linux.huntingmalware.com
Open in
urlscan Pro
2606:4700:30::681b:97a8
Public Scan
Submission: On November 08 via manual from US
Summary
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on October 17th 2018. Valid for: 6 months.
This is the only time linux.huntingmalware.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
28 | 2606:4700:30:... 2606:4700:30::681b:97a8 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 4 | 2.18.232.222 2.18.232.222 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
1 1 | 23.43.114.50 23.43.114.50 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
31 | 3 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
linux.huntingmalware.com |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a2-18-232-222.deploy.static.akamaitechnologies.com
www.paypalobjects.com |
ASN20940 (AKAMAI-ASN1, US)
PTR: a23-43-114-50.deploy.static.akamaitechnologies.com
ak1s.abmr.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
28 |
huntingmalware.com
linux.huntingmalware.com |
811 KB |
4 |
paypalobjects.com
1 redirects
www.paypalobjects.com |
5 KB |
1 |
abmr.net
1 redirects
ak1s.abmr.net |
687 B |
31 | 3 |
Domain | Requested by | |
---|---|---|
28 | linux.huntingmalware.com |
linux.huntingmalware.com
|
4 | www.paypalobjects.com |
1 redirects
linux.huntingmalware.com
|
1 | ak1s.abmr.net | 1 redirects |
31 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.google.com |
www.mozilla.org |
webkit.org |
www.cuckoosandbox.org |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni109889.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2018-10-17 - 2019-04-25 |
6 months | crt.sh |
www.paypal.com DigiCert SHA2 Extended Validation Server CA |
2018-08-14 - 2020-08-18 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://linux.huntingmalware.com/
Frame ID: F312FD74FB3FE35D6ADD4F91FA71283F
Requests: 32 HTTP requests in this frame
Screenshot
Detected technologies
Python (Programming Languages) ExpandDetected patterns
- html /(?:powered by <a[^>]+>Django ?([\d.]+)?|<input[^>]*name=["']csrfmiddlewaretoken["'][^>]*>)/i
Django (Web Frameworks) Expand
Detected patterns
- html /(?:powered by <a[^>]+>Django ?([\d.]+)?|<input[^>]*name=["']csrfmiddlewaretoken["'][^>]*>)/i
Handlebars (JavaScript Frameworks) Expand
Detected patterns
- env /^Handlebars$/i
PayPal (Payment Processors) Expand
Detected patterns
- html /<input[^>]+_s-xclick/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /cloudflare/i
Moment.js (JavaScript Libraries) Expand
Detected patterns
- env /^moment$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Page Statistics
4 Outgoing links
These are links going to different origins than the main page.
Title: Chrome
Search URL Search Domain Scan URL
Title: Firefox
Search URL Search Domain Scan URL
Title: WebKit
Search URL Search Domain Scan URL
Title: Cuckoo Sandbox
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 15- https://www.paypalobjects.com/en_EU/i/scr/pixel.gif HTTP 302
- https://ak1s.abmr.net/is/www.paypalobjects.com?U=/en_EU/i/scr/pixel.gif&V=3-uIZtWjXS2go32MaRTKevS8un7odPV9ZgWq5lgSilyu4dbVq+23Q+qkMfUwM9stdB&I=842EA64025F5001&D=paypalobjects.com&01AD=1& HTTP 302
- https://www.paypalobjects.com/en_EU/i/scr/pixel.gif?01AD=3Vog_NGhVRzIvy1LJHX4XzZyGenwSrSP3IaUmCuwo0ukcXSlPkidK1A&01RI=842EA64025F5001&01NA=na
31 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
linux.huntingmalware.com/ |
27 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendor.css
linux.huntingmalware.com/static/css/ |
148 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.css
linux.huntingmalware.com/static/css/ |
501 KB 57 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendor.js
linux.huntingmalware.com/static/js/ |
2 MB 504 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
handlebars-templates.js
linux.huntingmalware.com/static/js/ |
44 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hexdump.js
linux.huntingmalware.com/static/js/ |
6 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loader.js
linux.huntingmalware.com/static/js/cuckoo/ |
2 KB 826 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sticky.js
linux.huntingmalware.com/static/js/cuckoo/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
analysis_sidebar.js
linux.huntingmalware.com/static/js/cuckoo/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
submission.js
linux.huntingmalware.com/static/js/cuckoo/ |
84 KB 21 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
process_tree.js
linux.huntingmalware.com/static/js/cuckoo/ |
16 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
recent.js
linux.huntingmalware.com/static/js/cuckoo/ |
7 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
analysis_network.js
linux.huntingmalware.com/static/js/cuckoo/ |
20 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.js
linux.huntingmalware.com/static/js/cuckoo/ |
30 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cuckoo_inverse.png
linux.huntingmalware.com/static/graphic/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
btn_cart_SM.gif
www.paypalobjects.com/en_US/i/btn/ |
2 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
pixel.gif
www.paypalobjects.com/en_EU/i/scr/ Redirect Chain
|
0 653 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
analysis_export.js
linux.huntingmalware.com/static/js/cuckoo/ |
952 B 495 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
analysis_feedback.js
linux.huntingmalware.com/static/js/cuckoo/ |
1 KB 688 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cuckoo-coffee-cup.png
linux.huntingmalware.com/static/graphic/ |
35 KB 35 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
close.png
linux.huntingmalware.com/static/images/ |
280 B 369 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loading.gif
linux.huntingmalware.com/static/images/ |
8 KB 8 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
prev.png
linux.huntingmalware.com/static/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
next.png
linux.huntingmalware.com/static/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome-webfont.woff2
linux.huntingmalware.com/static/fonts/ |
75 KB 76 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Roboto_normal_700_default.woff
linux.huntingmalware.com/static/fonts/ |
13 KB 13 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Roboto_normal_500_default.woff
linux.huntingmalware.com/static/fonts/ |
13 KB 13 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Roboto_normal_400_default.woff
linux.huntingmalware.com/static/fonts/ |
13 KB 13 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
btn_cart_SM.gif
www.paypalobjects.com/en_US/i/btn/ |
2 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
/
linux.huntingmalware.com/analysis/api/tasks/recent/ |
715 B 378 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
status
linux.huntingmalware.com/cuckoo/api/ |
609 B 386 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
43 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
Verdicts & Comments Add Verdict or Comment
44 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| hljs function| Cookies object| Handlebars function| S function| moment function| Color function| Chart object| lightbox object| bowser object| HANDLEBARS_TEMPLATES function| hexy function| Hexy object| base64 function| _createClass function| _classCallCheck function| Loader function| Sticky function| AnalysisSidebar object| DnDUpload function| parseProcessData function| Tree function| PaginationBar function| ProcessBehaviorView function| Recent function| _typeof function| parseHeaderString function| HexView function| RequestDisplay function| PacketDisplay function| CuckooWeb function| PageSwitcher function| DashboardTable function| alertbox function| export_estimate_size function| export_get_files boolean| feedbackFormSubmitted function| send_button_toggle function| feedback_send boolean| task_id object| taken_files object| taken_dirs boolean| cb_analysis2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
linux.huntingmalware.com/ | Name: csrftoken Value: cCV7GAB7ERJA67Sjq0U3QvSMMbzQBtOo |
|
.huntingmalware.com/ | Name: __cfduid Value: df3e33f1d3d214ed063ad294889b858be1541712229 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; |
X-Content-Type-Options | nosniff |
X-Frame-Options | DENY |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ak1s.abmr.net
linux.huntingmalware.com
www.paypalobjects.com
2.18.232.222
23.43.114.50
2606:4700:30::681b:97a8
0e7953a6534f61bd92ac25f94596b5653da2e3163a50636da6cabc7e3cea6b47
14d489b5485e2320621b5c76ad21392671d5a5f94699e99da76d0b98a0e26115
15b869b02c6fbaa8c6c26445a2dd2d9bad80fd27b1409f8179e5dd89dc89d90a
1c35d2f6d264205481905af7c48a94da24b27e749d95aa6ea0f1f5dc60f792e2
225aa88b6ab02c06222ec9468d62e15fa188e39cdb9431d1f55401ad380753ed
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe
2f3dcda69c829ed1eed605ca5f9ce6656dbcf737d7247e5cb4cc8b52e95712ad
3a7860b4c939473af46d410bc04c760e495b30ec94884d41f62c6d838a7ffb7c
55293f28da0996bafa1ac38771d518d64879e76c68f9913e95f072b1a3dcfd19
55ca1bc73a79c7edeb058f4a0898fee14b834f4a8c124e5a18715bf6878578e2
56bd173f6da73cc160192ea96c489984d7e944d1eb5a34ed8ed16419ead12314
5d62e6c90005bfb71f6abb440f9e4753681cb23bbd5e60477ab6f442d2f0e69c
6afd269abac9d41fa13f287cc7786dc05e9ece3632d08b1c9daaed2eb9437883
77767ea0a82d65444af7f6c762e71d06988172ec9e5486538f13b46aa006d0ce
7d74add27326d7f14e97abff147dbe0d6abb2f55f366f606d3d79a318ebd3c4c
7f56d6bb823bec81cd6a6264957e14a022801852a2fbaf16063f5b1c0b7e7224
7fd9273f20fdb1229c224341271a119020a5eee74ccf6b4605730917c864caf2
82ddc881e13c8a9fd1545b19c9f1bd4197d968d422e91de44301e24f509c3e83
9315ebe0bfb730e5837581608aad720894020bb9c51a213bbdf42ede4cd341c0
a089bc05bebca42a4a9985446f614c1801771712e2595b1fbc2b2594f569dc8e
ae9fef3590e372918422a612dcf99565d0c7ca71420f56dd434a9e759808d6b8
b001171d1c894bff9795041ea94d25b3e101da0887b181fb141212f5c3be920b
b07f8e97d6681b72ee4b9ffb68ada8869ca9e9f9ce1e7e05a1666f45876bd327
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b
c14bbd1192c9d657566d6175f7b0be4c28b89c55cc8d34c6547e8fe0dadb11df
d4649bf830ceb95309754defa69de20ee8613fb9e05935133affeb96cf7482fb
e021c49d47857415125caee46294101ee44cd289c1c23c0aa7b348979becb62f
e28374806cd495eee0f6bed50ea4536c7f0a562186c55031a3beb62942b72c3e
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e4d2e971c53038f94f4f730218d33b76b293d95d091ff248e7bf140b87a25c0e
fe605a4002da58909d027d91f11d9f2bf9e3f50ece2a05baf5bbc2e09a7c4cbf