Submitted URL: http://vgfrrtc.click/?it=78bb8ed4896f4d33&k=112&do=f239468acb5744706d5352f303&j=movavi%20video%20editor%2023.5.2%20cr...
Effective URL: https://dpaste.org/Vbpuy/raw
Submission: On March 10 via api from US — Scanned from US

Summary

This website contacted 3 IPs in 1 countries across 3 domains to perform 3 HTTP transactions. The main IP is 2606:4700:3030::ac43:d2c0, located in United States and belongs to CLOUDFLARENET, US. The main domain is dpaste.org.
TLS certificate: Issued by GTS CA 1P5 on January 15th 2024. Valid for: 3 months.
This is the only time dpaste.org was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 2606:4700:303... 13335 (CLOUDFLAR...)
1 2606:4700:303... 13335 (CLOUDFLAR...)
1 2606:4700:303... 13335 (CLOUDFLAR...)
3 3
Apex Domain
Subdomains
Transfer
1 dpaste.org
dpaste.org
882 B
1 jetzlia.click
jetzlia.click
778 B
1 vgfrrtc.click
vgfrrtc.click
882 B
3 3
Domain Requested by
1 dpaste.org jetzlia.click
1 jetzlia.click vgfrrtc.click
1 vgfrrtc.click
3 3

This site contains no links.

Subject Issuer Validity Valid
dpaste.org
GTS CA 1P5
2024-01-15 -
2024-04-14
3 months crt.sh

This page contains 1 frames:

Primary Page: https://dpaste.org/Vbpuy/raw
Frame ID: 9F337C834CEE773B9317D92BF55A8DBC
Requests: 3 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://vgfrrtc.click/?it=78bb8ed4896f4d33&k=112&do=f239468acb5744706d5352f303&j=movavi%20video%20... Page URL
  2. http://jetzlia.click/?65ee3d730e661=4aaf0cf9fd2ced5b036aba55e86b9341&65ee3d730e674=112&65ee3d730e... Page URL
  3. https://dpaste.org/Vbpuy/raw Page URL

Page Statistics

3
Requests

33 %
HTTPS

100 %
IPv6

3
Domains

3
Subdomains

3
IPs

1
Countries

2 kB
Transfer

1 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://vgfrrtc.click/?it=78bb8ed4896f4d33&k=112&do=f239468acb5744706d5352f303&j=movavi%20video%20editor%2023.5.2%20crack%20+%20activation%20key%202023%20download Page URL
  2. http://jetzlia.click/?65ee3d730e661=4aaf0cf9fd2ced5b036aba55e86b9341&65ee3d730e674=112&65ee3d730e676=1_movavi-video-editor-23-5-2-crack-activation-key-2023-download&gkss=305937 Page URL
  3. https://dpaste.org/Vbpuy/raw Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
vgfrrtc.click/
271 B
882 B
Document
General
Full URL
http://vgfrrtc.click/?it=78bb8ed4896f4d33&k=112&do=f239468acb5744706d5352f303&j=movavi%20video%20editor%2023.5.2%20crack%20+%20activation%20key%202023%20download
Protocol
HTTP/1.1
Server
2606:4700:3036::ac43:d7a3 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.111 Safari/537.36
accept-language
en-US,en;q=0.9

Response headers

CF-Cache-Status
DYNAMIC
CF-RAY
8626f7ab58a0c335-EWR
Connection
keep-alive
Content-Encoding
gzip
Content-Type
text/html; charset=UTF-8
Date
Sun, 10 Mar 2024 23:08:35 GMT
NEL
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Report-To
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=17he1DUoY845RgLxISdeoT1gyZpUq7XpfmKSQL6L6naRGvXTPWZi5U6e7gqH30HkSKrivqVp%2FqurFP6Fe%2BD92Y7KBmYLmTuJURZfmuTxwgP2FlxoSIpljtzze3NA6t6iYVjaIjVaSoDHBYyv"}],"group":"cf-nel","max_age":604800}
Server
cloudflare
Transfer-Encoding
chunked
Vary
Accept-Encoding
alt-svc
h3=":443"; ma=86400
/
jetzlia.click/
154 B
778 B
Document
General
Full URL
http://jetzlia.click/?65ee3d730e661=4aaf0cf9fd2ced5b036aba55e86b9341&65ee3d730e674=112&65ee3d730e676=1_movavi-video-editor-23-5-2-crack-activation-key-2023-download&gkss=305937
Requested by
Host: vgfrrtc.click
URL: http://vgfrrtc.click/?it=78bb8ed4896f4d33&k=112&do=f239468acb5744706d5352f303&j=movavi%20video%20editor%2023.5.2%20crack%20+%20activation%20key%202023%20download
Protocol
HTTP/1.1
Server
2606:4700:3034::ac43:c664 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

Referer
http://vgfrrtc.click/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.111 Safari/537.36
accept-language
en-US,en;q=0.9

Response headers

CF-Cache-Status
DYNAMIC
CF-RAY
8626f7b12d3e426b-EWR
Connection
keep-alive
Content-Encoding
gzip
Content-Type
text/html; charset=UTF-8
Date
Sun, 10 Mar 2024 23:08:35 GMT
NEL
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Report-To
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=7fn3ZCYVjoUIsLORQLJtj5PdzyqKCKYMZRRd6WPUAXfATV60LnXLD3Do3BxVEM2apYdKnM62DeEKzMr1YK0vMtapbqgyfoK%2BeiNOZTP0KZPJCEV6JSEnzgpsGLP8Jox%2F42e77nAXRhvgODXt"}],"group":"cf-nel","max_age":604800}
Server
cloudflare
Transfer-Encoding
chunked
alt-svc
h3=":443"; ma=86400
Primary Request raw
dpaste.org/Vbpuy/
534 B
882 B
Document
General
Full URL
https://dpaste.org/Vbpuy/raw
Requested by
Host: jetzlia.click
URL: http://jetzlia.click/?65ee3d730e661=4aaf0cf9fd2ced5b036aba55e86b9341&65ee3d730e674=112&65ee3d730e676=1_movavi-video-editor-23-5-2-crack-activation-key-2023-download&gkss=305937
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3030::ac43:d2c0 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
d6342d92f5cf6fc82bc0ee221228b7407d1daabd87489ff604ad8dd3c95b3b33
Security Headers
Name Value
Content-Security-Policy img-src data:; style-src 'self' 'unsafe-inline'; script-src 'self' 'unsafe-inline'; default-src 'none'
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Referer
http://jetzlia.click/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.111 Safari/537.36
accept-language
en-US,en;q=0.9

Response headers

access-control-allow-origin
*
alt-svc
h3=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
8626f7b788384225-EWR
content-encoding
br
content-language
en
content-security-policy
img-src data:; style-src 'self' 'unsafe-inline'; script-src 'self' 'unsafe-inline'; default-src 'none'
content-type
text/plain;charset=UTF-8
cross-origin-opener-policy
same-origin
date
Sun, 10 Mar 2024 23:08:36 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
referrer-policy
same-origin
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=KyCg5k1%2BWm2z7hKcppJvMKMbD9XJyV5ts3HpBolRGT0Oim2%2Ff3RT%2F1CKcBckSaX7unhnopaQAh%2Bn4MKY7w7guWumQKZRChNloJDXpeCjWE9b9BdVIjUjfXLeZP%2F1HTByupHqRYZzyqFl"}],"group":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Language, Cookie
x-content-type-options
nosniff
x-frame-options
DENY

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

dpaste.org
jetzlia.click
vgfrrtc.click
2606:4700:3030::ac43:d2c0
2606:4700:3034::ac43:c664
2606:4700:3036::ac43:d7a3
d6342d92f5cf6fc82bc0ee221228b7407d1daabd87489ff604ad8dd3c95b3b33