teasestocking.org Open in urlscan Pro
162.210.70.23  Malicious Activity! Public Scan

URL: http://teasestocking.org/
Submission: On April 09 via api from DE

Summary

This website contacted 2 IPs in 3 countries across 4 domains to perform 2 HTTP transactions. The main IP is 162.210.70.23, located in United States and belongs to PUBLIC-DOMAIN-REGISTRY - PDR, US. The main domain is teasestocking.org.
This is the only time teasestocking.org was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Scam (Online)

Domain & IP information

IP Address AS Autonomous System
1 162.210.70.23 394695 (PUBLIC-DO...)
3 3 88.208.59.71 39572 (ADVANCEDH...)
1 1 2606:4700:30:... 13335 (CLOUDFLAR...)
1 2 46.148.114.32 202023 (LLHOST //...)
2 2
Apex Domain
Subdomains
Transfer
3 clcknads.pro
ca.clcknads.pro
2 KB
2 yourdream-girls1.com
yourdream-girls1.com
230 B
1 virt4me.com
www.virt4me.com
841 B
1 teasestocking.org
teasestocking.org
543 B
2 4
Domain Requested by
3 ca.clcknads.pro 3 redirects
2 yourdream-girls1.com 1 redirects teasestocking.org
1 www.virt4me.com 1 redirects
1 teasestocking.org
2 4

This site contains no links.

Subject Issuer Validity Valid
yourdream-girls1.com
Let's Encrypt Authority X3
2019-01-28 -
2019-04-28
3 months crt.sh

This page contains 2 frames:

Primary Page: http://teasestocking.org/
Frame ID: F1113E772C955F4172E058FB03BFDA23
Requests: 1 HTTP requests in this frame

Frame: https://yourdream-girls1.com/?u=63n8mwc&o=uhakbbr&t=cpa
Frame ID: 521A89BCE610FA9524576432650DE07F
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

2
Requests

50 %
HTTPS

25 %
IPv6

4
Domains

4
Subdomains

2
IPs

3
Countries

1 kB
Transfer

0 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • https://ca.clcknads.pro/v2/a/skm/16423 HTTP 307
  • https://ca.clcknads.pro/v2/a/skm/16423?_d=b422524d-5ad3-11e9-9f9d-51d4214aacee%26185.220.70.201%26Mozilla%252F5.0%2B%2528Macintosh%253B%2BIntel%2BMac%2BOS%2BX%2B10_13_5%2529%2BAppleWebKit%252F537.36%2B%2528KHTML%252C%2Blike%2BGecko%2529%2BChrome%252F67.0.3396.87%2BSafari%252F537.36%26http%253A%252F%252Fteasestocking.org%252F%26 HTTP 307
  • https://ca.clcknads.pro/v2/a/skm/imp?d=Al5DA9r3ak2FpcRAqDslheylO3ZF7v4S7DYzayabyeroI-09-QFuaNT_GlWAsAtkTNSW_nVGPaIZwRIzrs8s_4nPOidmqyS4ZErpoXoM9mRgUiut-KZL_Tl1-9_1FahxprjRhfPqd7w3zgLBoCSrflpX3du1p309zUg0ihy57A0jeN-4foH4hWJGYP0VkaPpO80OeTMtcNtWhXMGLixbTQboUtXva_cISMZRvheB0cnv4mfUkIpLZGdsEDNvPMirulSV0XZbtnuB70B-_oR5fhkb7RjSmyA1KPl8Ta7_2yE0eYE6VZFItWQNFbXAENVu9VWLXZ60ZBKsbqgzzqB_6Shl_N7ZuDueNpX3YcRfBfjrXUtNEkyqEc7v1MFC4rrA6cjeEiEdKwhwW6KXYvxQ_vGh8DslCBrnLncPVLaQq_ZVEGRWNpAzhUSly5qtC6bdO_sBAUYdqiPrzJsxngWtJlUUB_CJ8q9nLLUmCrABMU6BGAsSDQRdjpFwl0DIm7fucq8s2-jxMvwNsUDVf0B1pz4wtdIimq_mb76xF_QKfGxolu473QgLJZPqT2P_CosRstX2M1xEjDGEwA_QrDz6ltcQR3dPacqauZdSf2nPs6FPv5WTMsxT7YSihHIlvxuJb_mTtDpq2brJQaFB-6qHKCqKpBTvoh_5YssSWpJlFJRnlattYILWfdv5vUKWft2F6x0mwRNJOqCEazTAC52g3oX4Ts4hRXnm9L4SfABB0zZerWvoq7gz2wKuEv7eTtgdxcgdr2p2F5fwjbpAuBM2uWwLdC1MfAAisAQxX4RBztJf6baXIcB643FSiwH8Sxo4iiBGcoIkldMApXo54Zs9D2rjtX9S5OtWzetBhxsi675vKo2jgceTVCCPCR65TqsPkjBxabKlVpZl29cHVgtCf0omIy8895ub3XWxxzXLsGevSnngZVPE9h4DosKVvEI9-383U_l3FaGkAFxapZ6M0rmDjlWKUju_qBUIiYiyx61tniyGtKbuof-B2O10lcxZ8NPs7kDsiCUIXAEf0TWBW8l8XkMrgAc1iOn9SIg70TxgDu9nm7fNQCRv HTTP 307
  • http://www.virt4me.com/ HTTP 302
  • http://yourdream-girls1.com/?u=63n8mwc&o=uhakbbr&t=cpa HTTP 301
  • https://yourdream-girls1.com/?u=63n8mwc&o=uhakbbr&t=cpa

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
teasestocking.org/
342 B
543 B
Document
General
Full URL
http://teasestocking.org/
Protocol
HTTP/1.1
Server
162.210.70.23 , United States, ASN394695 (PUBLIC-DOMAIN-REGISTRY - PDR, US),
Reverse DNS
162.210.70-23.publicdomainregistry.com
Software
nginx /
Resource Hash
2de8769f78548eb15d10ff1662e0e6f27b816578f29b1f011135329d293c35e4
Security Headers
Name Value
X-Frame-Options GOFORIT

Request headers

Host
teasestocking.org
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Server
nginx
Date
Tue, 09 Apr 2019 14:28:13 GMT
Content-Type
text/html; charset=utf-8
Transfer-Encoding
chunked
Connection
keep-alive
X-Frame-Options
GOFORIT
Cookie set /
yourdream-girls1.com/ Frame 521A
Redirect Chain
  • https://ca.clcknads.pro/v2/a/skm/16423
  • https://ca.clcknads.pro/v2/a/skm/16423?_d=b422524d-5ad3-11e9-9f9d-51d4214aacee%26185.220.70.201%26Mozilla%252F5.0%2B%2528Macintosh%253B%2BIntel%2BMac%2BOS%2BX%2B10_13_5%2529%2BAppleWebKit%252F537.3...
  • https://ca.clcknads.pro/v2/a/skm/imp?d=Al5DA9r3ak2FpcRAqDslheylO3ZF7v4S7DYzayabyeroI-09-QFuaNT_GlWAsAtkTNSW_nVGPaIZwRIzrs8s_4nPOidmqyS4ZErpoXoM9mRgUiut-KZL_Tl1-9_1FahxprjRhfPqd7w3zgLBoCSrflpX3du1p3...
  • http://www.virt4me.com/
  • http://yourdream-girls1.com/?u=63n8mwc&o=uhakbbr&t=cpa
  • https://yourdream-girls1.com/?u=63n8mwc&o=uhakbbr&t=cpa
0
0
Document
General
Full URL
https://yourdream-girls1.com/?u=63n8mwc&o=uhakbbr&t=cpa
Requested by
Host: teasestocking.org
URL: http://teasestocking.org/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
46.148.114.32 , Ukraine, ASN202023 (LLHOST // M247, RO),
Reverse DNS
Software
nginx/1.12.0 / ASP.NET
Resource Hash

Request headers

Host
yourdream-girls1.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
http://teasestocking.org/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
http://teasestocking.org/

Response headers

Server
nginx/1.12.0
Date
Tue, 09 Apr 2019 14:28:12 GMT
Content-Type
text/html
Content-Length
6970
Connection
keep-alive
Cache-Control
private
Set-Cookie
ASP.NET_SessionId=wk410lrl1smifaiykmou1auy; path=/; HttpOnly
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET

Redirect headers

Server
nginx/1.12.0
Date
Tue, 09 Apr 2019 14:28:12 GMT
Content-Type
text/html
Content-Length
185
Connection
keep-alive
Location
https://yourdream-girls1.com/?u=63n8mwc&o=uhakbbr&t=cpa

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Scam (Online)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask

1 Cookies

Domain/Path Name / Value
yourdream-girls1.com/ Name: ASP.NET_SessionId
Value: wk410lrl1smifaiykmou1auy

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Frame-Options GOFORIT

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

ca.clcknads.pro
teasestocking.org
www.virt4me.com
yourdream-girls1.com
162.210.70.23
2606:4700:30::681b:bc25
46.148.114.32
88.208.59.71
2de8769f78548eb15d10ff1662e0e6f27b816578f29b1f011135329d293c35e4