td.lqdjxywp.ru Open in urlscan Pro
2606:4700:3037::6815:e3  Malicious Activity! Public Scan

URL: https://td.lqdjxywp.ru/GuTbPSm4/
Submission: On December 04 via automatic, source links-suspicious — Scanned from DE

Summary

This website contacted 4 IPs in 2 countries across 3 domains to perform 4 HTTP transactions. The main IP is 2606:4700:3037::6815:e3, located in United States and belongs to CLOUDFLARENET, US. The main domain is td.lqdjxywp.ru.
TLS certificate: Issued by WE1 on November 16th 2024. Valid for: 3 months.
This is the only time td.lqdjxywp.ru was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Google (Online)

Domain & IP information

IP Address AS Autonomous System
2 2606:4700:303... 13335 (CLOUDFLAR...)
1 2a04:4e42:400... 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
4 4
Apex Domain
Subdomains
Transfer
2 lqdjxywp.ru
td.lqdjxywp.ru
20 KB
1 googleusercontent.com
blogger.googleusercontent.com — Cisco Umbrella Rank: 10221
86 KB
1 jquery.com
code.jquery.com — Cisco Umbrella Rank: 847
31 KB
4 3
Domain Requested by
2 td.lqdjxywp.ru
1 blogger.googleusercontent.com td.lqdjxywp.ru
1 code.jquery.com td.lqdjxywp.ru
4 3

This site contains no links.

Subject Issuer Validity Valid
lqdjxywp.ru
WE1
2024-11-16 -
2025-02-14
3 months crt.sh
*.jquery.com
Sectigo ECC Domain Validation Secure Server CA
2024-06-25 -
2025-06-25
a year crt.sh
*.googleusercontent.com
WR2
2024-10-21 -
2025-01-13
3 months crt.sh

This page contains 1 frames:

Primary Page: https://td.lqdjxywp.ru/GuTbPSm4/
Frame ID: 09B097CBCCBC2CD69C8FF25ADD973436
Requests: 5 HTTP requests in this frame

Screenshot

Page Title


Detected technologies

Overall confidence: 100%
Detected patterns

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

4
Requests

100 %
HTTPS

100 %
IPv6

3
Domains

3
Subdomains

4
IPs

2
Countries

137 kB
Transfer

248 kB
Size

2
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
td.lqdjxywp.ru/GuTbPSm4/
67 KB
19 KB
Document
General
Full URL
https://td.lqdjxywp.ru/GuTbPSm4/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6815:e3 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
1bd56ba8ab0d9c6a55fcd641e5f3c191403ddd27cec19d7e68746834e12660b9

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36

Response headers

alt-svc
h3=":443"; ma=86400
cache-control
no-cache, private
cf-cache-status
DYNAMIC
cf-ray
8eccd6970dd3dc68-FRA
content-encoding
zstd
content-type
text/html; charset=UTF-8
date
Wed, 04 Dec 2024 15:30:32 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pq1PgPwRGzv5XYVhZjbW4afYTjmughGl139Qak5MCzdmzx6TI8EPvGnRpe3P30%2F1Uj3sOsPO33nA5vR0kHXWfXZfBjSzZlW8kQwzeXAhgnvjIdXYttMeQai3%2FcViBw%3D%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
server-timing
cfL4;desc="?proto=TCP&rtt=23561&min_rtt=4830&rtt_var=15430&sent=3965&recv=1349&lost=0&retrans=15&sent_bytes=4886025&recv_bytes=203687&delivery_rate=3350588&cwnd=270&unsent_bytes=0&cid=744d63a3a7a56777&ts=2143851&x=0" cfL4;desc="?proto=TCP&rtt=6178&min_rtt=6141&rtt_var=999&sent=7&recv=11&lost=0&retrans=0&sent_bytes=3983&recv_bytes=2357&delivery_rate=627074&cwnd=253&unsent_bytes=0&cid=723059bc26684f48&ts=430&x=0"
jquery-3.6.0.min.js
code.jquery.com/
87 KB
31 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.6.0.min.js
Requested by
Host: td.lqdjxywp.ru
URL: https://td.lqdjxywp.ru/GuTbPSm4/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:400::649 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"
Referer
https://td.lqdjxywp.ru/

Response headers

content-encoding
gzip
etag
W/"28feccc0-15d9d"
age
1849523
x-cache
HIT, HIT
date
Wed, 04 Dec 2024 15:30:32 GMT
content-type
application/javascript; charset=utf-8
last-modified
Fri, 18 Oct 1991 12:00:00 GMT
x-cache-hits
300948, 18939
x-served-by
cache-lga21931-LGA, cache-ams21070-AMS
vary
Accept-Encoding
cache-control
public, max-age=31536000, stale-while-revalidate=604800
x-timer
S1733326233.763926,VS0,VE0
cross-origin-resource-policy
cross-origin
via
1.1 varnish, 1.1 varnish
accept-ranges
bytes
access-control-allow-origin
*
content-length
30875
server
nginx
truncated
/
8 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
93eb80dc01e920eaa7f23f998f67e5a5fc55e02b8e66bd3d8f5fef097d88565f

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
userinter.png
blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdrhY6zM7txEf61nPO67_Cl7rOyCGsyEb9GaIEqe3M-p-yN2nJeBUGCXkDygK7t8xYVcKwSgu4v0_u6EZF5srUh16p0vNl1K8hBeBV8dg-KcOpt7y8vrkamMOU2HxW0STp0JDEp21FWuCWxDXZ...
86 KB
86 KB
Image
General
Full URL
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdrhY6zM7txEf61nPO67_Cl7rOyCGsyEb9GaIEqe3M-p-yN2nJeBUGCXkDygK7t8xYVcKwSgu4v0_u6EZF5srUh16p0vNl1K8hBeBV8dg-KcOpt7y8vrkamMOU2HxW0STp0JDEp21FWuCWxDXZX0EtxoLPSBWR6WwhXZglXIvWXbh24ojuyofD6htY8D4/s3396/userinter.png
Requested by
Host: td.lqdjxywp.ru
URL: https://td.lqdjxywp.ru/GuTbPSm4/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:831::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
fife /
Resource Hash
fbbbc78e85dfa4f2b390e6dc2f3850d0f5247d16b5fd525093331572aa79ae84
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer
https://td.lqdjxywp.ru/

Response headers

access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
etag
"v367e"
x-content-type-options
nosniff
expires
Thu, 05 Dec 2024 15:30:33 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
87859
date
Wed, 04 Dec 2024 15:30:33 GMT
x-xss-protection
0
content-type
image/png
vary
Origin
server
fife
content-disposition
inline;filename="userinter.png"
favicon.ico
td.lqdjxywp.ru/
0
642 B
Other
General
Full URL
https://td.lqdjxywp.ru/favicon.ico
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6815:e3 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer
https://td.lqdjxywp.ru/GuTbPSm4/

Response headers

cache-control
max-age=14400
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
content-encoding
zstd
cf-cache-status
MISS
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1UQZ95%2FuFTanOA0ZnkdXT8NIQ2Tnu7ydnJMXRx0FVTkFe5f2iS2iq88Pn15EMcVDDn5xTk3%2F2xLleZcwj3deLJdHxJDhIw5MoYe75I%2FSEizX2fQypJmUowlJFDhcqA%3D%3D"}],"group":"cf-nel","max_age":604800}
cf-ray
8eccd69c8bf9dc68-FRA
alt-svc
h3=":443"; ma=86400
server-timing
cfL4;desc="?proto=TCP&rtt=50603&min_rtt=4871&rtt_var=10903&sent=696&recv=227&lost=0&retrans=1&sent_bytes=891690&recv_bytes=30247&delivery_rate=3184494&cwnd=248&unsent_bytes=0&cid=5c4eef57cde1cb94&ts=466617&x=0", cfL4;desc="?proto=TCP&rtt=8475&min_rtt=6141&rtt_var=4111&sent=39&recv=31&lost=0&retrans=0&sent_bytes=24210&recv_bytes=3103&delivery_rate=1637884&cwnd=257&unsent_bytes=0&cid=723059bc26684f48&ts=1269&x=0"
date
Wed, 04 Dec 2024 15:30:33 GMT
content-type
text/html; charset=UTF-8
vary
Accept-Encoding
server
cloudflare

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Google (Online)

15 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| LvQQzinTHX function| $ function| jQuery function| isNumber number| anwser function| loadCaptcha function| verifyCaptcha function| onCheckboxClick function| getRandomInt function| drawRandomLines function| drawRandomDots function| drawRandomEllipses function| drawCaptchaText function| drawCaptcha function| vGUvDBVGaS

2 Cookies

Domain/Path Name / Value
td.lqdjxywp.ru/ Name: XSRF-TOKEN
Value: eyJpdiI6ImdkMmlXMThFeGlob3RoVUZkenh5bGc9PSIsInZhbHVlIjoicXpDbjV4dnJLWGZwMlRtY2pQYitWWHRhTVZpb2tuMUt1UVVlOXpMd05mQXZHTnFMaDZWQ0RLSDJFc1ZhYWIyRUllV3hPclFCa1NZQnhHdWM4c0NqNHNwWG9CbmtGd2lHdmZXdEJITDRSc2FoQU85OHI5bzYvM3Jna3pERVlXcjciLCJtYWMiOiI5YTg1MGM4YjZlYmZhOWJiMzhlZTI2YTUxN2Y1YTY0MGEwYTQyN2Y4NDBkMzNiNGNmMDdkMDE5NWRjMzAzMzliIiwidGFnIjoiIn0%3D
td.lqdjxywp.ru/ Name: laravel_session
Value: eyJpdiI6ImFBcCtxQWFPZEQ3VkRlRDk1Zjg4bnc9PSIsInZhbHVlIjoieUt2VGhZczQwWjFrZTRnNS9maytmdCt2bkVnYTk1dnhGOUNnV0VVbkhpL2J4bG5iMzhleGxpbmliWEFOSDRtejVEeEllaklPc1Z0eGVlY2Y3WWhveCtHMGZwcGtzd01lWW9nb3VONnArM0ovcitSSk51ajQ0aWtvcmZPMXp6SEgiLCJtYWMiOiJiOGZlZWU3MTRlNTk4ZTc1NTk3OTExOGZkODIzYjJhZjQ2MWM3ZjRhNGUxOTJlYTVmNzRhMTk2ZThiMDA5MThiIiwidGFnIjoiIn0%3D

3 Console Messages

Source Level URL
Text
javascript warning URL: https://td.lqdjxywp.ru/GuTbPSm4/(Line 21)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://code.jquery.com/jquery-3.6.0.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://td.lqdjxywp.ru/GuTbPSm4/(Line 21)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://code.jquery.com/jquery-3.6.0.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
network error URL: https://td.lqdjxywp.ru/favicon.ico
Message:
Failed to load resource: the server responded with a status of 404 ()