crackethf.wurgeock.world
Open in
urlscan Pro
2606:4700:3035::6815:53d4
Malicious Activity!
Public Scan
Effective URL: https://crackethf.wurgeock.world/tauw/ryhr/uoen/kstg?5081f95336a1bd947f5e60e326f6f467
Submission: On September 29 via api from IE — Scanned from DE
Summary
TLS certificate: Issued by WE1 on September 18th 2024. Valid for: 3 months.
This is the only time crackethf.wurgeock.world was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Scam (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 67.222.146.78 67.222.146.78 | 30277 (DFW-DATAC...) (DFW-DATACENTER) | |
1 | 172.99.172.110 172.99.172.110 | 398343 (BAXET-GROUP) (BAXET-GROUP) | |
1 1 | 2606:4700:303... 2606:4700:3035::ac43:ad2c | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 26 | 2606:4700:303... 2606:4700:3035::6815:53d4 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2a06:98c1:312... 2a06:98c1:3121::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
29 | 3 |
ASN30277 (DFW-DATACENTER, US)
PTR: worldby.mt02-iridiangroup.com
worldby.mt02-iridiangroup.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
26 |
wurgeock.world
1 redirects
crackethf.wurgeock.world |
749 KB |
3 |
trk-elevostra.com
event.trk-elevostra.com — Cisco Umbrella Rank: 653733 |
|
1 |
hornetsound.sbs
1 redirects
hornetsound.sbs |
707 B |
1 |
useablepie.com
useablepie.com |
423 B |
1 |
mt02-iridiangroup.com
1 redirects
worldby.mt02-iridiangroup.com |
390 B |
29 | 5 |
Domain | Requested by | |
---|---|---|
26 | crackethf.wurgeock.world |
1 redirects
useablepie.com
crackethf.wurgeock.world |
3 | event.trk-elevostra.com |
crackethf.wurgeock.world
|
1 | hornetsound.sbs | 1 redirects |
1 | useablepie.com | |
1 | worldby.mt02-iridiangroup.com | 1 redirects |
29 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
useablepie.com R11 |
2024-08-02 - 2024-10-31 |
3 months | crt.sh |
wurgeock.world WE1 |
2024-09-18 - 2024-12-17 |
3 months | crt.sh |
trk-elevostra.com WE1 |
2024-08-11 - 2024-11-09 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://crackethf.wurgeock.world/tauw/ryhr/uoen/kstg?5081f95336a1bd947f5e60e326f6f467
Frame ID: 4EA4C841032E1E927CC97F3F0E208C57
Requests: 26 HTTP requests in this frame
Frame:
https://crackethf.wurgeock.world/cdn-cgi/challenge-platform/h/g/scripts/jsd/ec4b873d446c/main.js
Frame ID: 8E68FFFDCBC540A1CC625C2C37B7F30D
Requests: 2 HTTP requests in this frame
Screenshot
Page Title
[1] Prämie ausstehend - Kaufland - Wir wollen Ihre Meinung!Page URL History Show full URLs
-
http://worldby.mt02-iridiangroup.com/3ha.swf?ngzwutlaukcops=ugwglnlibuactuMWJnNDNtcTAwMDh5YjAwMzF3MDB3MDhlMGkwNTE...
HTTP 307
https://worldby.mt02-iridiangroup.com/3ha.swf?ngzwutlaukcops=ugwglnlibuactuMWJnNDNtcTAwMDh5YjAwMzF3MDB3MDhlMGkwNTE... HTTP 307
http://worldby.mt02-iridiangroup.com/3ha.swf?ngzwutlaukcops=ugwglnlibuactuMWJnNDNtcTAwMDh5YjAwMzF3MDB3MDhlMGkwNTE... HTTP 302
https://useablepie.com/0/0/0/43f4a8f0d326a53fe1023830b15c6565/32_580796_142416/302_11603_0516448_18... Page URL
-
https://hornetsound.sbs/35063501/123500351002/48a555be2ba5f9ac79896466b688f7dex/766403/462904
HTTP 302
https://crackethf.wurgeock.world/tauw/ryhr/uoen/kstg?5081f95336a1bd947f5e60e326f6f467 Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://worldby.mt02-iridiangroup.com/3ha.swf?ngzwutlaukcops=ugwglnlibuactuMWJnNDNtcTAwMDh5YjAwMzF3MDB3MDhlMGkwNTE2NDQ4Y2c1OA/
HTTP 307
https://worldby.mt02-iridiangroup.com/3ha.swf?ngzwutlaukcops=ugwglnlibuactuMWJnNDNtcTAwMDh5YjAwMzF3MDB3MDhlMGkwNTE2NDQ4Y2c1OA/ HTTP 307
http://worldby.mt02-iridiangroup.com/3ha.swf?ngzwutlaukcops=ugwglnlibuactuMWJnNDNtcTAwMDh5YjAwMzF3MDB3MDhlMGkwNTE2NDQ4Y2c1OA/ HTTP 302
https://useablepie.com/0/0/0/43f4a8f0d326a53fe1023830b15c6565/32_580796_142416/302_11603_0516448_18/692193122_12i7pfo Page URL
-
https://hornetsound.sbs/35063501/123500351002/48a555be2ba5f9ac79896466b688f7dex/766403/462904
HTTP 302
https://crackethf.wurgeock.world/tauw/ryhr/uoen/kstg?5081f95336a1bd947f5e60e326f6f467 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://worldby.mt02-iridiangroup.com/3ha.swf?ngzwutlaukcops=ugwglnlibuactuMWJnNDNtcTAwMDh5YjAwMzF3MDB3MDhlMGkwNTE2NDQ4Y2c1OA/ HTTP 307
- https://worldby.mt02-iridiangroup.com/3ha.swf?ngzwutlaukcops=ugwglnlibuactuMWJnNDNtcTAwMDh5YjAwMzF3MDB3MDhlMGkwNTE2NDQ4Y2c1OA/ HTTP 307
- http://worldby.mt02-iridiangroup.com/3ha.swf?ngzwutlaukcops=ugwglnlibuactuMWJnNDNtcTAwMDh5YjAwMzF3MDB3MDhlMGkwNTE2NDQ4Y2c1OA/ HTTP 302
- https://useablepie.com/0/0/0/43f4a8f0d326a53fe1023830b15c6565/32_580796_142416/302_11603_0516448_18/692193122_12i7pfo
- https://crackethf.wurgeock.world/cdn-cgi/challenge-platform/scripts/jsd/main.js HTTP 302
- https://crackethf.wurgeock.world/cdn-cgi/challenge-platform/h/g/scripts/jsd/ec4b873d446c/main.js
29 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
692193122_12i7pfo
useablepie.com/0/0/0/43f4a8f0d326a53fe1023830b15c6565/32_580796_142416/302_11603_0516448_18/ Redirect Chain
|
156 B 423 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
kstg
crackethf.wurgeock.world/tauw/ryhr/uoen/ Redirect Chain
|
53 KB 17 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
speculation
crackethf.wurgeock.world/cdn-cgi/ |
128 B 571 B |
Other
application/speculationrules+json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
crackethf.wurgeock.world/assets/vendors/bootstrap-4.5.3/css/ |
157 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
all.min.css
crackethf.wurgeock.world/assets/vendors/fontawesome_pro/css/ |
496 KB 96 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
common.css
crackethf.wurgeock.world/assets/css/madrid/ |
69 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
msg.v3.js
crackethf.wurgeock.world/inc/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ae6772f7fc5b918df500f9d46df2611f.png
crackethf.wurgeock.world/fim/5340-DE/ |
23 KB 24 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
eb7d3d7a0bdc32fec9be477394e6f527.png
crackethf.wurgeock.world/fim/5340-DE/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
65e388d3419b721ffa9b011a7eebd6f4.png
crackethf.wurgeock.world/fim/5340-DE/ |
88 KB 88 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
email-decode.min.js
crackethf.wurgeock.world/cdn-cgi/scripts/5c5dd728/cloudflare-static/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery-3.4.1.min.js
crackethf.wurgeock.world/assets/vendors/ |
86 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.js
crackethf.wurgeock.world/assets/vendors/bootstrap-4.5.3/js/ |
62 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
functions.js
crackethf.wurgeock.world/assets/js/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
gbvar.js
crackethf.wurgeock.world/assets/js/ |
41 B 551 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
intl_functions.js
crackethf.wurgeock.world/assets/js/ |
8 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
common.js
crackethf.wurgeock.world/assets/js/madrid/ |
66 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
v9e118mez8.js
crackethf.wurgeock.world/inc/ |
8 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
65e388d3419b721ffa9b011a7eebd6f4.png
crackethf.wurgeock.world/fim/5340-DE/ |
88 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
72ca03f3fadc074461fc06eb62e70e16.jpeg
crackethf.wurgeock.world/fim/5340-DE/ |
383 KB 384 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
/
crackethf.wurgeock.world/ |
41 B 559 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H3 |
v9e118mez8
event.trk-elevostra.com/register/event_log/ Frame |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
v9e118mez8
event.trk-elevostra.com/register/event_log/ |
0 0 |
Fetch
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
a0ee152d6748da90e6ca4faada67135f.png
crackethf.wurgeock.world/fim/5340-DE/ |
6 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
b12cf09c16c5a5925ad6b93e57a45a54.png
crackethf.wurgeock.world/fim/5340-DE/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.js
crackethf.wurgeock.world/cdn-cgi/challenge-platform/h/g/scripts/jsd/ec4b873d446c/ Frame 8E68 Redirect Chain
|
8 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
crackethf.wurgeock.world/ |
0 517 B |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
8cac8979c80639d0
crackethf.wurgeock.world/cdn-cgi/challenge-platform/h/g/jsd/r/ Frame 8E68 |
0 927 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
v9e118mez8
event.trk-elevostra.com/register/event_log/ |
0 0 |
Fetch
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Scam (Online)109 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| pushCount object| MYCALL string| s1 string| s2 string| fp string| esource string| pshpub string| pshdomain string| pshfingerprint function| $ function| jQuery object| bootstrap function| datehax function| startTimer number| duration string| popUrl function| getPopUrl string| rightnow object| currentdate object| months function| startINTSurvey function| startQuestion function| startSurveyDub function| showSurveyDub function| callPushNotify string| LNG string| CMP string| CNT string| BID string| PDN string| FNP function| urlBase64ToUint8Array function| pullUrlParams function| push_subscribe function| push_subscribe_promise function| setIfNull function| logPushEvent function| push_unsubscribe function| push_init function| setSessionId function| setUtm function| getSessionId function| getUrlVars function| getDomainName function| getStore function| setAttributes string| attrChoices string| domain string| pipeline object| states function| birthdayFill function| beforeShowQuestion function| showOfferWall function| processQuestion function| replaceUrlParam number| time_popup function| startTimerPopup function| showModalPopup function| popunder number| box_trying boolean| oneclick function| formatPhoneNumber function| switchTypeQuestions function| validatePhone function| validateEmail function| days function| daysInMonth function| dashedNumber function| alpha function| validateKeyStrokes function| showStreetState function| emailPixel function| overflowP function| showDisclaimer function| preventS function| comment function| like function| startSurveyU function| createQuestionU function| switchTypeQuestionsU function| checkedList function| nextQuestionU function| validateData function| showStreetStateU function| showModal function| showOfferWallU function| count_p function| _saveProduct function| mfq_tags function| fadeInImgModal function| lazyLoad function| lazyLoadStartSurvey function| gradientModify19 string| aff_id string| click_id string| Brand string| lpid string| lpow object| prepop string| cityURL string| stateURL string| languageCode string| countryCode string| questiontx string| of string| prod_var string| pname_modal function| cheers4 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
useablepie.com/ | Name: uid7664 Value: 1235003510-20240929100659-e0629ccae90628306e0f9a0e85765791-4629 |
|
hornetsound.sbs/ | Name: PHPSESSID Value: 8a0ff21b8c0eceeff12628325ddd621f |
|
crackethf.wurgeock.world/ | Name: PHPSESSID Value: 3077c6ebab8deff820a4c8991761b972 |
|
.wurgeock.world/ | Name: cf_clearance Value: 2CNXq2eP_MWidbWmn9ioGr5Ae_f8z6fmQdXl1Q2_2E4-1727618822-1.2.1.1-ABmd8zLwuBBjK2I9r5ZM6J50i54hRrx4EVVmt5NgBkBMXfoCeqa8lbOSlYk4QLcxnXvVGjS3ZjFRpa.CiNCoXiG4uX6Ax7HnpMWpwUPvREZ8UQ3NUBwSXHcWfT4jhqoQlQtZoEHt5J26fVFdt0ohS25XxqRHgWd4JJ5lib6qW9lze8g8U5621DNaTyrPusfQa5_KXqt03pMdZKK2UwLxyN5c2WK3aK4nlJUW4NFllNsmDWLQLlNxUxYbluzaCG_rZ.92bJA8LUdhl5FtcA1hkri07RXfCv_WvsfppwMyrDhRRvDH33Y3.68yKDbBxL7Qcd_IzPPhivbcQ.ignSkoTMPIehK2mZYv7tGDalF5QZFLK57_jLQ1ANKv7qiqpmuV |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
crackethf.wurgeock.world
event.trk-elevostra.com
hornetsound.sbs
useablepie.com
worldby.mt02-iridiangroup.com
172.99.172.110
2606:4700:3035::6815:53d4
2606:4700:3035::ac43:ad2c
2a06:98c1:3121::3
67.222.146.78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