Submitted URL: http://fuckgirls.best/
Effective URL: http://fuckgirls.best/
Submission: On January 12 via manual from IN

Summary

This website contacted 2 IPs in 3 countries across 3 domains to perform 2 HTTP transactions. The main IP is 162.210.70.23, located in Burlington, United States and belongs to PUBLIC-DOMAIN-REGISTRY - PDR, US. The main domain is fuckgirls.best.
This is the only time fuckgirls.best was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Scam (Online)

Domain & IP information

IP Address AS Autonomous System
1 162.210.70.23 394695 (PUBLIC-DO...)
1 1 185.203.243.33 204601 (ON-LINE-D...)
1 85.25.246.254 8972 (GD-EMEA-D...)
2 2
Apex Domain
Subdomains
Transfer
1 fgrl.fun
fgrl.fun
1 tfgo.top
tfgo.top
383 B
1 fuckgirls.best
fuckgirls.best
524 B
2 3
Domain Requested by
1 fgrl.fun fuckgirls.best
1 tfgo.top 1 redirects
1 fuckgirls.best
2 3

This site contains no links.

Subject Issuer Validity Valid

This page contains 2 frames:

Primary Page: http://fuckgirls.best/
Frame ID: 44474D80C07A7B6CFC5F4AC499A144A2
Requests: 1 HTTP requests in this frame

Frame: http://fgrl.fun/?u=wr2p605&o=q4e8nx7&t=adlch
Frame ID: 790C9A781A401852B2FD857D1DD3DEBD
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

2
Requests

0 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

2
IPs

3
Countries

1 kB
Transfer

0 kB
Size

2
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • http://tfgo.top/fgb HTTP 302
  • http://fgrl.fun/?u=wr2p605&o=q4e8nx7&t=adlch

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
fuckgirls.best/
323 B
524 B
Document
General
Full URL
http://fuckgirls.best/
Protocol
HTTP/1.1
Server
162.210.70.23 Burlington, United States, ASN394695 (PUBLIC-DOMAIN-REGISTRY - PDR, US),
Reverse DNS
sdjkfhjsdfjhdf.com
Software
nginx /
Resource Hash
b4c1701c6c5f500703989bd8be12b7ce671c9564cbac5e77d641320279b6ef89
Security Headers
Name Value
X-Frame-Options GOFORIT

Request headers

Host
fuckgirls.best
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Server
nginx
Date
Sun, 12 Jan 2020 19:53:17 GMT
Content-Type
text/html; charset=utf-8
Transfer-Encoding
chunked
Connection
keep-alive
X-Frame-Options
GOFORIT
Cookie set /
fgrl.fun/ Frame 790C
Redirect Chain
  • http://tfgo.top/fgb
  • http://fgrl.fun/?u=wr2p605&o=q4e8nx7&t=adlch
0
0
Document
General
Full URL
http://fgrl.fun/?u=wr2p605&o=q4e8nx7&t=adlch
Requested by
Host: fuckgirls.best
URL: http://fuckgirls.best/
Protocol
HTTP/1.1
Server
85.25.246.254 , Germany, ASN8972 (GD-EMEA-DC-SXB1, DE),
Reverse DNS
puck431.dedicatedpanel.com
Software
nginx/1.12.0 / ASP.NET
Resource Hash

Request headers

Host
fgrl.fun
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://fuckgirls.best/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://fuckgirls.best/

Response headers

Server
nginx/1.12.0
Date
Sun, 12 Jan 2020 19:53:17 GMT
Content-Type
text/html
Content-Length
6970
Connection
keep-alive
Cache-Control
private
Set-Cookie
ASP.NET_SessionId=wgbrw3oopjyr0sqgggtrhj2u; path=/; HttpOnly ASP.NET_SessionId=wgbrw3oopjyr0sqgggtrhj2u; path=/; HttpOnly q1=crqve4d2fzbam5hu; path=/
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET

Redirect headers

Server
nginx
Date
Sun, 12 Jan 2020 19:53:17 GMT
Content-Type
text/html; charset=UTF-8
Content-Length
0
Connection
keep-alive
Keep-Alive
timeout=60
X-Powered-By
PHP/5.6.36
Access-Control-Allow-Origin
*
Set-Cookie
asdfgh_fgb=0; expires=Mon, 13-Jan-2020 19:53:17 GMT; Max-Age=86400; path=/
Location
http://fgrl.fun/?u=wr2p605&o=q4e8nx7&t=adlch

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Scam (Online)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

2 Cookies

Domain/Path Name / Value
fgrl.fun/ Name: q1
Value: crqve4d2fzbam5hu
fgrl.fun/ Name: ASP.NET_SessionId
Value: wgbrw3oopjyr0sqgggtrhj2u

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Frame-Options GOFORIT

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

fgrl.fun
fuckgirls.best
tfgo.top
162.210.70.23
185.203.243.33
85.25.246.254
b4c1701c6c5f500703989bd8be12b7ce671c9564cbac5e77d641320279b6ef89