Submitted URL: https://28906337-28255-ex.situnifecal.com/iCdHCowyNAngZtczvVvMJyJNkNkRvoHRdqxROsyaS58WZJuc948H_MPbVtdmL9PNlN4Dcflyj_rqeuuzHOKnYBaKm6Clu7mK...
Effective URL: https://livinglavida.com/
Submission: On December 17 via api from US — Scanned from US

Summary

This website contacted 3 IPs in 3 countries across 4 domains to perform 4 HTTP transactions. The main IP is 51.89.99.26, located in London, United Kingdom and belongs to OVH OVH SAS, FR. The main domain is livinglavida.com.
TLS certificate: Issued by R11 on November 28th 2024. Valid for: 3 months.
This is the only time livinglavida.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 2 88.208.22.3 39572 (ADVANCEDH...)
1 142.251.179.113 15169 (GOOGLE)
1 3 51.89.99.26 16276 (OVH OVH SAS)
4 3
Apex Domain
Subdomains
Transfer
2 livinglavida.com
livinglavida.com
1 KB
2 situnifecal.com
28906337-28255-ex.situnifecal.com
4 KB
1 denemebonusuz.com
denemebonusuz.com
218 B
1 google.com
ads.google.com — Cisco Umbrella Rank: 23719
4 4
Domain Requested by
2 livinglavida.com 28906337-28255-ex.situnifecal.com
2 28906337-28255-ex.situnifecal.com 1 redirects
1 denemebonusuz.com 1 redirects
1 ads.google.com 28906337-28255-ex.situnifecal.com
4 4

This site contains no links.

Subject Issuer Validity Valid
*.situnifecal.com
R11
2024-11-19 -
2025-02-17
3 months crt.sh
adwords.google.com
WR2
2024-11-04 -
2025-01-27
3 months crt.sh
livinglavida.com
R11
2024-11-28 -
2025-02-26
3 months crt.sh

This page contains 1 frames:

Primary Page: https://livinglavida.com/
Frame ID: D5D3D902B33890196FF4C1535DEA1FED
Requests: 4 HTTP requests in this frame

Screenshot

Page Title

Canary

Page URL History Show full URLs

  1. https://28906337-28255-ex.situnifecal.com/iCdHCowyNAngZtczvVvMJyJNkNkRvoHRdqxROsyaS58WZJuc948H_MPbVtdmL9PNlN4Dcflyj_rq... Page URL
  2. https://28906337-28255-ex.situnifecal.com/iCdHCowyNAngZtczvVvMJyJNkNkRvoHRdqxROsyaS58WZJuc948H_MPbVtdmL9PNlN4Dcflyj_rq... HTTP 307
    https://denemebonusuz.com/ HTTP 301
    https://livinglavida.com/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • <link rel="amphtml"

Page Statistics

4
Requests

100 %
HTTPS

0 %
IPv6

4
Domains

4
Subdomains

3
IPs

3
Countries

4 kB
Transfer

9 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://28906337-28255-ex.situnifecal.com/iCdHCowyNAngZtczvVvMJyJNkNkRvoHRdqxROsyaS58WZJuc948H_MPbVtdmL9PNlN4Dcflyj_rqeuuzHOKnYBaKm6Clu7mKcQYfTr9OpgC3y0DVytBU-QQFk5_V3A?kws=earn%2Cmoney%2Csharing%2Cimages&abl=0&fsb=0&pageUri=https%3A%2F%2Fpictwn.com%2FkCy2qFTWbLuttKAEbNY0RtNg6J...%20312%20...e%22%2C%22%5B%5D%22%5D&focus=1 Page URL
  2. https://28906337-28255-ex.situnifecal.com/iCdHCowyNAngZtczvVvMJyJNkNkRvoHRdqxROsyaS58WZJuc948H_MPbVtdmL9PNlN4Dcflyj_rqeuuzHOKnYBaKm6Clu7mKcQYfTr9OpgC3y0DVytBU-QQFk5_V3A?kws=earn%2Cmoney%2Csharing%2Cimages&abl=0&fsb=0&pageUri=https%3A%2F%2Fpictwn.com%2FkCy2qFTWbLuttKAEbNY0RtNg6J...%20312%20...e%22%2C%22%5B%5D%22%5D&focus=1&pageUri=https%3A%2F%2Fpictwn.com%2Fkcy2qftwbluttkaebny0rtng6j...+312+...e%22%2C%22%5B%5D%22%5D&referer=&jsr=1&abl=0&acrc=1&acrs=own&bdd=%5B%22Mozilla%2F5.0%20(X11%3B%20Linux%20x86_64)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F131.0.0.0%20Safari%2F537.36%22%2C%22false%22%2C%22Linux%20x86_64%22%2C%22WebKit%20WebGL%22%2C%22WebKit%22%2C%22Intel%20Iris%20OpenGL%20Engine%22%2C%22Intel%20Inc.%22%2C%22false%22%2C%22true%22%2C%221600%22%2C%221200%22%2C%221600%22%2C%221200%22%2C%221600%22%2C%221285%22%2C%221600%22%2C%221200%22%2C%221600%22%2C%221200%22%2C%22false%22%2C%221%22%2C%2248%22%2C%220%22%2C%22aaaaaaaacceccceffhillllmmprrsssstttellllpss%22%2C%22Tue%20Dec%2017%202024%2001%3A15%3A27%20GMT-1000%20(Hawaii-Aleutian%20Standard%20Time)%22%2C%22600%22%2C%22en-US%22%2C%22en-US%2Cen%22%2C%22true%22%2C%22true%22%2C%224044038915%22%2C%222697903995%22%2C%222%22%2C%22false%22%2C%22%5B%5D%22%5D HTTP 307
    https://denemebonusuz.com/ HTTP 301
    https://livinglavida.com/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
iCdHCowyNAngZtczvVvMJyJNkNkRvoHRdqxROsyaS58WZJuc948H_MPbVtdmL9PNlN4Dcflyj_rqeuuzHOKnYBaKm6Clu7mKcQYfTr9OpgC3y0DVytBU-QQFk5_V3A
28906337-28255-ex.situnifecal.com/
8 KB
3 KB
Document
General
Full URL
https://28906337-28255-ex.situnifecal.com/iCdHCowyNAngZtczvVvMJyJNkNkRvoHRdqxROsyaS58WZJuc948H_MPbVtdmL9PNlN4Dcflyj_rqeuuzHOKnYBaKm6Clu7mKcQYfTr9OpgC3y0DVytBU-QQFk5_V3A?kws=earn%2Cmoney%2Csharing%2Cimages&abl=0&fsb=0&pageUri=https%3A%2F%2Fpictwn.com%2FkCy2qFTWbLuttKAEbNY0RtNg6J...%20312%20...e%22%2C%22%5B%5D%22%5D&focus=1
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
88.208.22.3 , Netherlands, ASN39572 (ADVANCEDHOSTERS-AS DataWeb Global Group B.V., NL),
Reverse DNS
mail.armadaboard.com
Software
nginx /
Resource Hash
d6187123ec85aad8840eb74851f7a5b5f51ec9ccead0eef0ad21e13bf77d6455

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36

Response headers

accept-ch
Sec-CH-UA, Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Device-Memory
accept-ch-lifetime
31536000
access-control-allow-credentials
true
access-control-allow-origin
*
access-control-max-age
86400
cache-control
private, no-cache, no-store, must-revalidate, max-age=0
content-encoding
gzip
content-type
text/html
date
Tue, 17 Dec 2024 11:15:25 GMT
expires
Tue, 17 Dec 2024 11:15:25 UTC
last-modified
Tue, 17 Dec 2024 11:15:25 UTC
p3p
CP="NOI DEVa TAIa OUR BUS UNI STA"
pragma
no-cache
referrer-policy
unsafe-url
server
nginx
vary
Accept-Encoding
/
ads.google.com/
0
0
Fetch
General
Full URL
https://ads.google.com/
Requested by
Host: 28906337-28255-ex.situnifecal.com
URL: https://28906337-28255-ex.situnifecal.com/iCdHCowyNAngZtczvVvMJyJNkNkRvoHRdqxROsyaS58WZJuc948H_MPbVtdmL9PNlN4Dcflyj_rqeuuzHOKnYBaKm6Clu7mKcQYfTr9OpgC3y0DVytBU-QQFk5_V3A?kws=earn%2Cmoney%2Csharing%2Cimages&abl=0&fsb=0&pageUri=https%3A%2F%2Fpictwn.com%2FkCy2qFTWbLuttKAEbNY0RtNg6J...%20312%20...e%22%2C%22%5B%5D%22%5D&focus=1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.251.179.113 Farmingdale, United States, ASN15169 (GOOGLE, US),
Reverse DNS
pd-in-f113.1e100.net
Software
/
Resource Hash

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer
https://28906337-28255-ex.situnifecal.com/iCdHCowyNAngZtczvVvMJyJNkNkRvoHRdqxROsyaS58WZJuc948H_MPbVtdmL9PNlN4Dcflyj_rqeuuzHOKnYBaKm6Clu7mKcQYfTr9OpgC3y0DVytBU-QQFk5_V3A?kws=earn%2Cmoney%2Csharing%2Cimages&abl=0&fsb=0&pageUri=https%3A%2F%2Fpictwn.com%2FkCy2qFTWbLuttKAEbNY0RtNg6J...%20312%20...e%22%2C%22%5B%5D%22%5D&focus=1

Response headers

alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
1103
date
Tue, 17 Dec 2024 11:15:29 GMT
content-type
text/html; charset=UTF-8
Primary Request /
livinglavida.com/
Redirect Chain
  • https://28906337-28255-ex.situnifecal.com/iCdHCowyNAngZtczvVvMJyJNkNkRvoHRdqxROsyaS58WZJuc948H_MPbVtdmL9PNlN4Dcflyj_rqeuuzHOKnYBaKm6Clu7mKcQYfTr9OpgC3y0DVytBU-QQFk5_V3A?kws=earn%2Cmoney%2Csharing%2...
  • https://denemebonusuz.com/
  • https://livinglavida.com/
376 B
463 B
Document
General
Full URL
https://livinglavida.com/
Requested by
Host: 28906337-28255-ex.situnifecal.com
URL: https://28906337-28255-ex.situnifecal.com/iCdHCowyNAngZtczvVvMJyJNkNkRvoHRdqxROsyaS58WZJuc948H_MPbVtdmL9PNlN4Dcflyj_rqeuuzHOKnYBaKm6Clu7mKcQYfTr9OpgC3y0DVytBU-QQFk5_V3A?kws=earn%2Cmoney%2Csharing%2Cimages&abl=0&fsb=0&pageUri=https%3A%2F%2Fpictwn.com%2FkCy2qFTWbLuttKAEbNY0RtNg6J...%20312%20...e%22%2C%22%5B%5D%22%5D&focus=1
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
51.89.99.26 London, United Kingdom, ASN16276 (OVH OVH SAS, FR),
Reverse DNS
ns3162759.ip-51-89-99.eu
Software
LiteSpeed / lsphp
Resource Hash
226c4470821d6a81571eb50d6682dde1922caf9421e39066d622ce2bb1023e3d

Request headers

Referer
https://28906337-28255-ex.situnifecal.com/iCdHCowyNAngZtczvVvMJyJNkNkRvoHRdqxROsyaS58WZJuc948H_MPbVtdmL9PNlN4Dcflyj_rqeuuzHOKnYBaKm6Clu7mKcQYfTr9OpgC3y0DVytBU-QQFk5_V3A?kws=earn%2Cmoney%2Csharing%2Cimages&abl=0&fsb=0&pageUri=https%3A%2F%2Fpictwn.com%2FkCy2qFTWbLuttKAEbNY0RtNg6J...%20312%20...e%22%2C%22%5B%5D%22%5D&focus=1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
device-memory
8

Response headers

Connection
keep-alive
Content-Encoding
gzip
Content-Type
text/html
Date
Tue, 17 Dec 2024 11:15:32 GMT
Server
LiteSpeed
Transfer-Encoding
chunked
x-powered-by
lsphp

Redirect headers

Connection
keep-alive
Content-Length
818
Content-Type
text/html
Date
Tue, 17 Dec 2024 11:15:30 GMT
Server
LiteSpeed
location
https://livinglavida.com/
x-powered-by
lsphp
favicon.ico
livinglavida.com/
376 B
636 B
Other
General
Full URL
https://livinglavida.com/favicon.ico
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
51.89.99.26 London, United Kingdom, ASN16276 (OVH OVH SAS, FR),
Reverse DNS
ns3162759.ip-51-89-99.eu
Software
LiteSpeed / lsphp
Resource Hash
226c4470821d6a81571eb50d6682dde1922caf9421e39066d622ce2bb1023e3d

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer
https://livinglavida.com/

Response headers

Transfer-Encoding
chunked
Cache-Control
max-age=1814400
Connection
keep-alive
Expires
Tue, 07 Jan 2025 11:15:33 GMT
Date
Tue, 17 Dec 2024 11:15:33 GMT
Content-Type
image/x-icon
x-powered-by
lsphp
Server
LiteSpeed

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

2 Console Messages

Source Level URL
Text
rendering warning URL: https://28906337-28255-ex.situnifecal.com/iCdHCowyNAngZtczvVvMJyJNkNkRvoHRdqxROsyaS58WZJuc948H_MPbVtdmL9PNlN4Dcflyj_rqeuuzHOKnYBaKm6Clu7mKcQYfTr9OpgC3y0DVytBU-QQFk5_V3A?kws=earn%2Cmoney%2Csharing%2Cimages&abl=0&fsb=0&pageUri=https%3A%2F%2Fpictwn.com%2FkCy2qFTWbLuttKAEbNY0RtNg6J...%20312%20...e%22%2C%22%5B%5D%22%5D&focus=1
Message:
[GroupMarkerNotSet(crbug.com/242999)!:A060240474310000]Automatic fallback to software WebGL has been deprecated. Please use the --enable-unsafe-swiftshader flag to opt in to lower security guarantees for trusted content.
network error URL: https://ads.google.com/
Message:
Failed to load resource: the server responded with a status of 429 ()

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

28906337-28255-ex.situnifecal.com
ads.google.com
denemebonusuz.com
livinglavida.com
142.251.179.113
51.89.99.26
88.208.22.3
226c4470821d6a81571eb50d6682dde1922caf9421e39066d622ce2bb1023e3d
d6187123ec85aad8840eb74851f7a5b5f51ec9ccead0eef0ad21e13bf77d6455