Submitted URL: http://fakebill.duongcodes.com/public/src/vtd/img/default-avatar.webp
Effective URL: https://fakebill.duongcodes.com/public/src/vtd/img/default-avatar.webp
Submission: On November 10 via api from US — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 2 HTTP transactions. The main IP is 2606:4700:3032::6815:3d02, located in United States and belongs to CLOUDFLARENET, US. The main domain is fakebill.duongcodes.com.
TLS certificate: Issued by WE1 on November 6th 2024. Valid for: 3 months.
This is the only time fakebill.duongcodes.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 2606:4700:303... 13335 (CLOUDFLAR...)
2 1
Apex Domain
Subdomains
Transfer
2 duongcodes.com
fakebill.duongcodes.com
4 KB
2 1
Domain Requested by
2 fakebill.duongcodes.com
2 1

This site contains no links.

Subject Issuer Validity Valid
duongcodes.com
WE1
2024-11-06 -
2025-02-04
3 months crt.sh

This page contains 1 frames:

Primary Page: https://fakebill.duongcodes.com/public/src/vtd/img/default-avatar.webp
Frame ID: 94472CB9D0E5E8981EED617E4F14C5D0
Requests: 2 HTTP requests in this frame

Screenshot

Page Title

default-avatar.webp (300×300)

Page URL History Show full URLs

  1. http://fakebill.duongcodes.com/public/src/vtd/img/default-avatar.webp HTTP 307
    https://fakebill.duongcodes.com/public/src/vtd/img/default-avatar.webp Page URL

Page Statistics

2
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

4 kB
Transfer

4 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://fakebill.duongcodes.com/public/src/vtd/img/default-avatar.webp HTTP 307
    https://fakebill.duongcodes.com/public/src/vtd/img/default-avatar.webp Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request default-avatar.webp
fakebill.duongcodes.com/public/src/vtd/img/
Redirect Chain
  • http://fakebill.duongcodes.com/public/src/vtd/img/default-avatar.webp
  • https://fakebill.duongcodes.com/public/src/vtd/img/default-avatar.webp
1 KB
2 KB
Document
General
Full URL
https://fakebill.duongcodes.com/public/src/vtd/img/default-avatar.webp
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3032::6815:3d02 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a69ebfc0268bef107efd85fad485e7ab7c2e16d8a425fbe68fed889e2839f2a1

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

accept-ranges
bytes
age
44943
alt-svc
h3=":443"; ma=86400
cache-control
public, max-age=604800
cf-cache-status
HIT
cf-ray
8e06b3317a4e3669-FRA
content-length
1282
content-type
image/webp
date
Sun, 10 Nov 2024 14:23:21 GMT
expires
Sun, 17 Nov 2024 01:54:18 GMT
last-modified
Sat, 07 Sep 2024 09:15:57 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
priority
u=0,i
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NC0Z%2FfKsIp7%2BYXT%2BN2M%2FIm7RsbQSKIffG10Q0Ru6VQqn6e7%2FKnSmcAbTTc%2FEWcRZA5jbwRSzjfxJ12MeKLf6G4yPJkD0e8j2%2F7%2FuizU3MLeyw16Vuee4oj%2FSj7DS3e09tZSLul27bPP1xegh3n9siWiJEBXHGw%3D%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
server-timing
cfL4;desc="?proto=QUIC&rtt=6260&sent=13&recv=10&lost=0&retrans=0&sent_bytes=4225&recv_bytes=4460&delivery_rate=90643&cwnd=12000&unsent_bytes=0&cid=eab1615657c991dc&ts=217&x=1" cfExtPri cfHdrFlush;dur=0
vary
Accept-Encoding
x-turbo-charged-by
LiteSpeed

Redirect headers

Location
https://fakebill.duongcodes.com/public/src/vtd/img/default-avatar.webp
Non-Authoritative-Reason
HttpsUpgrades
favicon.ico
fakebill.duongcodes.com/
2 KB
2 KB
Other
General
Full URL
https://fakebill.duongcodes.com/favicon.ico
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3032::6815:3d02 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
26c5b8eff7f3bf8ed85cb9419cc2c1a2b9b4f6c366bb07ec11750cdb12d64ef6

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://fakebill.duongcodes.com/public/src/vtd/img/default-avatar.webp

Response headers

content-encoding
zstd
cf-cache-status
BYPASS
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=R4l8h5sMTMpMFetazk7kq80N0tpEyP0%2BjhxRK7fAA7j%2FiqP9EvBo6IV6dpJmsAP4sCK1Eren%2FPyRn3%2BQbwnzf9MxJOpnTAZintbf916v%2BZHWXaT4GygjpihAGQ8j1eHy8Tm86INm5en%2FIoL2MFhd4llqEuW9PA%3D%3D"}],"group":"cf-nel","max_age":604800}
expires
Thu, 19 Nov 1981 08:52:00 GMT
alt-svc
h3=":443"; ma=86400
server-timing
cfL4;desc="?proto=QUIC&rtt=6298&sent=16&recv=13&lost=0&retrans=0&sent_bytes=6353&recv_bytes=4929&delivery_rate=180768&cwnd=12000&unsent_bytes=0&cid=eab1615657c991dc&ts=2100&x=1", cfExtPri, cfHdrFlush;dur=0
date
Sun, 10 Nov 2024 14:23:23 GMT
content-type
text/html; charset=UTF-8
vary
Accept-Encoding
priority
u=1,i
cache-control
no-store, no-cache, must-revalidate
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
pragma
no-cache
cf-ray
8e06b33769b33669-FRA
x-turbo-charged-by
LiteSpeed
server
cloudflare

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

1 Cookies

Domain/Path Name / Value
fakebill.duongcodes.com/ Name: PHPSESSID
Value: 714fa751fbbd41be7b6f6c04e137b7d6

1 Console Messages

Source Level URL
Text
network error URL: https://fakebill.duongcodes.com/favicon.ico
Message:
Failed to load resource: the server responded with a status of 404 ()

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

fakebill.duongcodes.com
2606:4700:3032::6815:3d02
26c5b8eff7f3bf8ed85cb9419cc2c1a2b9b4f6c366bb07ec11750cdb12d64ef6
a69ebfc0268bef107efd85fad485e7ab7c2e16d8a425fbe68fed889e2839f2a1