www.mysql.support.app.lullycheat.online Open in urlscan Pro
185.11.145.253  Public Scan

URL: https://www.mysql.support.app.lullycheat.online/
Submission: On February 13 via automatic, source certstream-suspicious — Scanned from NL

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 2 HTTP transactions. The main IP is 185.11.145.253, located in Netherlands and belongs to . The main domain is www.mysql.support.app.lullycheat.online.
TLS certificate: Issued by R3 on February 13th 2024. Valid for: 3 months.
This is the only time www.mysql.support.app.lullycheat.online was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 185.11.145.253 ()
2 1
Apex Domain
Subdomains
Transfer
2 lullycheat.online
www.mysql.support.app.lullycheat.online
39 KB
2 1
Domain Requested by
2 www.mysql.support.app.lullycheat.online www.mysql.support.app.lullycheat.online
2 1

This site contains links to these domains. Also see Links.

Domain
cloudstash.net
Subject Issuer Validity Valid
www.mysql.support.app.lullycheat.online
R3
2024-02-13 -
2024-05-13
3 months crt.sh

This page contains 1 frames:

Primary Page: https://www.mysql.support.app.lullycheat.online/
Frame ID: 40F31F800FCE01A66192701AF9672BDA
Requests: 2 HTTP requests in this frame

Screenshot

Page Title

Please Wait

Detected technologies

Overall confidence: 100%
Detected patterns
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

2
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

39 kB
Transfer

96 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.mysql.support.app.lullycheat.online/
2 KB
1 KB
Document
General
Full URL
https://www.mysql.support.app.lullycheat.online/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.11.145.253 , Netherlands, ASN (),
Reverse DNS
Software
openresty /
Resource Hash
db1dea854341b047a1d51cc20f2bf819da5240009e535eb6ce88852f35dc1897

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.160 Safari/537.36
accept-language
nl-NL,nl;q=0.9

Response headers

content-encoding
gzip
content-type
text/html
date
Tue, 13 Feb 2024 20:55:00 GMT
server
openresty
vary
Accept-Encoding
bf.jquery.max.js
www.mysql.support.app.lullycheat.online/
94 KB
38 KB
Script
General
Full URL
https://www.mysql.support.app.lullycheat.online/bf.jquery.max.js
Requested by
Host: www.mysql.support.app.lullycheat.online
URL: https://www.mysql.support.app.lullycheat.online/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.11.145.253 , Netherlands, ASN (),
Reverse DNS
Software
openresty /
Resource Hash
2ecd295d295bec062cedebe177e54b9d6b19fc0a841dc5c178c654c9ccff09c0

Request headers

accept-language
nl-NL,nl;q=0.9
Referer
https://www.mysql.support.app.lullycheat.online/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.160 Safari/537.36

Response headers

date
Tue, 13 Feb 2024 20:55:03 GMT
content-encoding
gzip
last-modified
Tue, 20 Dec 2016 18:17:03 GMT
server
openresty
etag
W/"5859759f-176bb"
vary
Accept-Encoding
content-type
application/javascript
cache-control
no-store

Verdicts & Comments Add Verdict or Comment

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| $ function| jQuery

1 Cookies

Domain/Path Name / Value
.lullycheat.online/ Name: BlazingWebCookie
Value: 8B5G2F8W4zjZzkFHUFQVuq7dMJGVI8zPyrNS8y2o6hzosoAV6erM7OoGU136fQC0

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

www.mysql.support.app.lullycheat.online
185.11.145.253
2ecd295d295bec062cedebe177e54b9d6b19fc0a841dc5c178c654c9ccff09c0
db1dea854341b047a1d51cc20f2bf819da5240009e535eb6ce88852f35dc1897