realshibadoge.fwnfts.com
Open in
urlscan Pro
104.21.1.192
Public Scan
Effective URL: https://realshibadoge.fwnfts.com/
Submission Tags: @noeliamuehl #phishing #drainer #hacking #cybersec #scam #malware Search All
Submission: On December 25 via api from FI — Scanned from FI
Summary
TLS certificate: Issued by GTS CA 1P5 on December 21st 2022. Valid for: 3 months.
This is the only time realshibadoge.fwnfts.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 20 | 104.21.1.192 104.21.1.192 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 69.16.175.42 69.16.175.42 | 20446 (STACKPATH...) (STACKPATH-CDN) | |
1 2 | 162.209.206.206 162.209.206.206 | 40065 (CNSERVERS) (CNSERVERS) | |
1 2 | 104.16.125.175 104.16.125.175 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
22 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
20 |
fwnfts.com
1 redirects
realshibadoge.fwnfts.com |
403 KB |
2 |
unpkg.com
1 redirects
unpkg.com — Cisco Umbrella Rank: 793 |
350 KB |
2 |
bootcs.com
1 redirects
bootcs.com |
439 B |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 686 |
83 KB |
22 | 4 |
Domain | Requested by | |
---|---|---|
20 | realshibadoge.fwnfts.com |
1 redirects
realshibadoge.fwnfts.com
|
2 | unpkg.com |
1 redirects
realshibadoge.fwnfts.com
|
2 | bootcs.com |
1 redirects
realshibadoge.fwnfts.com
|
1 | code.jquery.com |
realshibadoge.fwnfts.com
|
22 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.fwnfts.com GTS CA 1P5 |
2022-12-21 - 2023-03-21 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2022-08-03 - 2023-07-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://realshibadoge.fwnfts.com/
Frame ID: 8B512A06FF6F5231852109083419C5B2
Requests: 22 HTTP requests in this frame
Screenshot
Page Title
Doge Army by ShibaDogePage URL History Show full URLs
-
http://realshibadoge.fwnfts.com/
HTTP 301
https://realshibadoge.fwnfts.com/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Lightbox (JavaScript Libraries) Expand
Detected patterns
- <link [^>]*href="[^"]+lightbox(?:\.min)?\.css
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://realshibadoge.fwnfts.com/
HTTP 301
https://realshibadoge.fwnfts.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 13- https://bootcs.com/fav.ico HTTP 301
- https://bootcs.com/fav.ico/
- https://unpkg.com/web3@latest/dist/web3.min.js HTTP 302
- https://unpkg.com/web3@1.8.1/dist/web3.min.js
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
realshibadoge.fwnfts.com/ Redirect Chain
|
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.0.js
code.jquery.com/ |
282 KB 83 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
realshibadoge.fwnfts.com/css/ |
120 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
realshibadoge.fwnfts.com/css/ |
23 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
nivo-lightbox.css
realshibadoge.fwnfts.com/css/ |
6 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
default.css
realshibadoge.fwnfts.com/css/ |
1 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
templatemo-style.css
realshibadoge.fwnfts.com/css/ |
8 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2906dc7441d04046870113aaaf666ff7.css
realshibadoge.fwnfts.com/css/ |
3 KB 766 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fonts.css
realshibadoge.fwnfts.com/css/ |
40 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
normalize.css
realshibadoge.fwnfts.com/css/ |
2 KB 839 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.css
realshibadoge.fwnfts.com/css/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
toastr.css
realshibadoge.fwnfts.com/css/ |
6 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
twitter_icon.svg
realshibadoge.fwnfts.com/picture/ |
1 KB 839 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
discord_icon.svg
realshibadoge.fwnfts.com/picture/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
bootcs.com/fav.ico/ Redirect Chain
|
0 199 B |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.gif
realshibadoge.fwnfts.com/images/ |
17 KB 17 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
toastr.min.js
realshibadoge.fwnfts.com/js/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
toastr.js
realshibadoge.fwnfts.com/js/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
web3.min.js
unpkg.com/web3@1.8.1/dist/ Redirect Chain
|
1 MB 349 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.js
realshibadoge.fwnfts.com/ |
800 KB 270 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
f39656c035c14098b956014a02b8f8b7.css
realshibadoge.fwnfts.com/css/ |
5 KB 697 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
banner.png
realshibadoge.fwnfts.com/images/ |
69 KB 69 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange function| $ function| jQuery object| toastr function| setImmediate function| clearImmediate object| regeneratorRuntime function| Web3 object| _ethers function| MerkleTree0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bootcs.com
code.jquery.com
realshibadoge.fwnfts.com
unpkg.com
104.16.125.175
104.21.1.192
162.209.206.206
69.16.175.42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