www.cheatfiles.org
Open in
urlscan Pro
184.154.68.125
Public Scan
Submission Tags: falconsandbox
Submission: On June 03 via api from US
Summary
This is the only time www.cheatfiles.org was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 17 | 184.154.68.125 184.154.68.125 | 32475 (SINGLEHOP...) (SINGLEHOP-LLC) | |
1 | 2606:4700::68... 2606:4700::6812:bcf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
16 | 2 |
ASN32475 (SINGLEHOP-LLC, US)
PTR: chi10.stablehost.com
www.cheatfiles.org | |
cheatfiles.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
cheatfiles.org
2 redirects
www.cheatfiles.org cheatfiles.org |
871 KB |
1 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
23 KB |
16 | 2 |
Domain | Requested by | |
---|---|---|
15 | www.cheatfiles.org |
2 redirects
www.cheatfiles.org
|
2 | cheatfiles.org |
www.cheatfiles.org
|
1 | maxcdn.bootstrapcdn.com |
www.cheatfiles.org
|
16 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-03-01 - 2022-02-28 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.cheatfiles.org/wow-online-doubloons-generator/
Frame ID: CE0B8985F9051802290E8A5A6E22EACF
Requests: 16 HTTP requests in this frame
Screenshot
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
LiteSpeed (Web Servers) Expand
Detected patterns
- headers server /^LiteSpeed$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 6- http://www.cheatfiles.org/wow-online-doubloons-generator/%C3%A2%E2%82%AC%C2%9D//ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js%C3%A2%E2%82%AC%C2%9D HTTP 301
- http://cheatfiles.org/wow-online-doubloons-generator/%C3%A2%E2%82%AC%C2%9D/ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js%C3%A2%E2%82%AC%C2%9D
- http://www.cheatfiles.org/wow-online-doubloons-generator/images/main-pattern.png HTTP 301
- http://cheatfiles.org/wow-online-doubloons-generator/images/main-pattern.png
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.cheatfiles.org/wow-online-doubloons-generator/ |
7 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
www.cheatfiles.org/wow-online-doubloons-generator/maxcdn.bootstrapcdn.com/bootstrap/3.3.1/css/ |
111 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap-theme.min.css
www.cheatfiles.org/wow-online-doubloons-generator/maxcdn.bootstrapcdn.com/bootstrap/3.3.1/css/ |
19 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
standard.css
www.cheatfiles.org/wow-online-doubloons-generator/css/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.10.2.js
www.cheatfiles.org/wow-online-doubloons-generator/javascript/ |
267 KB 94 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
www.cheatfiles.org/wow-online-doubloons-generator/maxcdn.bootstrapcdn.com/bootstrap/3.3.1/js/ |
35 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
standard.js
www.cheatfiles.org/wow-online-doubloons-generator/javascript/ |
10 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js%C3%A2%E2%82%AC%C2%9D
cheatfiles.org/wow-online-doubloons-generator/%C3%A2%E2%82%AC%C2%9D/ajax.googleapis.com/ajax/libs/jquery/1.11.0/ Redirect Chain
|
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
www.cheatfiles.org/wow-online-doubloons-generator/images/ |
81 KB 81 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a3.png
www.cheatfiles.org/wow-online-doubloons-generator/images/ |
17 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a6.png
www.cheatfiles.org/wow-online-doubloons-generator/images/ |
17 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a5.png
www.cheatfiles.org/wow-online-doubloons-generator/images/ |
17 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Background.jpg
www.cheatfiles.org/wow-online-doubloons-generator/images/ |
583 KB 583 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main-pattern.png
cheatfiles.org/wow-online-doubloons-generator/images/ Redirect Chain
|
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Icon01.png
www.cheatfiles.org/wow-online-doubloons-generator/images/ |
17 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
glyphicons-halflings-regular.woff
maxcdn.bootstrapcdn.com/bootstrap/3.3.1/fonts/ |
23 KB 23 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery object| jQuery11020894670565015085 object| Processes function| NumberWithCommas function| Random function| ProcessStart function| CommentStart boolean| IntervalLeadRunning0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cheatfiles.org
maxcdn.bootstrapcdn.com
www.cheatfiles.org
184.154.68.125
2606:4700::6812:bcf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