ladieswanttobeowned.com
Open in
urlscan Pro
2606:4700:3034::681c:16e0
Malicious Activity!
Public Scan
Effective URL: https://ladieswanttobeowned.com/lbjseppubzaig?s2=15947002
Submission: On June 04 via api from BE
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on May 5th 2020. Valid for: 5 months.
This is the only time ladieswanttobeowned.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Porn Scam (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 185.243.113.254 185.243.113.254 | 205406 (A2-AMS01 ...) (A2-AMS01 Access2.IT Group B.V.) | |
4 | 2606:4700:303... 2606:4700:3034::681c:16e0 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:815::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:1b | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2a00:1450:400... 2a00:1450:4001:820::2003 | 15169 (GOOGLE) (GOOGLE) | |
8 | 6 |
ASN205406 (A2-AMS01 Access2.IT Group B.V., NL)
PTR: mail.flirtmatcher.info
www.flirtmatcher.info |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
ladieswanttobeowned.com
ladieswanttobeowned.com |
995 KB |
1 |
gstatic.com
fonts.gstatic.com |
13 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
1 |
googleapis.com
fonts.googleapis.com |
639 B |
1 |
flirtmatcher.info
www.flirtmatcher.info |
1 KB |
8 | 5 |
Domain | Requested by | |
---|---|---|
4 | ladieswanttobeowned.com |
www.flirtmatcher.info
ladieswanttobeowned.com code.jquery.com |
1 | fonts.gstatic.com |
ladieswanttobeowned.com
|
1 | code.jquery.com |
ladieswanttobeowned.com
|
1 | fonts.googleapis.com |
ladieswanttobeowned.com
|
1 | www.flirtmatcher.info | |
8 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2020-05-05 - 2020-10-09 |
5 months | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-05-05 - 2020-07-28 |
3 months | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-05-20 - 2020-08-12 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ladieswanttobeowned.com/lbjseppubzaig?s2=15947002
Frame ID: E2ACCBF62ACD3B3EB3BAC6A92568F2BC
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://www.flirtmatcher.info/AdAS67CImEyH1ALqF-Qj-ZuPpSEFrAeeTSkAobNyknbbZ2p6XEEpNF-oMffrEnRaxQ2j5fdsUTGk... Page URL
- https://ladieswanttobeowned.com/lbjseppubzaig?s2=15947002 Page URL
Detected technologies
Ubuntu (Operating Systems) ExpandDetected patterns
- headers server /Ubuntu/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://www.flirtmatcher.info/AdAS67CImEyH1ALqF-Qj-ZuPpSEFrAeeTSkAobNyknbbZ2p6XEEpNF-oMffrEnRaxQ2j5fdsUTGkOMgN-wQP_Uc0a-ZP6uRCt3YmIpR5of0=?s5MvdoA-DmObK5luM936n22fLewn2BOjHeJ_7tMxAod8IRPduB54P6rXuOifInPgy83377iBK2KOVrEwyYq19jJnhp9hNV-FF0nST3iGa_GkwBj3g5Ok4yWimd6cE8MSDRCwFC0uFuhurgvgaFjz7jIcggZHIEfqfmO2kpVZWIMDuC46M8k4CcWpV0KYmegb2l4cS1RpbPnajIjr2eeqwhkcBuMrbeG1OZTtTroNMA5SFJhNkinNkBOue9dezE4DAmxMe-9AFpOuxhQKYNJ-AfMtiGUEbwRLQvU6oRZH9h4= Page URL
- https://ladieswanttobeowned.com/lbjseppubzaig?s2=15947002 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
AdAS67CImEyH1ALqF-Qj-ZuPpSEFrAeeTSkAobNyknbbZ2p6XEEpNF-oMffrEnRaxQ2j5fdsUTGkOMgN-wQP_Uc0a-ZP6uRCt3YmIpR5of0=
www.flirtmatcher.info/ |
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
lbjseppubzaig
ladieswanttobeowned.com/ |
13 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 639 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-2.2.4.min.js
code.jquery.com/ |
84 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
p.js
ladieswanttobeowned.com/ |
416 B 337 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.mp4
ladieswanttobeowned.com/assets/6b8f7e97983b6a17148e12f7015e6b5e/video/ |
974 KB 976 KB |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
715 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
JTUSjIg1_i6t8kCHKm459WlhyyTh89Y.woff2
fonts.gstatic.com/s/montserrat/v14/ |
13 KB 13 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
ladieswanttobeowned.com/DE/f0d944050a2aaf83ba214edf135f48d0/ |
13 KB 13 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Porn Scam (Online)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery string| u3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
ladieswanttobeowned.com/ | Name: uord Value: 5fe42923de475ab0a2847def80a61293 |
|
ladieswanttobeowned.com/ | Name: k Value: SFMyNTY.g3QAAAAIbQAAAARhdW5xdAAAAAFtAAAABDIzMTFtAAAACnBnUFBMZEF4YVJtAAAAA2hpZG0AAAAjUGpVYXNyTk5pT3FFVG1kU3p6d3hBd1BhYUJqZ2hYRVBIYkVtAAAAAmhsZAADbmlsbQAAAAJyZHQAAAAEZAAKX19zdHJ1Y3RfX2QAGEVsaXhpci5UZGV4LlJvdGF0aW9uRGF0YWQADmNsaWNrZWRfb2ZmZXJzdAAAAABkAAhsYW5kaW5nc2wAAAABYgAABCdqZAALc2Vlbl9vZmZlcnNsAAAAAWIAAGeEam0AAAAFc3ViXzFkAANuaWxtAAAABXN1Yl8ybQAAAAgxNTk0NzAwMm0AAAAHdHJhY2tlcm0AAAAHbm90cmFja20AAAADdW5xbQAAAAxNV2hRUUxEQWVsdWQ.KgNCCOfJjG2Cvwey6AicC7dii1TEQkl8_b3mPgxKrTA |
|
.ladieswanttobeowned.com/ | Name: __cfduid Value: dd86f5a780ebbc10a43d6400aee4f5bd21591288113 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
fonts.googleapis.com
fonts.gstatic.com
ladieswanttobeowned.com
www.flirtmatcher.info
185.243.113.254
2001:4de0:ac19::1:b:1b
2606:4700:3034::681c:16e0
2a00:1450:4001:815::200a
2a00:1450:4001:820::2003
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
06818b2c41364e70021d420e1cc98f4bbcc0a082f6dbd02bb5a272c12b7764b2
0ce5a460ace775560c3344a43245687bdbec5cb8ee20d209ab9fa67f4e09a3e8
12e43e4ca3a92d5d82600b40a965d6d3338e2def4bc39bce73e62de60e3f75df
2b3b62fbea6a0f85a16904129c448a32bac1b84f6d63987fb12a4bec2bc91e97
56ae665923cd39ecfd722bb21de4ce69c4f975b68f0648a8f45f958f706131b9
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd
851e4a79492386c465364921a8ca760a15e40f62fceaf30ae4791971bd927238
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855