maliciousmeaning.dev
Open in
urlscan Pro
2a06:98c1:3121::3
Public Scan
Effective URL: https://maliciousmeaning.dev/
Submission: On December 02 via api from US — Scanned from NL
Summary
TLS certificate: Issued by GTS CA 1P5 on October 16th 2023. Valid for: 3 months.
This is the only time maliciousmeaning.dev was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
20 | 2a06:98c1:312... 2a06:98c1:3121::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700:310... 2606:4700:310c::ac42:2d0f | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 162.159.133.232 162.159.133.232 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
23 | 4 |
ASN13335 (CLOUDFLARENET, US)
maliciousmeaning.dev | |
fur.dev | |
api.maliciousmeaning.dev |
Apex Domain Subdomains |
Transfer | |
---|---|---|
19 |
maliciousmeaning.dev
maliciousmeaning.dev api.maliciousmeaning.dev |
60 KB |
1 |
discordapp.net
media.discordapp.net — Cisco Umbrella Rank: 5449 |
7 KB |
1 |
fur.dev
fur.dev |
5 KB |
1 |
hubchicken.tk
videos.hubchicken.tk |
1 MB |
23 | 4 |
Domain | Requested by | |
---|---|---|
18 | maliciousmeaning.dev |
maliciousmeaning.dev
|
1 | api.maliciousmeaning.dev |
maliciousmeaning.dev
|
1 | media.discordapp.net |
maliciousmeaning.dev
|
1 | fur.dev |
maliciousmeaning.dev
|
1 | videos.hubchicken.tk |
maliciousmeaning.dev
|
23 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
discord.com |
github.com |
www.roblox.com |
steamcommunity.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
maliciousmeaning.dev GTS CA 1P5 |
2023-10-16 - 2024-01-14 |
3 months | crt.sh |
videos.hubchicken.tk GTS CA 1P5 |
2023-11-30 - 2024-02-28 |
3 months | crt.sh |
fur.dev GTS CA 1P5 |
2023-10-11 - 2024-01-09 |
3 months | crt.sh |
discordapp.net Cloudflare Inc ECC CA-3 |
2023-09-03 - 2024-09-02 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://maliciousmeaning.dev/
Frame ID: EC0D322AB69C78542495BEBC62AD16BF
Requests: 30 HTTP requests in this frame
Screenshot
Page Title
MaliceSteamDiscordGitHubRobloxSteamPage URL History Show full URLs
-
http://maliciousmeaning.dev/
HTTP 307
https://maliciousmeaning.dev/ Page URL
Page Statistics
5 Outgoing links
These are links going to different origins than the main page.
Title: Discord
Search URL Search Domain Scan URL
Title: GitHub
Search URL Search Domain Scan URL
Title: Roblox
Search URL Search Domain Scan URL
Title: Steam
Search URL Search Domain Scan URL
Title: Invite Solvalou
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://maliciousmeaning.dev/
HTTP 307
https://maliciousmeaning.dev/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
23 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
maliciousmeaning.dev/ Redirect Chain
|
9 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0.58b9e2ce.css
maliciousmeaning.dev/_app/immutable/assets/ |
255 B 531 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.bc2d771b.css
maliciousmeaning.dev/_app/immutable/assets/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
start.1542b96b.js
maliciousmeaning.dev/_app/immutable/entry/ |
23 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.c7f46dad.js
maliciousmeaning.dev/_app/immutable/chunks/ |
9 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
singletons.149c1084.js
maliciousmeaning.dev/_app/immutable/chunks/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.5603690f.js
maliciousmeaning.dev/_app/immutable/entry/ |
6 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0.16a04436.js
maliciousmeaning.dev/_app/immutable/nodes/ |
545 B 777 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.33db0312.js
maliciousmeaning.dev/_app/immutable/nodes/ |
14 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
enjoy_the_holidays.mov
videos.hubchicken.tk/ |
1 MB 1 MB |
Media
video/quicktime |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dotlogoutbg.png
fur.dev/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Bios%20Regular.woff2
maliciousmeaning.dev/ |
4 KB 5 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
547 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
552 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
380 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
255 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
M.png
maliciousmeaning.dev/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
A.png
maliciousmeaning.dev/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
L.png
maliciousmeaning.dev/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
I.png
maliciousmeaning.dev/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
C.png
maliciousmeaning.dev/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
E.png
maliciousmeaning.dev/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
arrow.svg
maliciousmeaning.dev/ |
227 B 809 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Solvalou.png
media.discordapp.net/attachments/909641064460197939/1143321132829790208/ |
6 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
177 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
351 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
242 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
1.b9fcd73b.js
maliciousmeaning.dev/_app/immutable/nodes/ |
981 B 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
steam
api.maliciousmeaning.dev/ |
536 B 891 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
steam
api.maliciousmeaning.dev/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- api.maliciousmeaning.dev
- URL
- https://api.maliciousmeaning.dev/steam
Verdicts & Comments Add Verdict or Comment
2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture object| __sveltekit_13ct1dg1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.discordapp.net/ | Name: __cfruid Value: 5efbd36393eccab510b3fda77e3e09bda5e8a9bd-1701542476 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=63072000 |
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
api.maliciousmeaning.dev
fur.dev
maliciousmeaning.dev
media.discordapp.net
videos.hubchicken.tk
api.maliciousmeaning.dev
162.159.133.232
2606:4700:310c::ac42:2d0f
2a06:98c1:3121::3
08fadf93a26ebee2bfe42dd8c721225752ca4d1adfc10e0ed9a82ec2c7b770f1
145287b36883dd3061ca7aa9229a8fa9ace2cccd50e0382b4b6201f3916b57c5
1965aeb55b90f25a72efd7bd5767f3a05c5dced0b41f441701ca37c6ab6e2672
1f4513a435d6a3047d20a50c1e7d4263de42146c74be227f774b5e82e6357e75
3633b0f6f18e4f95f8fdfe839b3c1a84cff9f925bd93a0af3ee8ac27cb9af90e
3c44025713a274dd693fccafb04a71725924f00f36cf1ed014918522b478355f
4015a20324d78f9c73dc8b3aa4e6607a8585035f7275df899380ce2b7e11ea4c
4821d5f37170a10f872cd1ca56ff55a28014511f322639303d8f34a96b3942f7
4c8efe9c7b66b0cc597e5476b8833e9f831d0e80202041a57e08b5be9313fc12
4df8212a400af0f15319b489732ce4da78904645bc6324843c056d55d9385268
58b9e2ce47071db915519686e427dee7c8584eff0cbb3b82f53196f3cc4de947
5dc606cc065d5edca0d7d7b4803735c02e2ddbb937379c5bdc356762f89c8f72
62f3f809487194fcc55a3ebd88811a604ae496027bb425d4ebd15d9ae1921945
6df9b6c2c694cfc06a440d43cc70e5e97443649f7c81e6111172cf6afb864c7e
717f6bb5f6cc69c444f54376a72dee0ca7968b2a12e7c9475247ec85c0e75a53
7989038fbe51ceb81d780ef3ce23f35e93e7b87751e19779c8859e70b95a0b8d
7bc5429f80f853c962b7d2798706ae12417fa0ae68abeac9537df92f0d299db6
a47dcdd49501d8d911c740fb1f3c44ad3017b6e6bd6a4e6141a84642417493f5
af6c91ef481bdba861e1f15497b0b5ea42db97e0789247d992fe8f1323d627e8
baf07de2e9b0f106bea865851e4f86cd39899ac971870867a728a67f6fa2f792
bc2d771be0d3816987041eb7f35ac27373b216f38d8e4e51255cd3d8546d99ee
c1c7592225afae3b88666153c9668398d2ddfb56efeed39d40715126658daf81
c3fa870a06ebbbfb87b5bd754d89bd09db99218b2c91bd603680e71d7f099ec0
d692a67352a3dfa80010c86a62761cfff05c0b1086618106a8576cc45a6a8115
d958d7efef117038bb42d18c1d75c2968dbfadd6c690e1277a0045c3c1806829
e42253ec12a1daee589a9aa8651ddb648540e37fd89844b5643e0b2cdd2bc9a4
eb14baeac955bb11e33cd7fd3fd2f698cf20db1b450325f45ea843b6cdc82366
ecde847b266543f282c1520aebd6e3d909f0ee4cb566c5cb43435ae4d3f4e768
ff57a34fd21a79e07f624fd0d98fe79e14d57565db9faf2c0d79dcd2579255eb