zeroclickfraud.com
Open in
urlscan Pro
199.212.255.140
Public Scan
Effective URL: http://zeroclickfraud.com/
Submission: On July 28 via manual from US
Summary
This is the only time zeroclickfraud.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 23.172.208.11 23.172.208.11 | 25948 (FHMNET) (FHMNET) | |
11 | 199.212.255.140 199.212.255.140 | 25948 (FHMNET) (FHMNET) | |
4 | 2606:4700::68... 2606:4700::6812:bcf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:831::200a | 15169 (GOOGLE) (GOOGLE) | |
16 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
zeroclickfraud.com
zeroclickfraud.com |
314 KB |
4 |
bootstrapcdn.com
netdna.bootstrapcdn.com |
73 KB |
1 |
googleapis.com
ajax.googleapis.com |
33 KB |
1 |
0cf.io
1 redirects
0cf.io |
200 B |
16 | 4 |
Domain | Requested by | |
---|---|---|
11 | zeroclickfraud.com |
zeroclickfraud.com
|
4 | netdna.bootstrapcdn.com |
zeroclickfraud.com
netdna.bootstrapcdn.com |
1 | ajax.googleapis.com |
zeroclickfraud.com
|
1 | 0cf.io | 1 redirects |
16 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.datablocks.net |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-03-01 - 2022-02-28 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://zeroclickfraud.com/
Frame ID: C53A378E3D85590F5E89C95355423CE9
Requests: 16 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://0cf.io/
HTTP 302
http://zeroclickfraud.com/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
Slimbox 2 (JavaScript Libraries) Expand
Detected patterns
- script /slimbox2\.js/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
- script /slimbox2\.js/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Datablocks.net
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://0cf.io/
HTTP 302
http://zeroclickfraud.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://netdna.bootstrapcdn.com/bootstrap/3.1.1/css/bootstrap.min.css HTTP 307
- https://netdna.bootstrapcdn.com/bootstrap/3.1.1/css/bootstrap.min.css
- http://netdna.bootstrapcdn.com/font-awesome/4.0.3/css/font-awesome.min.css HTTP 307
- https://netdna.bootstrapcdn.com/font-awesome/4.0.3/css/font-awesome.min.css
- http://netdna.bootstrapcdn.com/bootstrap/3.1.1/js/bootstrap.min.js HTTP 307
- https://netdna.bootstrapcdn.com/bootstrap/3.1.1/js/bootstrap.min.js
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
zeroclickfraud.com/ Redirect Chain
|
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
netdna.bootstrapcdn.com/bootstrap/3.1.1/css/ Redirect Chain
|
98 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
netdna.bootstrapcdn.com/font-awesome/4.0.3/css/ Redirect Chain
|
17 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
landing.css
zeroclickfraud.com/css/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
slimbox2.css
zeroclickfraud.com/plugins/slimbox/css/ |
1 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.11.0/ |
94 KB 33 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
netdna.bootstrapcdn.com/bootstrap/3.1.1/js/ Redirect Chain
|
28 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.svg
zeroclickfraud.com/images/ |
6 KB 6 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
zcf1.jpg
zeroclickfraud.com/images/ |
68 KB 68 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
zcf2.jpg
zeroclickfraud.com/images/ |
73 KB 74 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
zcf3.jpg
zeroclickfraud.com/images/ |
74 KB 74 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dfs.png
zeroclickfraud.com/images/ |
53 KB 54 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
datablocks.png
zeroclickfraud.com/images/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
slimbox2.js
zeroclickfraud.com/plugins/slimbox/js/ |
4 KB 4 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
abeezee-regular-webfont.woff
zeroclickfraud.com/css/ |
17 KB 17 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome-webfont.woff
netdna.bootstrapcdn.com/font-awesome/4.0.3/fonts/ |
43 KB 44 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery object| jQuery1110070923159629812790 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
0cf.io
ajax.googleapis.com
netdna.bootstrapcdn.com
zeroclickfraud.com
199.212.255.140
23.172.208.11
2606:4700::6812:bcf
2a00:1450:4001:831::200a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