ladieswanttobeowned.com
Open in
urlscan Pro
2606:4700:3036::ac43:a54e
Malicious Activity!
Public Scan
Effective URL: https://ladieswanttobeowned.com/lbjseppubzaig?s2=15947001
Submission: On June 04 via api from BE
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on May 5th 2020. Valid for: 5 months.
This is the only time ladieswanttobeowned.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Porn Scam (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 185.243.113.254 185.243.113.254 | 205406 (A2-AMS01 ...) (A2-AMS01 Access2.IT Group B.V.) | |
4 | 2606:4700:303... 2606:4700:3036::ac43:a54e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:821::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:3b | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2a00:1450:400... 2a00:1450:4001:820::2003 | 15169 (GOOGLE) (GOOGLE) | |
8 | 6 |
ASN205406 (A2-AMS01 Access2.IT Group B.V., NL)
PTR: mail.flirtmatcher.info
www.flirtmatcher.info |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
ladieswanttobeowned.com
ladieswanttobeowned.com |
995 KB |
1 |
gstatic.com
fonts.gstatic.com |
14 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
1 |
googleapis.com
fonts.googleapis.com |
639 B |
1 |
flirtmatcher.info
www.flirtmatcher.info |
1 KB |
8 | 5 |
Domain | Requested by | |
---|---|---|
4 | ladieswanttobeowned.com |
www.flirtmatcher.info
ladieswanttobeowned.com code.jquery.com |
1 | fonts.gstatic.com |
ladieswanttobeowned.com
|
1 | code.jquery.com |
ladieswanttobeowned.com
|
1 | fonts.googleapis.com |
ladieswanttobeowned.com
|
1 | www.flirtmatcher.info | |
8 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2020-05-05 - 2020-10-09 |
5 months | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-05-05 - 2020-07-28 |
3 months | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-05-20 - 2020-08-12 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ladieswanttobeowned.com/lbjseppubzaig?s2=15947001
Frame ID: 9FE5E226238E73C2B0AF02DBD4E2CD8A
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://www.flirtmatcher.info/AdAS67CImEyH1ALqF-Qj-ZuPpSEFrAeeTSkAobNyknbbZ2p6XEEpNF-oMffrEnRaxQ2j5fdsUTGk... Page URL
- https://ladieswanttobeowned.com/lbjseppubzaig?s2=15947001 Page URL
Detected technologies
Ubuntu (Operating Systems) ExpandDetected patterns
- headers server /Ubuntu/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://www.flirtmatcher.info/AdAS67CImEyH1ALqF-Qj-ZuPpSEFrAeeTSkAobNyknbbZ2p6XEEpNF-oMffrEnRaxQ2j5fdsUTGkOMgN-wQP_Uc0a-ZP6uRCt3YmIpR5of0=?1Kc8T1Wb1MoMQmVnk4fryzIfkovinkcnGNGR9FLzN9tXf3xt-Sn9YMgOlEX8sQZA9eh_oYBz8KG2-uHEIWm2UmmcvhPz09D_yX4buyxUFBvKgLZvG3aJ1kG3P2GlzimZMlElMevLG2sW5oPUnEbfoaJVr_4rCSUZZ2JUnWrc7Hwq3_zI2OMY_Shy8ICWBwtymrDFIyBgiQ4fzqzIDsGXP9d35dXFESipN8fk3JeycEi8HPhdfIgHu5HbW0ljdR2EZMhzamWulrJVxYFEwCbhIw== Page URL
- https://ladieswanttobeowned.com/lbjseppubzaig?s2=15947001 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
AdAS67CImEyH1ALqF-Qj-ZuPpSEFrAeeTSkAobNyknbbZ2p6XEEpNF-oMffrEnRaxQ2j5fdsUTGkOMgN-wQP_Uc0a-ZP6uRCt3YmIpR5of0=
www.flirtmatcher.info/ |
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
lbjseppubzaig
ladieswanttobeowned.com/ |
13 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 639 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-2.2.4.min.js
code.jquery.com/ |
84 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
p.js
ladieswanttobeowned.com/ |
416 B 337 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.mp4
ladieswanttobeowned.com/assets/6b8f7e97983b6a17148e12f7015e6b5e/video/ |
974 KB 976 KB |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
715 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
JTUSjIg1_i6t8kCHKm459WlhyyTh89Y.woff2
fonts.gstatic.com/s/montserrat/v14/ |
13 KB 14 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
ladieswanttobeowned.com/DE/f0d944050a2aaf83ba214edf135f48d0/ |
13 KB 13 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Porn Scam (Online)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery string| u3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
ladieswanttobeowned.com/ | Name: uord Value: 501dc160a6a053319d13dd2a5ad12504 |
|
ladieswanttobeowned.com/ | Name: k Value: SFMyNTY.g3QAAAAIbQAAAARhdW5xdAAAAAFtAAAABDIzMTFtAAAACnBCQUFiakRNZEttAAAAA2hpZG0AAAAjbWVVTXNFQUFJYXdyVGdyc1BQcFdHcm9iUVhYenVQcU1TclZtAAAAAmhsZAADbmlsbQAAAAJyZHQAAAAEZAAKX19zdHJ1Y3RfX2QAGEVsaXhpci5UZGV4LlJvdGF0aW9uRGF0YWQADmNsaWNrZWRfb2ZmZXJzdAAAAABkAAhsYW5kaW5nc2wAAAABYgAABCdqZAALc2Vlbl9vZmZlcnNsAAAAAWIAAGeEam0AAAAFc3ViXzFkAANuaWxtAAAABXN1Yl8ybQAAAAgxNTk0NzAwMW0AAAAHdHJhY2tlcm0AAAAHbm90cmFja20AAAADdW5xbQAAAAxYbmhyckJ6ZFFhdW0.UK8UTFnXjH6pHxC6_WUwsLIq5bxNf1dj68wnUuhpumg |
|
.ladieswanttobeowned.com/ | Name: __cfduid Value: db844723cc2558ae881020d6ab1c08e7b1591288109 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
fonts.googleapis.com
fonts.gstatic.com
ladieswanttobeowned.com
www.flirtmatcher.info
185.243.113.254
2001:4de0:ac19::1:b:3b
2606:4700:3036::ac43:a54e
2a00:1450:4001:820::2003
2a00:1450:4001:821::200a
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
06818b2c41364e70021d420e1cc98f4bbcc0a082f6dbd02bb5a272c12b7764b2
09b4b58dce6a68ada7f1a53b59dbff8e8d4ad16e4c940dd4243dfd269391531f
0ce5a460ace775560c3344a43245687bdbec5cb8ee20d209ab9fa67f4e09a3e8
2b3b62fbea6a0f85a16904129c448a32bac1b84f6d63987fb12a4bec2bc91e97
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd
9b5be6354cf655acc59f468beee8c803a0652ca2920621b143182cfaa554591c
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627
adf6ffeed62be207738721cfb4a5421ee2db15df95967b52d48edb3e3cf2401e
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855