ygtraders.com
Open in
urlscan Pro
2606:4700:3034::ac43:c5dc
Malicious Activity!
Public Scan
Submission: On January 19 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on December 11th 2021. Valid for: a year.
This is the only time ygtraders.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Adobe (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 9 | 2606:4700:303... 2606:4700:3034::ac43:c5dc | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 52.222.214.110 52.222.214.110 | 16509 (AMAZON-02) (AMAZON-02) | |
3 | 2a02:26f0:f7:... 2a02:26f0:f7::5c7b:e053 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
12 | 3 |
ASN16509 (AMAZON-02, US)
PTR: server-52-222-214-110.fra56.r.cloudfront.net
auth.services.adobe.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
ygtraders.com
1 redirects
ygtraders.com |
106 KB |
3 |
typekit.net
use.typekit.net — Cisco Umbrella Rank: 509 |
88 KB |
1 |
adobe.com
auth.services.adobe.com — Cisco Umbrella Rank: 5874 |
210 KB |
12 | 3 |
Domain | Requested by | |
---|---|---|
9 | ygtraders.com |
1 redirects
ygtraders.com
|
3 | use.typekit.net |
ygtraders.com
|
1 | auth.services.adobe.com |
ygtraders.com
|
12 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.behance.net |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-12-11 - 2022-12-10 |
a year | crt.sh |
auth.services.adobe.com DigiCert TLS RSA SHA256 2020 CA1 |
2022-01-05 - 2023-01-05 |
a year | crt.sh |
use.typekit.net DigiCert TLS RSA SHA256 2020 CA1 |
2021-08-16 - 2022-08-16 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://ygtraders.com/ayan/
Frame ID: FC9C6D9654C120620F0286784E16A2B6
Requests: 12 HTTP requests in this frame
Screenshot
Page Title
Adobe DigitalPage URL History Show full URLs
-
https://ygtraders.com/ayan
HTTP 301
https://ygtraders.com/ayan/ Page URL
Detected technologies
React (JavaScript Frameworks) ExpandDetected patterns
- <[^>]+data-react
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Leonardoworx LWX
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://ygtraders.com/ayan
HTTP 301
https://ygtraders.com/ayan/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
ygtraders.com/ayan/ Redirect Chain
|
25 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
styles.23802016.css
ygtraders.com/ayan/index_files/ |
484 KB 60 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
adobe_logo_white.svg
ygtraders.com/ayan/index_files/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
mirc.png
ygtraders.com/ayan/index_files/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
1.png
ygtraders.com/ayan/index_files/ |
19 KB 20 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
4.png
ygtraders.com/ayan/index_files/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Behance.svg
ygtraders.com/ayan/index_files/ |
3 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
adobe_logo_black.svg
ygtraders.com/ayan/index_files/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Leonardoworx.jpg
auth.services.adobe.com/img/canvas/ |
208 KB 210 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
l
use.typekit.net/af/40207f/0000000000000000000176ff/27/ |
29 KB 29 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
l
use.typekit.net/af/eaf09c/000000000000000000017703/27/ |
29 KB 30 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
l
use.typekit.net/af/cb695f/000000000000000000017701/27/ |
29 KB 29 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Adobe (Consumer)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| a function| b function| c function| d function| showElem0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
auth.services.adobe.com
use.typekit.net
ygtraders.com
2606:4700:3034::ac43:c5dc
2a02:26f0:f7::5c7b:e053
52.222.214.110
035e1ce3a98e92550ec1c3cf687f2519c53d65e0a502ab28d361842a30edcffd
683d777e2f11e4a19371359c4bf66b2d0c861aa9a561e6c257a4c49804694e35
6bd8880193131672d32517ed1ea30cf871f317b9a62f523f67b8a3b34caf1722
7667aa77902b0534e8abf1076b3f58bf4736d3dfc1b77726e9911bd1dd32bdd3
8b7eb699aedbbf4d04907b45f4348e6b54119a6567b4b9f1be4943ba80c5af19
8e6b6714fade64d20ea10eb12f12b157696ccedd48207c1bad197e8ac9b2e8ab
b19b9c09bf661a0747c2f507f62c5fdd1f84cde7dd4d9e208092c919bc009ddf
b2f1ae4234a6b31d3fee6a62bdcdc59f0badd196ba55c259cd7af703c3716a30
b97b6df8ca413ee1df0b9cc4dcccbf40bd8539ec54ede0bf9efd06cd94175e04
c38303cd29e80026be3a29e2086000e5995628d618a43394c3a446c9068df80d
d91c29bcf81c848135875cec80202a9a5c36fbe48e35483a143ce6a177275adc
e98b54c20b26623832732102d8ea3eead581ed89f75491299d87061fee9061e6