looking4fuck.com
Open in
urlscan Pro
2600:9000:26e8:5000:17:d7cd:1540:93a1
Malicious Activity!
Public Scan
Submission: On June 26 via api from GB — Scanned from GB
Summary
TLS certificate: Issued by Amazon RSA 2048 M02 on November 1st 2023. Valid for: a year.
This is the only time looking4fuck.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 2600:9000:26e... 2600:9000:26e8:5000:17:d7cd:1540:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
1 18 | 3.161.82.82 3.161.82.82 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 18.192.170.229 18.192.170.229 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2a00:1450:400... 2a00:1450:4001:810::2008 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2600:9000:211... 2600:9000:211e:9000:10:a4a1:21c0:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
24 | 5 |
ASN16509 (AMAZON-02, US)
PTR: server-3-161-82-82.fra56.r.cloudfront.net
looking4fuck.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-18-192-170-229.eu-central-1.compute.amazonaws.com
bts.insigit.com |
ASN15169 (GOOGLE, US)
www.googletagmanager.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
22 |
looking4fuck.com
1 redirects
looking4fuck.com |
172 KB |
1 |
retarget2core.com
retarget2core.com — Cisco Umbrella Rank: 589451 |
680 B |
1 |
googletagmanager.com
www.googletagmanager.com — Cisco Umbrella Rank: 81 |
78 KB |
1 |
insigit.com
bts.insigit.com — Cisco Umbrella Rank: 657345 |
9 KB |
24 | 4 |
Domain | Requested by | |
---|---|---|
22 | looking4fuck.com |
1 redirects
looking4fuck.com
|
1 | retarget2core.com |
looking4fuck.com
|
1 | www.googletagmanager.com |
looking4fuck.com
|
1 | bts.insigit.com |
looking4fuck.com
|
24 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
looking4fuck.com Amazon RSA 2048 M02 |
2023-11-01 - 2024-11-29 |
a year | crt.sh |
*.google-analytics.com WR2 |
2024-06-03 - 2024-08-26 |
3 months | crt.sh |
retarget2core.com Amazon RSA 2048 M02 |
2023-11-02 - 2024-11-30 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://looking4fuck.com/jump?utm_content={BanName}&tds_ac_id=s1988kro&tds_campaign=b6935tro&utm_campaign=tj_tab&tds_cid=1d550803f54cce12460fd66d5a17f655366ea940&utm_term=mob_lvh_ita_g4556shm_tab&s1=ddn&_tgUrl=aHR0cHM6Ly9sb29raW5nNGZ1Y2suY29tL3Rkcy90Zy9zL2M4MTE5NGY1YTRjMTgwZmU2MWMzMTM2MjkwZTQxYTdmP19fdD0xNjk1ODgxNDgyMzAzJl9fbD0zNjAw&id=22001&tds_oid=22001&tds_host=looking4fuck.com&dci=de1f7dd9e192411bb0c86b0133a7290765fcf42f&tds_id=b6935tro_jump_a_1616077043302&utm_source=dda&s2=general&tds_ao=1
Frame ID: 71AAC624CB19D35B6D68FE2C61C4BB0E
Requests: 24 HTTP requests in this frame
Screenshot
Detected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Google Tag Manager (Tag Managers) Expand
Detected patterns
- <!-- (?:End )?Google Tag Manager -->
- googletagmanager\.com/gtm\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 5- https://looking4fuck.com/bts.js HTTP 301
- https://bts.insigit.com/bts.js
24 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
jump
looking4fuck.com/ |
13 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bd5bac3b03b0d3b25a723cd5778ad0ce.css
looking4fuck.com/landings/22001/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
479a9ecc07b5fdccd3eb1d2b82c8b2fa.js
looking4fuck.com/landings/22001/js/ |
96 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pic.gif
looking4fuck.com/landings/22001/images/ |
116 KB 117 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
intg.js
looking4fuck.com/bridge/ |
339 B 623 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
web-vitals.iife.js
looking4fuck.com/web-vitals@3.3.0/dist/ |
7 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bts.js
bts.insigit.com/ Redirect Chain
|
9 KB 9 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
gtm.js
www.googletagmanager.com/ |
218 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
index.js
looking4fuck.com/bridge/ |
18 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
integration.js
looking4fuck.com/ |
2 KB 1 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ac3fc68831981c704535980c826941a5
retarget2core.com/43fbb6270523e1760fa5f0d2579dea07/ |
35 B 680 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 231 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 230 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 231 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 231 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 230 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 232 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 230 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 231 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 230 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.js
looking4fuck.com/ufis/ |
199 B 454 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 230 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jump-favicon.ico
looking4fuck.com/images/ |
1 KB 442 B |
Other
image/vnd.microsoft.icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
interlayer
looking4fuck.com/tds/ |
0 429 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| event object| fence object| sharedStorage function| $ function| jQuery object| bts object| __bts_p object| adsLayer object| webVitals function| attachScript function| getMainScriptUrl function| checkIsIpad object| google_tag_manager object| google_tag_data2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
looking4fuck.com/ | Name: __bts_cid Value: 226078b227e54c4480bd8a7c355eace0 |
|
.retarget2core.com/ | Name: dci Value: d23b6328c45d45fdaa1ff51b305a3b5375893f6f |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bts.insigit.com
looking4fuck.com
retarget2core.com
www.googletagmanager.com
18.192.170.229
2600:9000:211e:9000:10:a4a1:21c0:93a1
2600:9000:26e8:5000:17:d7cd:1540:93a1
2a00:1450:4001:810::2008
3.161.82.82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