ladieswanttobeowned.com
Open in
urlscan Pro
2606:4700:3036::ac43:a54e
Malicious Activity!
Public Scan
Effective URL: https://ladieswanttobeowned.com/lbjseppubzaig?s2=15945815
Submission: On June 04 via api from BE
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on May 5th 2020. Valid for: 5 months.
This is the only time ladieswanttobeowned.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Porn Scam (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 185.243.113.254 185.243.113.254 | 205406 (A2-AMS01 ...) (A2-AMS01 Access2.IT Group B.V.) | |
4 | 2606:4700:303... 2606:4700:3036::ac43:a54e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:815::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:2b | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2a00:1450:400... 2a00:1450:4001:820::2003 | 15169 (GOOGLE) (GOOGLE) | |
8 | 6 |
ASN205406 (A2-AMS01 Access2.IT Group B.V., NL)
PTR: mail.flirtmatcher.info
www.flirtmatcher.info |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
ladieswanttobeowned.com
ladieswanttobeowned.com |
995 KB |
1 |
gstatic.com
fonts.gstatic.com |
13 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
1 |
googleapis.com
fonts.googleapis.com |
594 B |
1 |
flirtmatcher.info
www.flirtmatcher.info |
1 KB |
8 | 5 |
Domain | Requested by | |
---|---|---|
4 | ladieswanttobeowned.com |
www.flirtmatcher.info
ladieswanttobeowned.com code.jquery.com |
1 | fonts.gstatic.com |
ladieswanttobeowned.com
|
1 | code.jquery.com |
ladieswanttobeowned.com
|
1 | fonts.googleapis.com |
ladieswanttobeowned.com
|
1 | www.flirtmatcher.info | |
8 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2020-05-05 - 2020-10-09 |
5 months | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-05-05 - 2020-07-28 |
3 months | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-05-20 - 2020-08-12 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ladieswanttobeowned.com/lbjseppubzaig?s2=15945815
Frame ID: 3C9F6BCF851BA209A0CBF13C20FB6311
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://www.flirtmatcher.info/AdAS67CImEyH1ALqF-Qj-ZuPpSEFrAeeTSkAobNyknbbZ2p6XEEpNF-oMffrEnRaxQ2j5fdsUTGk... Page URL
- https://ladieswanttobeowned.com/lbjseppubzaig?s2=15945815 Page URL
Detected technologies
Ubuntu (Operating Systems) ExpandDetected patterns
- headers server /Ubuntu/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://www.flirtmatcher.info/AdAS67CImEyH1ALqF-Qj-ZuPpSEFrAeeTSkAobNyknbbZ2p6XEEpNF-oMffrEnRaxQ2j5fdsUTGkOMgN-wQP_Uc0a-ZP6uRCt3YmIpR5of0=?s5MvdoA-DmObK5luM936n22fLewn2BOjHeJ_7tMxAod8IRPduB54P6rXuOifInPgy83377iBK2KOVrEwyYq19jJnhp9hNV-FF0nST3iGa_GkwBj3g5Ok4yWimd6cE8MSDRCwFC0uFuhurgvgaFjz7jIcggZHIEfqfmO2kpVZWIMDuC46M8k4CcWpV0KYmegb2l4cS1RpbPnajIjr2eeqwhkcBuMrbeG1OZTtTroNMA5SFJhNkinNkBOue9dezE4DAmxMe-9AFpOuxhQKYNJ-AfMtiGUEbwRLQvU6oRZH9h4= Page URL
- https://ladieswanttobeowned.com/lbjseppubzaig?s2=15945815 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
AdAS67CImEyH1ALqF-Qj-ZuPpSEFrAeeTSkAobNyknbbZ2p6XEEpNF-oMffrEnRaxQ2j5fdsUTGkOMgN-wQP_Uc0a-ZP6uRCt3YmIpR5of0=
www.flirtmatcher.info/ |
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
lbjseppubzaig
ladieswanttobeowned.com/ |
13 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 594 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-2.2.4.min.js
code.jquery.com/ |
84 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
p.js
ladieswanttobeowned.com/ |
416 B 337 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.mp4
ladieswanttobeowned.com/assets/6b8f7e97983b6a17148e12f7015e6b5e/video/ |
974 KB 976 KB |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
715 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
JTUSjIg1_i6t8kCHKm459WlhyyTh89Y.woff2
fonts.gstatic.com/s/montserrat/v14/ |
13 KB 13 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
ladieswanttobeowned.com/DE/f0d944050a2aaf83ba214edf135f48d0/ |
13 KB 13 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Porn Scam (Online)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery string| u3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
ladieswanttobeowned.com/ | Name: uord Value: fba19a1b1d825499b6f7477bb38fc0b2 |
|
ladieswanttobeowned.com/ | Name: k Value: SFMyNTY.g3QAAAAIbQAAAARhdW5xdAAAAAFtAAAABDIzMTFtAAAACndMcXFRZ1Z6QUttAAAAA2hpZG0AAAAjVk1VYnNkcXFJUk9vaXpBQ3d3aldCZEd6TW16d0hkTFFUV2dtAAAAAmhsZAADbmlsbQAAAAJyZHQAAAAEZAAKX19zdHJ1Y3RfX2QAGEVsaXhpci5UZGV4LlJvdGF0aW9uRGF0YWQADmNsaWNrZWRfb2ZmZXJzdAAAAABkAAhsYW5kaW5nc2wAAAABYgAABCdqZAALc2Vlbl9vZmZlcnNsAAAAAWIAAGeEam0AAAAFc3ViXzFkAANuaWxtAAAABXN1Yl8ybQAAAAgxNTk0NTgxNW0AAAAHdHJhY2tlcm0AAAAHbm90cmFja20AAAADdW5xbQAAAAxyUWh4eGtETmxaY2c.tRnopVneq0KUVBwijCtfyJZlhaX5HNTWlwbXMslBTNk |
|
.ladieswanttobeowned.com/ | Name: __cfduid Value: d771737ead392c4a7a0a4cf25934f7b161591282802 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
fonts.googleapis.com
fonts.gstatic.com
ladieswanttobeowned.com
www.flirtmatcher.info
185.243.113.254
2001:4de0:ac19::1:b:2b
2606:4700:3036::ac43:a54e
2a00:1450:4001:815::200a
2a00:1450:4001:820::2003
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
06818b2c41364e70021d420e1cc98f4bbcc0a082f6dbd02bb5a272c12b7764b2
0ce5a460ace775560c3344a43245687bdbec5cb8ee20d209ab9fa67f4e09a3e8
2765fe42c37f6539657c0785dd26855365ab5d97da623d06260b55a46bc73182
2b3b62fbea6a0f85a16904129c448a32bac1b84f6d63987fb12a4bec2bc91e97
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd
85d94baac9568fcc0cea8dd4df59a3d514d42622a2821c24212e08ddf4399ccc
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627
cbc520e2c731415e6e0d376a2779ea5daccf06b4f7f7fc86dfa8edeb0db8ddcb
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855