www.made4fuck.net
Open in
urlscan Pro
2a05:d018:244:5200::ab
Malicious Activity!
Public Scan
Effective URL: https://www.made4fuck.net/c/4c8a669b83e6c2d3?&click_id=lkywj6033b4d9000b57a8&s1=22104&s2=1190704&s3=backuser&s5=&lp=MJ&j4=...
Submission: On February 22 via manual from US
Summary
TLS certificate: Issued by R3 on February 12th 2021. Valid for: 3 months.
This is the only time www.made4fuck.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Porn Scam (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 34.234.204.19 34.234.204.19 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 2 | 2a05:d018:244... 2a05:d018:244:5200::ab | 16509 (AMAZON-02) (AMAZON-02) | |
9 | 2.16.186.107 2.16.186.107 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 2a00:1450:400... 2a00:1450:4001:829::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:827::2008 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:801::2003 | 15169 (GOOGLE) (GOOGLE) | |
1 4 | 2a02:6b8::1:119 2a02:6b8::1:119 | 13238 (YANDEX) (YANDEX) | |
17 | 7 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-34-234-204-19.compute-1.amazonaws.com
34.234.204.19 |
ASN16509 (AMAZON-02, US)
rkzzk.hotgirl4you.com | |
www.made4fuck.net |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a2-16-186-107.deploy.static.akamaitechnologies.com
cdn-bimi.akamaized.net |
ASN15169 (GOOGLE, US)
www.googletagmanager.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
akamaized.net
cdn-bimi.akamaized.net |
233 KB |
4 |
yandex.ru
1 redirects
mc.yandex.ru |
67 KB |
1 |
gstatic.com
fonts.gstatic.com |
14 KB |
1 |
googletagmanager.com
www.googletagmanager.com |
29 KB |
1 |
googleapis.com
fonts.googleapis.com |
455 B |
1 |
made4fuck.net
www.made4fuck.net |
2 KB |
1 |
hotgirl4you.com
1 redirects
rkzzk.hotgirl4you.com |
490 B |
17 | 7 |
Domain | Requested by | |
---|---|---|
9 | cdn-bimi.akamaized.net |
www.made4fuck.net
cdn-bimi.akamaized.net |
4 | mc.yandex.ru |
1 redirects
34.234.204.19
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | www.googletagmanager.com |
www.made4fuck.net
|
1 | fonts.googleapis.com |
cdn-bimi.akamaized.net
|
1 | www.made4fuck.net |
34.234.204.19
|
1 | rkzzk.hotgirl4you.com | 1 redirects |
17 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.made4fuck.net R3 |
2021-02-12 - 2021-05-13 |
3 months | crt.sh |
a248.e.akamai.net DigiCert Secure Site ECC CA-1 |
2020-07-15 - 2021-09-13 |
a year | crt.sh |
upload.video.google.com GTS CA 1O1 |
2021-01-26 - 2021-04-20 |
3 months | crt.sh |
*.google-analytics.com GTS CA 1O1 |
2021-01-26 - 2021-04-20 |
3 months | crt.sh |
*.gstatic.com GTS CA 1O1 |
2021-01-26 - 2021-04-20 |
3 months | crt.sh |
mc.yandex.ru Yandex CA |
2020-09-29 - 2021-03-11 |
5 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.made4fuck.net/c/4c8a669b83e6c2d3?&click_id=lkywj6033b4d9000b57a8&s1=22104&s2=1190704&s3=backuser&s5=&lp=MJ&j4=&j5=&j6=%3Cj6%3E
Frame ID: 8CD2A9CA895E4CB0F08B50C419FF6D51
Requests: 17 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://34.234.204.19/wG5LQ Page URL
-
https://rkzzk.hotgirl4you.com/c/1e3a4e532f1c7040?s1=22104&s2=1190704&s3=AJT&s5=AJT&click_id=AJT&j1=1&j3=1
HTTP 302
https://www.made4fuck.net/c/4c8a669b83e6c2d3?&click_id=lkywj6033b4d9000b57a8&s1=22104&s2=1190704&s3=ba... Page URL
Detected technologies
Ubuntu (Operating Systems) ExpandDetected patterns
- headers server /Ubuntu/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Google Tag Manager (Tag Managers) Expand
Detected patterns
- html /googletagmanager\.com\/ns\.html[^>]+><\/iframe>/i
- html /<!-- (?:End )?Google Tag Manager -->/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://34.234.204.19/wG5LQ Page URL
-
https://rkzzk.hotgirl4you.com/c/1e3a4e532f1c7040?s1=22104&s2=1190704&s3=AJT&s5=AJT&click_id=AJT&j1=1&j3=1
HTTP 302
https://www.made4fuck.net/c/4c8a669b83e6c2d3?&click_id=lkywj6033b4d9000b57a8&s1=22104&s2=1190704&s3=backuser&s5=&lp=MJ&j4=&j5=&j6=%3Cj6%3E Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 14- https://mc.yandex.ru/watch/65937478?wmode=7&page-url=https%3A%2F%2Fwww.made4fuck.net%2Fc%2F4c8a669b83e6c2d3%3F%26click_id%3Dlkywj6033b4d9000b57a8%26s1%3D22104%26s2%3D1190704%26s3%3Dbackuser%26s5%3D%26lp%3DMJ%26j4%3D%26j5%3D%26j6%3D%253Cj6%253E&page-ref=http%3A%2F%2F34.234.204.19%2FwG5LQ&charset=utf-8&browser-info=pv%3A1%3Agdpr%3A14%3Avf%3Acaxsklyqnpvsij3%3Afp%3A648%3Afu%3A0%3Aen%3Autf-8%3Ala%3Aen-US%3Av%3A433%3Acn%3A1%3Adp%3A0%3Als%3A1506670972788%3Ahid%3A915012551%3Az%3A60%3Ai%3A20210222144249%3Aet%3A1614001370%3Ac%3A1%3Arn%3A377015991%3Au%3A1614001370256186976%3Aw%3A1600x1200%3As%3A1600x1200x24%3Ask%3A1%3Ahdl%3A1%3Ans%3A1614001369044%3Awv%3A2%3Ads%3A1%2C60%2C41%2C1%2C155%2C0%2C%2C227%2C10%2C651%2C651%2C0%2C489%3Adsn%3A2%2C59%2C41%2C1%2C155%2C0%2C%2C230%2C10%2C651%2C651%2C0%2C489%3Arqnl%3A1%3Ati%3A2%3Ast%3A1614001370%3At%3A HTTP 302
- https://mc.yandex.ru/watch/65937478/1?wmode=7&page-url=https%3A%2F%2Fwww.made4fuck.net%2Fc%2F4c8a669b83e6c2d3%3F%26click_id%3Dlkywj6033b4d9000b57a8%26s1%3D22104%26s2%3D1190704%26s3%3Dbackuser%26s5%3D%26lp%3DMJ%26j4%3D%26j5%3D%26j6%3D%253Cj6%253E&page-ref=http%3A%2F%2F34.234.204.19%2FwG5LQ&charset=utf-8&browser-info=pv%3A1%3Agdpr%3A14%3Avf%3Acaxsklyqnpvsij3%3Afp%3A648%3Afu%3A0%3Aen%3Autf-8%3Ala%3Aen-US%3Av%3A433%3Acn%3A1%3Adp%3A0%3Als%3A1506670972788%3Ahid%3A915012551%3Az%3A60%3Ai%3A20210222144249%3Aet%3A1614001370%3Ac%3A1%3Arn%3A377015991%3Au%3A1614001370256186976%3Aw%3A1600x1200%3As%3A1600x1200x24%3Ask%3A1%3Ahdl%3A1%3Ans%3A1614001369044%3Awv%3A2%3Ads%3A1%2C60%2C41%2C1%2C155%2C0%2C%2C227%2C10%2C651%2C651%2C0%2C489%3Adsn%3A2%2C59%2C41%2C1%2C155%2C0%2C%2C230%2C10%2C651%2C651%2C0%2C489%3Arqnl%3A1%3Ati%3A2%3Ast%3A1614001370%3At%3A
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
wG5LQ
34.234.204.19/ |
154 B 409 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
4c8a669b83e6c2d3
www.made4fuck.net/c/ Redirect Chain
|
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
cdn-bimi.akamaized.net/landings/207645/1613486508/css/ |
17 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
script.min.js
cdn-bimi.akamaized.net/landings/207645/1613486508/js/ |
252 KB 75 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
function.js
cdn-bimi.akamaized.net/landings/207645/1613486508/js/ |
768 B 1 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
translate.js
cdn-bimi.akamaized.net/landings/207645/1613486508/js/ |
20 KB 9 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
01.png
cdn-bimi.akamaized.net/landings/207645/1613486508/images/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
675 B 455 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
gtm.js
www.googletagmanager.com/ |
74 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
no.png
cdn-bimi.akamaized.net/landings/207645/1613486508/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
yes.png
cdn-bimi.akamaized.net/landings/207645/1613486508/images/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.jpg
cdn-bimi.akamaized.net/landings/207645/1613486508/images/ |
131 KB 131 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pattern.png
cdn-bimi.akamaized.net/landings/207645/1613486508/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
S6uyw4BMUTPHjx4wXiWtFCc.woff2
fonts.gstatic.com/s/lato/v17/ |
14 KB 14 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
tag.js
mc.yandex.ru/metrika/ |
209 KB 66 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1
mc.yandex.ru/watch/65937478/ Redirect Chain
|
167 B 202 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
advert.gif
mc.yandex.ru/metrika/ |
43 B 121 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Porn Scam (Online)18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery object| langs object| dataLayer object| google_tag_manager number| th_bridge_jump_step function| ym object| Ya object| yaCounter659374782 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.made4fuck.net/ | Name: unique_id Value: 5fb66637000e56ac |
|
www.made4fuck.net/ | Name: unique_411736 Value: unique_411736 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn-bimi.akamaized.net
fonts.googleapis.com
fonts.gstatic.com
mc.yandex.ru
rkzzk.hotgirl4you.com
www.googletagmanager.com
www.made4fuck.net
2.16.186.107
2a00:1450:4001:801::2003
2a00:1450:4001:827::2008
2a00:1450:4001:829::200a
2a02:6b8::1:119
2a05:d018:244:5200::ab
34.234.204.19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