ursweetladies.com
Open in
urlscan Pro
2606:4700:30::681b:935f
Malicious Activity!
Public Scan
Effective URL: https://ursweetladies.com/keksyzmqsoweysr?t=mix
Submission: On October 04 via api from BE
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on July 29th 2019. Valid for: a year.
This is the only time ursweetladies.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Porn Scam (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 195.216.243.155 195.216.243.155 | 29226 (MASTERTEL...) (MASTERTEL-AS Moscow) | |
4 | 2606:4700:30:... 2606:4700:30::681b:935f | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 2a02:6b8::1:119 2a02:6b8::1:119 | 13238 (YANDEX) (YANDEX) | |
1 | 2a00:1450:400... 2a00:1450:4001:817::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:2a | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
1 | 2a00:1450:400... 2a00:1450:4001:80b::2003 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
10 | 7 |
ASN29226 (MASTERTEL-AS Moscow, Russia, RU)
PTR: s5.unet.com
u.to |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
ursweetladies.com |
ASN15169 (GOOGLE - Google LLC, US)
fonts.googleapis.com |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
code.jquery.com |
ASN15169 (GOOGLE - Google LLC, US)
fonts.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
ursweetladies.com
ursweetladies.com |
995 KB |
1 |
gstatic.com
fonts.gstatic.com |
13 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
1 |
googleapis.com
fonts.googleapis.com |
556 B |
1 |
yandex.ru
mc.yandex.ru |
|
1 |
u.to
u.to |
1015 B |
0 |
yadro.ru
Failed
counter.yadro.ru Failed |
|
10 | 7 |
Domain | Requested by | |
---|---|---|
4 | ursweetladies.com |
u.to
ursweetladies.com code.jquery.com |
1 | fonts.gstatic.com |
ursweetladies.com
|
1 | code.jquery.com |
ursweetladies.com
|
1 | fonts.googleapis.com |
ursweetladies.com
|
1 | mc.yandex.ru |
u.to
|
1 | u.to | |
0 | counter.yadro.ru Failed | |
10 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
u.to Sectigo RSA Domain Validation Secure Server CA |
2019-08-23 - 2021-08-22 |
2 years | crt.sh |
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-07-29 - 2020-07-28 |
a year | crt.sh |
mc.yandex.ru Yandex CA |
2019-09-23 - 2020-09-22 |
a year | crt.sh |
*.googleapis.com GTS CA 1O1 |
2019-09-17 - 2019-12-10 |
3 months | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
*.google.com GTS CA 1O1 |
2019-09-17 - 2019-12-10 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ursweetladies.com/keksyzmqsoweysr?t=mix
Frame ID: DAB85BFA83C5D975731BEC2BBF9FA4D2
Requests: 12 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://u.to/zetjFg Page URL
- https://ursweetladies.com/keksyzmqsoweysr?t=mix Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://u.to/zetjFg Page URL
- https://ursweetladies.com/keksyzmqsoweysr?t=mix Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 2- https://counter.yadro.ru/hit;utostat?r;s1600*1200*24;uhttps%3A//u.to/zetjFg;1570223666590 HTTP 302
- https://counter.yadro.ru/hit;utostat?q;r;s1600*1200*24;uhttps%3A//u.to/zetjFg;1570223666590
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
zetjFg
u.to/ |
994 B 1015 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
keksyzmqsoweysr
ursweetladies.com/ |
13 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tag.js
mc.yandex.ru/metrika/ |
108 KB 0 |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
hit;utostat
counter.yadro.ru/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 556 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-2.2.4.min.js
code.jquery.com/ |
84 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
p.js
ursweetladies.com/ |
403 B 314 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.mp4
ursweetladies.com/assets/6b8f7e97983b6a17148e12f7015e6b5e/video/ |
974 KB 976 KB |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
715 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
JTUSjIg1_i6t8kCHKm459WlhyyTh89Y.woff2
fonts.gstatic.com/s/montserrat/v14/ |
13 KB 13 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
ursweetladies.com/DE/f0d944050a2aaf83ba214edf135f48d0/ |
13 KB 13 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- counter.yadro.ru
- URL
- https://counter.yadro.ru/hit;utostat?q;r;s1600*1200*24;uhttps%3A//u.to/zetjFg;1570223666590
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Porn Scam (Online)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery string| u3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
ursweetladies.com/ | Name: uord Value: 0b076dc003da5f22bd58b1e4e28b62fe |
|
ursweetladies.com/ | Name: k Value: SFMyNTY.g3QAAAAIbQAAAARhdW5xdAAAAAFtAAAABTQzMTkwbQAAAAp3ZGFnZWdHTGdLbQAAAANoaWRtAAAAJHpHVUdzV214ZElnS1BzTW9IZUxkTHFlTUdrbHBSVU9rZXVXWG0AAAACaGxkAANuaWxtAAAAAnJkdAAAAARkAApfX3N0cnVjdF9fZAAYRWxpeGlyLlRkZXguUm90YXRpb25EYXRhZAAOY2xpY2tlZF9vZmZlcnN0AAAAAGQACGxhbmRpbmdzbAAAAAFiAAAEJ2pkAAtzZWVuX29mZmVyc2wAAAABYgAASwJqbQAAAAVzdWJfMWQAA25pbG0AAAAFc3ViXzJkAANuaWxtAAAAB3RyYWNrZXJtAAAAA21peG0AAAADdW5xbQAAAAxMQWhMbWxtR2FtRmc.dswgBkn22_4e75POIg4KnRam7blhlewbvSmUdojQZPw |
|
.ursweetladies.com/ | Name: __cfduid Value: dda71ae464fda34617c08ee5c19a7a7ad1570223666 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
counter.yadro.ru
fonts.googleapis.com
fonts.gstatic.com
mc.yandex.ru
u.to
ursweetladies.com
counter.yadro.ru
195.216.243.155
2001:4de0:ac19::1:b:2a
2606:4700:30::681b:935f
2a00:1450:4001:80b::2003
2a00:1450:4001:817::200a
2a02:6b8::1:119
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
0ce5a460ace775560c3344a43245687bdbec5cb8ee20d209ab9fa67f4e09a3e8
2b3b62fbea6a0f85a16904129c448a32bac1b84f6d63987fb12a4bec2bc91e97
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd
90433aef366237af6241e52635b9574315e9717e6c8a5c71cae10ec42c1c1d17
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627
ae230ead3f754df6edcf3979298a7a5474ea7fada2d1720d64ed5bfcaa65750d
c7cff436bcf1242444a9a45177b02b5a314fbb4f94157d8dd7ec41940cc3f884
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e4ad5784c7123f5e5acf19919e5979228a042d0fa8555c94c06e979652c33e2e