URL: http://37.49.230.133/FuckMalwareResearchers/FuckinToaster.ppc
Submission Tags: falconsandbox
Submission: On October 12 via api from US — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 0 domains to perform 1 HTTP transactions. The main IP is 37.49.230.133, located in Netherlands and belongs to SQUITTER-NETWORKS, NL. The main domain is 37.49.230.133.
This is the only time 37.49.230.133 was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 37.49.230.133 213371 (SQUITTER-...)
1 1
Apex Domain
Subdomains
Transfer
1 0
Domain Requested by
1 0

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://37.49.230.133/FuckMalwareResearchers/FuckinToaster.ppc
Frame ID: ED8B1126F64CB9B1E80816400F56076A
Requests: 1 HTTP requests in this frame

Screenshot

Page Title

404 Not Found

Page Statistics

1
Requests

0 %
HTTPS

0 %
IPv6

0
Domains

0
Subdomains

1
IPs

1
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request FuckinToaster.ppc
37.49.230.133/FuckMalwareResearchers/
275 B
492 B
Document
General
Full URL
http://37.49.230.133/FuckMalwareResearchers/FuckinToaster.ppc
Protocol
HTTP/1.1
Server
37.49.230.133 , Netherlands, ASN213371 (SQUITTER-NETWORKS, NL),
Reverse DNS
vps6849.estoxy.com
Software
Apache/2.4.41 (Ubuntu) /
Resource Hash
29b35d8b53334d06511024dcd71a942d1004aa1387dc1b48fa0591be47fbc64b

Request headers

Host
37.49.230.133
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

Date
Tue, 12 Oct 2021 12:32:57 GMT
Server
Apache/2.4.41 (Ubuntu)
Content-Length
275
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=iso-8859-1

Verdicts & Comments Add Verdict or Comment

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect boolean| originAgentCluster

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: http://37.49.230.133/FuckMalwareResearchers/FuckinToaster.ppc
Message:
Failed to load resource: the server responded with a status of 404 (Not Found)

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

37.49.230.133
29b35d8b53334d06511024dcd71a942d1004aa1387dc1b48fa0591be47fbc64b