Submitted URL: https://cutt.ly/PhaFor
Effective URL: https://xo.directdw.com/UHJLMOL?title=NEW%20Phantom%20Forces%20Script%20Hack%20_%20OP%20Silent%20Aim,%20Aimbot,%20ESP%20...
Submission: On November 11 via manual from US — Scanned from DE

Summary

This website contacted 3 IPs in 2 countries across 4 domains to perform 5 HTTP transactions. The main IP is 2606:4700:3033::ac43:824e, located in United States and belongs to CLOUDFLARENET, US. The main domain is xo.directdw.com.
TLS certificate: Issued by E1 on October 17th 2022. Valid for: 3 months.
This is the only time xo.directdw.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 2606:4700:10:... 13335 (CLOUDFLAR...)
1 2606:4700:303... 13335 (CLOUDFLAR...)
3 2606:4700::68... 13335 (CLOUDFLAR...)
1 2001:4de0:ac1... 20446 (STACKPATH...)
5 3
Apex Domain
Subdomains
Transfer
3 bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 2222
107 KB
1 jquery.com
code.jquery.com — Cisco Umbrella Rank: 669
30 KB
1 directdw.com
xo.directdw.com
3 KB
1 cutt.ly
cutt.ly — Cisco Umbrella Rank: 84337
439 B
5 4
Domain Requested by
3 stackpath.bootstrapcdn.com xo.directdw.com
stackpath.bootstrapcdn.com
1 code.jquery.com xo.directdw.com
1 xo.directdw.com
1 cutt.ly 1 redirects
5 4

This site contains no links.

Subject Issuer Validity Valid
*.directdw.com
E1
2022-10-17 -
2023-01-15
3 months crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2022-01-29 -
2023-01-29
a year crt.sh
*.jquery.com
Sectigo RSA Domain Validation Secure Server CA
2022-08-03 -
2023-07-14
a year crt.sh

This page contains 1 frames:

Primary Page: https://xo.directdw.com/UHJLMOL?title=NEW%20Phantom%20Forces%20Script%20Hack%20_%20OP%20Silent%20Aim,%20Aimbot,%20ESP%20&t=1
Frame ID: E373E580E0DADEC97FAE86055A8CBA48
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

Download file NEW_Phantom_Forces_Script_Hack___OP_Silent_Aim,_Aimbot,_ESP_.zip

Page URL History Show full URLs

  1. https://cutt.ly/PhaFor HTTP 301
    https://xo.directdw.com/UHJLMOL?title=NEW%20Phantom%20Forces%20Script%20Hack%20_%20OP%20Silent%20Aim... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
  • bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js

Overall confidence: 100%
Detected patterns
  • <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
  • <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
  • (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

5
Requests

100 %
HTTPS

100 %
IPv6

4
Domains

4
Subdomains

3
IPs

2
Countries

140 kB
Transfer

351 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://cutt.ly/PhaFor HTTP 301
    https://xo.directdw.com/UHJLMOL?title=NEW%20Phantom%20Forces%20Script%20Hack%20_%20OP%20Silent%20Aim,%20Aimbot,%20ESP%20&t=1 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request UHJLMOL
xo.directdw.com/
Redirect Chain
  • https://cutt.ly/PhaFor
  • https://xo.directdw.com/UHJLMOL?title=NEW%20Phantom%20Forces%20Script%20Hack%20_%20OP%20Silent%20Aim,%20Aimbot,%20ESP%20&t=1
11 KB
3 KB
Document
General
Full URL
https://xo.directdw.com/UHJLMOL?title=NEW%20Phantom%20Forces%20Script%20Hack%20_%20OP%20Silent%20Aim,%20Aimbot,%20ESP%20&t=1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::ac43:824e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c6e914047f1b772b1aabd9a7bf1e2dff9613da9f38e9a7367adf30b0a733d98b

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
76836d26eaa5bb74-FRA
content-encoding
br
content-type
text/html; charset=UTF-8
date
Fri, 11 Nov 2022 01:59:03 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=LF2OX8PmbyQKrAWIE7jzlj%2Ba%2FvQYKMzz5%2B%2FjANCIgD1uqMOD20iJuBBVFEfkJIls2uxDiWOvxk%2BCjCKhIH7ulyI3U3CKUhs4l8naAdtOJZyYuked%2Fhd4r7tybkjf58v0qtid6FXiMNijuKPphzc%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding

Redirect headers

alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
cache-control
no-cache, no-store, must-revalidate
cf-cache-status
DYNAMIC
cf-ray
76836d25ea4d5c3e-FRA
content-type
text/html; charset=UTF-8
date
Fri, 11 Nov 2022 01:59:03 GMT
expires
Thu, 19 Nov 1981 08:52:00 GMT
location
https://xo.directdw.com/UHJLMOL?title=NEW%20Phantom%20Forces%20Script%20Hack%20_%20OP%20Silent%20Aim,%20Aimbot,%20ESP%20&t=1
pragma
no-cache
server
cloudflare
vary
Accept-Encoding
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-xss-protection
1; mode=block
font-awesome.min.css
stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/
30 KB
7 KB
Stylesheet
General
Full URL
https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css
Requested by
Host: xo.directdw.com
URL: https://xo.directdw.com/UHJLMOL?title=NEW%20Phantom%20Forces%20Script%20Hack%20_%20OP%20Silent%20Aim,%20Aimbot,%20ESP%20&t=1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:acf , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://xo.directdw.com/
Origin
https://xo.directdw.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36

Response headers

date
Fri, 11 Nov 2022 01:59:03 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
cf-cache-status
HIT
content-encoding
br
cdn-edgestorageid
601
age
296284
cdn-cachedat
08/20/2022 02:30:56
cdn-pullzone
252412
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
last-modified
Mon, 25 Jan 2021 22:04:55 GMT
cdn-proxyver
1.02
cdn-requestpullcode
200
server
cloudflare
etag
W/"269550530cc127b6aa5a35925a7de6ce"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cdn-cache
HIT
cdn-uid
b1941f61-b576-4f40-80de-5677acb38f74
cache-control
public, max-age=31919000
cdn-requestid
5ffe85382d2a81638d76a96466b7dbe2
timing-allow-origin
*
cdn-requestcountrycode
DE
cdn-status
200
cf-ray
76836d27fac69bb9-FRA
cdn-requestpullsuccess
True
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.2.1/css/
150 KB
24 KB
Stylesheet
General
Full URL
https://stackpath.bootstrapcdn.com/bootstrap/4.2.1/css/bootstrap.min.css
Requested by
Host: xo.directdw.com
URL: https://xo.directdw.com/UHJLMOL?title=NEW%20Phantom%20Forces%20Script%20Hack%20_%20OP%20Silent%20Aim,%20Aimbot,%20ESP%20&t=1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:acf , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6b3bef53dc4a96ec07149d02a60b5fd026332bbce0b4ece79f3c55e3ddb85f5c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://xo.directdw.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36

Response headers

date
Fri, 11 Nov 2022 01:59:03 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
cf-cache-status
HIT
content-encoding
br
cdn-edgestorageid
601
age
22088863
cdn-cachedat
08/03/2021 19:30:51
cdn-pullzone
252412
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
last-modified
Mon, 25 Jan 2021 22:04:07 GMT
cdn-proxyver
1.0
cdn-requestpullcode
200
server
cloudflare
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cdn-cache
HIT
cdn-uid
b1941f61-b576-4f40-80de-5677acb38f74
cache-control
public, max-age=31919000
cdn-requestid
cd21c41ca83b2a889426cd619d32808b
timing-allow-origin
*
cdn-requestcountrycode
DE
cdn-status
200
cf-ray
76836d27f8435c56-FRA
cdn-requestpullsuccess
True
jquery-3.3.1.min.js
code.jquery.com/
85 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.3.1.min.js
Requested by
Host: xo.directdw.com
URL: https://xo.directdw.com/UHJLMOL?title=NEW%20Phantom%20Forces%20Script%20Hack%20_%20OP%20Silent%20Aim,%20Aimbot,%20ESP%20&t=1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4de0:ac18::1:a:2b , Netherlands, ASN20446 (STACKPATH-CDN, US),
Reverse DNS
Software
nginx /
Resource Hash
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef

Request headers

Referer
https://xo.directdw.com/
Origin
https://xo.directdw.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36

Response headers

date
Fri, 11 Nov 2022 01:59:03 GMT
content-encoding
gzip
last-modified
Fri, 20 Aug 2021 17:47:53 GMT
server
nginx
etag
W/"611feac9-1538f"
vary
Accept-Encoding
x-hw
1668131943.dop154.fr8.t,1668131943.cds206.fr8.hn,1668131943.cds057.fr8.c
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
30288
fontawesome-webfont.woff2
stackpath.bootstrapcdn.com/font-awesome/4.7.0/fonts/
75 KB
76 KB
Font
General
Full URL
https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/fonts/fontawesome-webfont.woff2?v=4.7.0
Requested by
Host: stackpath.bootstrapcdn.com
URL: https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:acf , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css
Origin
https://xo.directdw.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36

Response headers

date
Fri, 11 Nov 2022 01:59:03 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
cf-cache-status
HIT
cdn-edgestorageid
752
age
196518
cdn-cachedat
08/17/2022 18:20:14
cdn-pullzone
252412
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
77160
last-modified
Mon, 25 Jan 2021 22:04:55 GMT
cdn-proxyver
1.02
cdn-requestpullcode
200
server
cloudflare
etag
"af7ae505a9eed503f8b8e6982036873e"
vary
Accept-Encoding
content-type
font/woff2
access-control-allow-origin
*
cdn-cache
HIT
cdn-uid
b1941f61-b576-4f40-80de-5677acb38f74
cache-control
public, max-age=31919000
cdn-requestid
56c675eca45f6ee4cf40618c212f290e
accept-ranges
bytes
timing-allow-origin
*
cdn-requestcountrycode
DE
cdn-status
200
cf-ray
76836d286b2e9bb9-FRA
cdn-requestpullsuccess
True

Verdicts & Comments Add Verdict or Comment

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| $ function| jQuery

1 Cookies

Domain/Path Name / Value
cutt.ly/ Name: PHPSESSID
Value: kvm1n9iplkqjcdc8tt30rat43h