cheatingxladies.com
Open in
urlscan Pro
104.27.129.198
Malicious Activity!
Public Scan
Effective URL: https://cheatingxladies.com/ykksjqqcl?t=new_server2
Submission: On July 27 via manual from GE
Summary
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on July 25th 2018. Valid for: 6 months.
This is the only time cheatingxladies.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Porn Scam (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 91.234.35.247 91.234.35.247 | 56485 (THEHOST-AS) (THEHOST-AS) | |
1 1 | 195.28.183.126 195.28.183.126 | 15626 (ITLAS) (ITLAS) | |
2 | 104.27.129.198 104.27.129.198 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 2400:cb00:204... 2400:cb00:2048:1::6813:c797 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 52.85.177.250 52.85.177.250 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
1 | 205.185.208.52 205.185.208.52 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
1 | 52.85.177.188 52.85.177.188 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
9 | 7 |
ASN56485 (THEHOST-AS, UA)
PTR: voron.freedomain.thehost.com.ua
www.fkik.us |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cheatingxladies.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdnjs.cloudflare.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: server-52-85-177-250.fra6.r.cloudfront.net
d3ikljl879wvvx.cloudfront.net |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip052.ssl.hwcdn.net
code.jquery.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: server-52-85-177-188.fra6.r.cloudfront.net
d3ikljl879wvvx.cloudfront.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
cloudfront.net
d3ikljl879wvvx.cloudfront.net |
912 KB |
2 |
cheatingxladies.com
cheatingxladies.com |
5 KB |
2 |
fkik.us
www.fkik.us |
1 KB |
1 |
jquery.com
code.jquery.com |
34 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
4 KB |
1 |
herodota.ru
1 redirects
herodota.ru |
681 B |
9 | 6 |
Domain | Requested by | |
---|---|---|
2 | d3ikljl879wvvx.cloudfront.net |
cheatingxladies.com
|
2 | cheatingxladies.com |
www.fkik.us
cheatingxladies.com |
2 | www.fkik.us |
www.fkik.us
|
1 | code.jquery.com |
cheatingxladies.com
|
1 | cdnjs.cloudflare.com |
cheatingxladies.com
|
1 | herodota.ru | 1 redirects |
9 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni227034.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2018-07-25 - 2019-01-31 |
6 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://cheatingxladies.com/ykksjqqcl?t=new_server2
Frame ID: D027D62093D037B5A68E81A657F4D08C
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://www.fkik.us/ Page URL
-
http://herodota.ru/?sliv2&charset=windows-1251&keyword=[KEYWORD]
HTTP 302
https://cheatingxladies.com/ykksjqqcl?t=new_server2 Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://www.fkik.us/ Page URL
-
http://herodota.ru/?sliv2&charset=windows-1251&keyword=[KEYWORD]
HTTP 302
https://cheatingxladies.com/ykksjqqcl?t=new_server2 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
www.fkik.us/ |
679 B 715 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cs2.js
www.fkik.us/ |
299 B 529 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
ykksjqqcl
cheatingxladies.com/ Redirect Chain
|
16 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
animate.min.css
cdnjs.cloudflare.com/ajax/libs/animate.css/3.5.2/ |
52 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
123.png
d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/images/ |
790 KB 790 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-2.2.4.min.js
code.jquery.com/ |
84 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
prm.js
cheatingxladies.com/ |
0 150 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.jpg
d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/images/ |
121 KB 122 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Lato-Regular.ttf
d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- d3ikljl879wvvx.cloudfront.net
- URL
- https://d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/fonts/Lato-Regular.ttf
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Porn Scam (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery string| u4 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
cheatingxladies.com/ | Name: _opl Value: KMUpUbPzIVOEHwEtBjMvvvmwKOyE:37536 |
|
cheatingxladies.com/ | Name: uord Value: edcae74b155c514caa8e4fe32289b480 |
|
cheatingxladies.com/ | Name: k Value: SFMyNTY.g3QAAAAIbQAAABxLTVVwVWJQeklWT0VId0V0QmpNdnZ2bXdLT3lFdAAAAAFkAAVhZmZpZGIAAJKgbQAAAARhdW5xbQAAABV7IjE1NTMiOiJqUkV2bEdrcXl3In1tAAAAA2hpZG0AAAAcS01VcFViUHpJVk9FSHdFdEJqTXZ2dm13S095RW0AAAACcmR0AAAABGQACl9fc3RydWN0X19kABhFbGl4aXIuVGRleC5Sb3RhdGlvbkRhdGFkAA5jbGlja2VkX29mZmVyc3QAAAAAZAAIbGFuZGluZ3NsAAAAAWIAAAK5amQAC3NlZW5fb2ZmZXJzbAAAAAFiAAAcxGptAAAABXN1Yl8xZAADbmlsbQAAAAVzdWJfMmQAA25pbG0AAAAHdHJhY2tlcm0AAAALbmV3X3NlcnZlcjJtAAAAA3VucW0AAAALa0JoTGFqa1pWaUc.WlOEPvpSIsbXjjmqop1lfitNfzfFQOvOrYJpou90POc |
|
.cheatingxladies.com/ | Name: __cfduid Value: dd61551064f24245d9516bf324069b5e91532702967 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
cheatingxladies.com
code.jquery.com
d3ikljl879wvvx.cloudfront.net
herodota.ru
www.fkik.us
d3ikljl879wvvx.cloudfront.net
104.27.129.198
195.28.183.126
205.185.208.52
2400:cb00:2048:1::6813:c797
52.85.177.188
52.85.177.250
91.234.35.247
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
2382899b96baa9dc2313e4bb37fb70075e1412674cec37c7d2b474b8f8c4c728
8fe3fa119255adb5e0c12479331f9e092e85bcff56ab6ecc0510bfa2056b898d
a686d49f3fa9c90d45340f0e26975d8299f165f7091bf88a0597e05db49ed4cc
c676c9d10373826837bbe7edab0ff7155a801137425f254981b36a78a0bb1bc1
e08eb5bb46cf75aa30658f3506f3de8c274af04007e1fbf27f175d0db00cdfe1
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855