URL: https://scamrefunds.com/
Submission: On July 13 via api from US — Scanned from US

Summary

This website contacted 2 IPs in 1 countries across 4 domains to perform 5 HTTP transactions. The main IP is 208.91.197.132, located in Virgin Islands (British) and belongs to CONFLUENCE-NETWORK-INC, VG. The main domain is scamrefunds.com.
TLS certificate: Issued by testexp on June 2nd 2020. Valid for: 10 years.
This is the only time scamrefunds.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 208.91.197.132 40034 (CONFLUENC...)
5 2
Apex Domain
Subdomains
Transfer
2 scamrefunds.com
scamrefunds.com
18 KB
0 cloudfront.net Failed
d38psrni17bvxu.cloudfront.net Failed
0 rytrk.com Failed
rytrk.com Failed
0 parkingcrew.net Failed
c.parkingcrew.net Failed
5 4
Domain Requested by
2 scamrefunds.com scamrefunds.com
0 d38psrni17bvxu.cloudfront.net Failed scamrefunds.com
0 rytrk.com Failed scamrefunds.com
0 c.parkingcrew.net Failed scamrefunds.com
5 4

This site contains links to these domains. Also see Links.

Domain
www.networksolutions.com
ads.networksolutions.com
customerservice.web.com
assets.web.com
Subject Issuer Validity Valid
testexp
testexp
2020-06-02 -
2030-05-31
10 years crt.sh

This page contains 1 frames:

Primary Page: https://scamrefunds.com/
Frame ID: 1BC9220BBCEF8A310BBAF5036D3C9440
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

scamrefunds.com

Page Statistics

5
Requests

0 %
HTTPS

0 %
IPv6

4
Domains

4
Subdomains

2
IPs

1
Countries

18 kB
Transfer

18 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
scamrefunds.com/
18 KB
18 KB
Document
General
Full URL
https://scamrefunds.com/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
208.91.197.132 , Virgin Islands (British), ASN40034 (CONFLUENCE-NETWORK-INC, VG),
Reverse DNS
Software
openresty /
Resource Hash
72003ed85c1c903f5ae1ce40973b4a45d92e3587bad56055950b08ec19aebbd5

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Connection
keep-alive
Content-Type
text/html; charset=UTF-8
Date
Sat, 13 Jul 2024 23:33:08 GMT
Server
openresty
Transfer-Encoding
chunked
logo_netsol.png
scamrefunds.com/assets/themes/registrar/images/
303 B
303 B
Image
General
Full URL
https://scamrefunds.com/assets/themes/registrar/images/logo_netsol.png
Requested by
Host: scamrefunds.com
URL: https://scamrefunds.com/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
208.91.197.132 , Virgin Islands (British), ASN40034 (CONFLUENCE-NETWORK-INC, VG),
Reverse DNS
Software
openresty /
Resource Hash
1e2d7c9815b5001a0dabee038ff98d32625900c5674afdc9ab8239329a2a7c9a

Request headers

Referer
https://scamrefunds.com/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Date
Sat, 13 Jul 2024 23:33:13 GMT
Server
openresty
Connection
keep-alive
Content-Length
303
Content-Type
text/html; charset=UTF-8
sale_form.js
c.parkingcrew.net/scripts/
0
0

track.php
rytrk.com/
0
0

arrows.png
d38psrni17bvxu.cloudfront.net/themes/cleanPeppermintBlack_657d9013/img/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
c.parkingcrew.net
URL
http://c.parkingcrew.net/scripts/sale_form.js
Domain
rytrk.com
URL
https://rytrk.com/track.php?domain=scamrefunds.com&toggle=browserjs&uid=MTcyMDkxMzYwMC4zMjk2OmZiNmFlNTY5YjcyMzBmMWNmZjg1NDBkZDczNjM2ZTllZmVlZmVjNjliYjdiMGQxODdlNjY5MzEwYTRhMjMwZGM6NjY5MzBlYzA1MDc3NQ%3D%3D
Domain
d38psrni17bvxu.cloudfront.net
URL
https://d38psrni17bvxu.cloudfront.net/themes/cleanPeppermintBlack_657d9013/img/arrows.png

Verdicts & Comments Add Verdict or Comment

17 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| tcblock object| searchboxBlock object| containerNames string| uniqueTrackingID string| themedata string| domain string| scriptPath string| adtest object| pageOptions function| x function| getXMLhttp function| ajaxQuery function| ajaxBackfill function| loadFeed function| relatedCallback function| relatedFallback object| xmlHttp

1 Cookies

Domain/Path Name / Value
.scamrefunds.com/ Name: vsid
Value: 917vr468459187022034675

3 Console Messages

Source Level URL
Text
security error URL: https://scamrefunds.com/
Message:
Mixed Content: The page at 'https://scamrefunds.com/' was loaded over HTTPS, but requested an insecure script 'http://c.parkingcrew.net/scripts/sale_form.js'. This request has been blocked; the content must be served over HTTPS.
network error URL: https://scamrefunds.com/(Line 318)
Message:
Failed to load resource: net::ERR_TIMED_OUT
network error URL: https://scamrefunds.com/assets/themes/registrar/images/logo_netsol.png
Message:
Failed to load resource: the server responded with a status of 403 (Forbidden)

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

c.parkingcrew.net
d38psrni17bvxu.cloudfront.net
rytrk.com
scamrefunds.com
c.parkingcrew.net
d38psrni17bvxu.cloudfront.net
rytrk.com
208.91.197.132
1e2d7c9815b5001a0dabee038ff98d32625900c5674afdc9ab8239329a2a7c9a
72003ed85c1c903f5ae1ce40973b4a45d92e3587bad56055950b08ec19aebbd5