www.videohotz.com
Open in
urlscan Pro
43.133.219.77
Malicious Activity!
Public Scan
Effective URL: https://www.videohotz.com/
Submission: On July 16 via automatic, source phishtank — Scanned from IT
Summary
TLS certificate: Issued by R11 on July 15th 2024. Valid for: 3 months.
This is the only time www.videohotz.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 5 | 172.67.179.9 172.67.179.9 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 43.133.219.77 43.133.219.77 | 132203 (TENCENT-N...) (TENCENT-NET-AP-CN Tencent Building) | |
2 | 107.148.237.162 107.148.237.162 | 54600 (PEG-SV) (PEG-SV) | |
17 | 4 |
ASN132203 (TENCENT-NET-AP-CN Tencent Building, Kejizhongyi Avenue, CN)
www.videohotz.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
videohotz.com
www.videohotz.com Failed |
174 KB |
5 |
tengol.club
2 redirects
1121sdf.tengol.club |
8 KB |
2 |
comcomtt56789.com
www.comcomtt56789.com |
237 B |
0 |
kuku555888.top
Failed
www.kuku555888.top Failed |
|
17 | 4 |
Domain | Requested by | |
---|---|---|
9 | www.videohotz.com |
www.videohotz.com
|
5 | 1121sdf.tengol.club |
2 redirects
1121sdf.tengol.club
|
2 | www.comcomtt56789.com |
www.videohotz.com
|
0 | www.kuku555888.top Failed |
www.videohotz.com
|
17 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
tengol.club WE1 |
2024-07-15 - 2024-10-13 |
3 months | crt.sh |
www.jsfhvip.com R11 |
2024-07-15 - 2024-10-13 |
3 months | crt.sh |
www.comcomtt56789.com R10 |
2024-06-12 - 2024-09-10 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.videohotz.com/
Frame ID: 8E2AF7D080A860A10917720E5B97228B
Requests: 15 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://1121sdf.tengol.club/411aa2ss Page URL
-
https://1121sdf.tengol.club/cdn-cgi/phish-bypass?atok=33O_Iu_rXI_TOs7AJiO9FsHi73aakk7U5wpNUC3islM-172112...
HTTP 301
https://1121sdf.tengol.club/411aa2ss HTTP 301
https://www.videohotz.com/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- jquery-ui.*\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://1121sdf.tengol.club/411aa2ss Page URL
-
https://1121sdf.tengol.club/cdn-cgi/phish-bypass?atok=33O_Iu_rXI_TOs7AJiO9FsHi73aakk7U5wpNUC3islM-1721121666-0.0.1.1-%2F411aa2ss
HTTP 301
https://1121sdf.tengol.club/411aa2ss HTTP 301
https://www.videohotz.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 3- https://1121sdf.tengol.club/favicon.ico HTTP 301
- https://www.videohotz.com/
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
411aa2ss
1121sdf.tengol.club/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cf.errors.css
1121sdf.tengol.club/cdn-cgi/styles/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon-exclamation.png
1121sdf.tengol.club/cdn-cgi/images/ |
452 B 587 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
/
www.videohotz.com/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
www.videohotz.com/ Redirect Chain
|
82 B 234 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
it.js
www.videohotz.com/static/js/ |
1 KB 721 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
common.css
www.videohotz.com/static/css/ |
573 KB 95 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
urlConfig.json
www.videohotz.com/ResourceConfig/ |
975 B 1 KB |
Script
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
axios.js
www.videohotz.com/static/js/ |
42 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui.js
www.videohotz.com/static/js/ |
1 KB 836 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ResourceRedConfig.js
www.videohotz.com/static/js/ |
11 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loading.gif
www.videohotz.com/static/image/ |
60 KB 58 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
queryIpClick
www.comcomtt56789.com/click/ |
0 237 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
queryIpClick
www.comcomtt56789.com/click/ |
0 0 |
Preflight
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
www.videohotz.com/ |
548 B 611 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
index.php
www.kuku555888.top/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS |
index.php
www.kuku555888.top/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.videohotz.com
- URL
- https://www.videohotz.com/
- Domain
- www.kuku555888.top
- URL
- https://www.kuku555888.top/index.php
- Domain
- www.kuku555888.top
- URL
- https://www.kuku555888.top/index.php
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| url function| axios string| token boolean| isTrue1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.1121sdf.tengol.club/ | Name: __cf_mw_byp Value: 33O_Iu_rXI_TOs7AJiO9FsHi73aakk7U5wpNUC3islM-1721121666-0.0.1.1-/411aa2ss |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
1121sdf.tengol.club
www.comcomtt56789.com
www.kuku555888.top
www.videohotz.com
www.kuku555888.top
www.videohotz.com
107.148.237.162
172.67.179.9
43.133.219.77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