 -
2023-04-02
3 months crt.sh

This page contains 1 frames:

Frame: https://hd.invest-rost-tsc.click/offbitbonus_1483/
Frame ID: 9E0B12655B92CF97BE5A21C56285603F
Requests: 3 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://aestu.su/l/BoxNewYear HTTP 302
    https://aestu.su/hidd1.php HTTP 302
    https://pay1z.pw/d/6399bf98ca352 Page URL

Page Statistics

3
Requests

67 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

2
IPs

2
Countries

30 kB
Transfer

31 kB
Size

3
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://aestu.su/l/BoxNewYear HTTP 302
    https://aestu.su/hidd1.php HTTP 302
    https://pay1z.pw/d/6399bf98ca352 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 1
  • https://pay1z.pw/check-unique/index?unique_code=2228ee46dae16d0370533fc00dc50c06&link_type=partner&code=6399bf98ca352&u=&url=https%3A%2F%2Fhd.invest-rost-tsc.click%2Foffbitbonus_1483%2F%3F&upgrade=101b83a97bb75 HTTP 302
  • https://hd.invest-rost-tsc.click/offbitbonus_1483/

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request 6399bf98ca352
pay1z.pw/d/
Redirect Chain
  • https://aestu.su/l/BoxNewYear
  • https://aestu.su/hidd1.php
  • https://pay1z.pw/d/6399bf98ca352?
2 KB
1 KB
Document
General
Full URL
https://pay1z.pw/d/6399bf98ca352?
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
190.115.26.243 Belize City, Belize, ASN262254 (DDOS-GUARD CORP., BZ),
Reverse DNS
Software
nginx /
Resource Hash
e0df1f19c4158fbb967e5618bdafbf17dc9489f08049ffa5882ac365d9ac28ea
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; includeSubdomains; preload
X-Content-Type-Options nosniff

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.124 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

content-encoding
gzip
content-type
text/html; charset=UTF-8
date
Tue, 03 Jan 2023 22:30:20 GMT
server
nginx
strict-transport-security
max-age=15768000; includeSubdomains; preload
x-content-type-options
nosniff

Redirect headers

content-type
text/html; charset=UTF-8
date
Tue, 03 Jan 2023 22:30:22 GMT
location
https://pay1z.pw/d/6399bf98ca352?
server
nginx/1.20.2
strict-transport-security
max-age=31536000;
x-powered-by
PHP/7.4.33
fp21.min.js
pay1z.pw/frontend/web/js/
29 KB
29 KB
Script
General
Full URL
https://pay1z.pw/frontend/web/js/fp21.min.js
Requested by
Host: pay1z.pw
URL: https://pay1z.pw/d/6399bf98ca352?
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
190.115.26.243 Belize City, Belize, ASN262254 (DDOS-GUARD CORP., BZ),
Reverse DNS
Software
nginx /
Resource Hash
af4ac135cf575e46eb783d82f6c659d92afb5e31b647e2ac9d62530c3e371bdb

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://pay1z.pw/d/6399bf98ca352?
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.124 Safari/537.36

Response headers

pragma
public
date
Tue, 03 Jan 2023 22:30:20 GMT
last-modified
Thu, 15 Aug 2019 12:05:02 GMT
server
nginx
etag
"5d554a6e-7309"
content-type
application/javascript
cache-control
max-age=315360000, public, must-revalidate, proxy-revalidate
accept-ranges
bytes
content-length
29449
expires
Thu, 31 Dec 2037 23:55:55 GMT
/
hd.invest-rost-tsc.click/offbitbonus_1483/
Redirect Chain
  • https://pay1z.pw/check-unique/index?unique_code=2228ee46dae16d0370533fc00dc50c06&link_type=partner&code=6399bf98ca352&u=&url=https%3A%2F%2Fhd.invest-rost-tsc.click%2Foffbitbonus_1483%2F%3F&upgrade=...
  • https://hd.invest-rost-tsc.click/offbitbonus_1483/?
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
hd.invest-rost-tsc.click
URL
https://hd.invest-rost-tsc.click/offbitbonus_1483/?

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

3 Cookies

Domain/Path Name / Value
aestu.su/ Name: qwerty_BoxNewYear
Value: 0
pay1z.pw/ Name: aff1377
Value: 47fffbc0ce1f09c23250b72e8f0f481d112c082e5cee55aa73d11fbde79b642fa%3A2%3A%7Bi%3A0%3Bs%3A7%3A%22aff1377%22%3Bi%3A1%3Bs%3A13%3A%226399bf98ca352%22%3B%7D
pay1z.pw/ Name: userHash
Value: 42d94a5dd41bdf05cc8ea0811b4ea8a506b71ce74d1b8dcc78fb04fab1e7be3aa%3A2%3A%7Bi%3A0%3Bs%3A8%3A%22userHash%22%3Bi%3A1%3Bs%3A32%3A%228efc6b8a58ebcc4387fc64ae8718ec44%22%3B%7D

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=15768000; includeSubdomains; preload
X-Content-Type-Options nosniff

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

aestu.su
hd.invest-rost-tsc.click
pay1z.pw
hd.invest-rost-tsc.click
136.243.14.123
190.115.26.243
af4ac135cf575e46eb783d82f6c659d92afb5e31b647e2ac9d62530c3e371bdb
e0df1f19c4158fbb967e5618bdafbf17dc9489f08049ffa5882ac365d9ac28ea