URL: https://vxug.fakedoma.in/
Submission: On January 15 via manual from US

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 2 HTTP transactions. The main IP is 213.59.119.184, located in Los Angeles, United States and belongs to DEDIPATH-LLC - DediPath, US. The main domain is vxug.fakedoma.in.
TLS certificate: Issued by Let's Encrypt Authority X3 on November 26th 2019. Valid for: 3 months.
This is the only time vxug.fakedoma.in was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 213.59.119.184 35913 (DEDIPATH-LLC)
2 1
Apex Domain
Subdomains
Transfer
2 fakedoma.in
vxug.fakedoma.in
151 KB
2 1
Domain Requested by
2 vxug.fakedoma.in vxug.fakedoma.in
2 1

This site contains links to these domains. Also see Links.

Domain
twitter.com
Subject Issuer Validity Valid
vxug.fakedoma.in
Let's Encrypt Authority X3
2019-11-26 -
2020-02-24
3 months crt.sh

This page contains 1 frames:

Primary Page: https://vxug.fakedoma.in/
Frame ID: 7BE60F74DEFD37B0A5289B9132339EF5
Requests: 2 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

2
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

151 kB
Transfer

153 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
vxug.fakedoma.in/
3 KB
1 KB
Document
General
Full URL
https://vxug.fakedoma.in/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
213.59.119.184 Los Angeles, United States, ASN35913 (DEDIPATH-LLC - DediPath, US),
Reverse DNS
vxug.fakedoma.in
Software
nginx /
Resource Hash
c1ab12387929bffa3dc0b147eaa78ab291a2399a8a3dab47fb6f28622584dcdf

Request headers

Host
vxug.fakedoma.in
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Sec-Fetch-User
?1
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Sec-Fetch-User
?1

Response headers

Server
nginx
Date
Wed, 15 Jan 2020 13:28:58 GMT
Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Last-Modified
Sun, 12 Jan 2020 09:13:37 GMT
ETag
W/"5e1ae341-db0"
Allow
GET, POST, HEAD
Content-Encoding
gzip
sponsor.png
vxug.fakedoma.in/
150 KB
150 KB
Image
General
Full URL
https://vxug.fakedoma.in/sponsor.png
Requested by
Host: vxug.fakedoma.in
URL: https://vxug.fakedoma.in/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
213.59.119.184 Los Angeles, United States, ASN35913 (DEDIPATH-LLC - DediPath, US),
Reverse DNS
vxug.fakedoma.in
Software
nginx /
Resource Hash
73f2f2ba0fe96700cb5a4307e6857b6c5779d391cace5fce48211444a248d799

Request headers

Referer
https://vxug.fakedoma.in/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Wed, 15 Jan 2020 13:28:59 GMT
Last-Modified
Mon, 18 Nov 2019 03:42:00 GMT
Server
nginx
ETag
"5dd21308-25647"
Allow
GET, POST, HEAD
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
153159

Verdicts & Comments Add Verdict or Comment

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

vxug.fakedoma.in
213.59.119.184
73f2f2ba0fe96700cb5a4307e6857b6c5779d391cace5fce48211444a248d799
c1ab12387929bffa3dc0b147eaa78ab291a2399a8a3dab47fb6f28622584dcdf