d33llbzaj6p0vg.cloudfront.net
Open in
urlscan Pro
13.224.102.73
Public Scan
Effective URL: https://d33llbzaj6p0vg.cloudfront.net/noad.html
Submission: On January 31 via manual from TR
Summary
TLS certificate: Issued by DigiCert Global CA G2 on May 26th 2020. Valid for: a year.
This is the only time d33llbzaj6p0vg.cloudfront.net was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 34.120.113.132 34.120.113.132 | 15169 (GOOGLE) (GOOGLE) | |
1 | 13.224.102.73 13.224.102.73 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 1 |
ASN15169 (GOOGLE, US)
PTR: 132.113.120.34.bc.googleusercontent.com
atracking-auto.appflood.com |
ASN16509 (AMAZON-02, US)
PTR: server-13-224-102-73.zrh50.r.cloudfront.net
d33llbzaj6p0vg.cloudfront.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
cloudfront.net
d33llbzaj6p0vg.cloudfront.net |
1 KB |
1 |
appflood.com
1 redirects
atracking-auto.appflood.com |
405 B |
1 | 2 |
Domain | Requested by | |
---|---|---|
1 | d33llbzaj6p0vg.cloudfront.net | |
1 | atracking-auto.appflood.com | 1 redirects |
1 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.cloudfront.net DigiCert Global CA G2 |
2020-05-26 - 2021-04-21 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://d33llbzaj6p0vg.cloudfront.net/noad.html
Frame ID: 68D76C08DE72655B8A8F98A905F8325F
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://atracking-auto.appflood.com/transaction/post_click?aff_id=14159&offer_id=149539404&aff_sub3=9e3423f5-c84...
HTTP 302
https://d33llbzaj6p0vg.cloudfront.net/noad.html Page URL
Detected technologies
Amazon Web Services (PaaS) ExpandDetected patterns
- headers via /\(CloudFront\)$/i
- headers server /^AmazonS3$/i
Amazon Cloudfront (CDN) Expand
Detected patterns
- headers via /\(CloudFront\)$/i
Amazon S3 (Miscellaneous) Expand
Detected patterns
- headers server /^AmazonS3$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://atracking-auto.appflood.com/transaction/post_click?aff_id=14159&offer_id=149539404&aff_sub3=9e3423f5-c843-4608-adec-41b445ece125&aff_sub6=20252_20252s__1074301_506&aff_sub=aazz100279cdv30050d154401310105471da651ae5afd0bf150243b&aff_sub2=com.cootek.smartinputv5.freeoem
HTTP 302
https://d33llbzaj6p0vg.cloudfront.net/noad.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
1 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
noad.html
d33llbzaj6p0vg.cloudfront.net/ Redirect Chain
|
770 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
atracking-auto.appflood.com
d33llbzaj6p0vg.cloudfront.net
13.224.102.73
34.120.113.132
f8d2d0e4b8af30bab99bb2119d0b776d4447c615694963db2429d7ccd30789a8