9jeburoe.xyz
Open in
urlscan Pro
2606:4700:3033::681b:96b0
Malicious Activity!
Public Scan
Effective URL: https://9jeburoe.xyz/game_h648/
Submission: On October 15 via manual from SG
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on October 5th 2020. Valid for: a year.
This is the only time 9jeburoe.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2a02:6b8::221 2a02:6b8::221 | 13238 (YANDEX) (YANDEX) | |
1 1 | 2a02:6b8::232 2a02:6b8::232 | 13238 (YANDEX) (YANDEX) | |
2 3 | 2606:4700:303... 2606:4700:3034::681b:b298 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 3 | 190.115.26.117 190.115.26.117 | 262254 (DDOS-GUAR...) (DDOS-GUARD CORP.) | |
3 | 2606:4700:303... 2606:4700:3033::681b:96b0 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
6 | 3 |
ASN262254 (DDOS-GUARD CORP., BZ)
PTR: 190-115-26-117.bilibili.be
ccpay.win |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
9jeburoe.xyz
9jeburoe.xyz |
7 KB |
3 |
ccpay.win
1 redirects
ccpay.win |
31 KB |
3 |
lingoto.xyz
2 redirects
lingoto.xyz |
2 KB |
1 |
yandex.net
1 redirects
sba.yandex.net |
289 B |
1 |
clck.ru
1 redirects
clck.ru |
362 B |
6 | 5 |
Domain | Requested by | |
---|---|---|
3 | 9jeburoe.xyz |
ccpay.win
9jeburoe.xyz |
3 | ccpay.win |
1 redirects
ccpay.win
|
3 | lingoto.xyz | 2 redirects |
1 | sba.yandex.net | 1 redirects |
1 | clck.ru | 1 redirects |
6 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.cloudflare.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
ccpay.win Let's Encrypt Authority X3 |
2020-10-14 - 2021-01-12 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-10-05 - 2021-10-05 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://9jeburoe.xyz/game_h648/
Frame ID: A1957B62E7B659C71DE6F2780AC285D5
Requests: 6 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://clck.ru/RNbWj
HTTP 302
https://sba.yandex.net/redirect?url=http%3A%2F%2Flingoto.xyz%2F1210ru%3Fiuw86&client=clck&sign=d5d5... HTTP 302
http://lingoto.xyz/1210ru?iuw86 HTTP 301
http://lingoto.xyz/1210ru/?iuw86 Page URL
-
http://lingoto.xyz/tds/1010op
HTTP 302
https://ccpay.win/d/5f7989a1deb01 Page URL
-
https://ccpay.win/check-unique/index?unique_code=35654b5ff734651327496757c37081fd&link_type=pa...
HTTP 302
https://9jeburoe.xyz/game_h648/ Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Cloudflare
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://clck.ru/RNbWj
HTTP 302
https://sba.yandex.net/redirect?url=http%3A%2F%2Flingoto.xyz%2F1210ru%3Fiuw86&client=clck&sign=d5d5e3b77ae1b1d98f0628ab7bbcabba HTTP 302
http://lingoto.xyz/1210ru?iuw86 HTTP 301
http://lingoto.xyz/1210ru/?iuw86 Page URL
-
http://lingoto.xyz/tds/1010op
HTTP 302
https://ccpay.win/d/5f7989a1deb01 Page URL
-
https://ccpay.win/check-unique/index?unique_code=35654b5ff734651327496757c37081fd&link_type=partner&code=5f7989a1deb01&u=&url=https://9jeburoe.xyz/game_h648/&upgrade=6e0dc15b690de
HTTP 302
https://9jeburoe.xyz/game_h648/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://clck.ru/RNbWj HTTP 302
- https://sba.yandex.net/redirect?url=http%3A%2F%2Flingoto.xyz%2F1210ru%3Fiuw86&client=clck&sign=d5d5e3b77ae1b1d98f0628ab7bbcabba HTTP 302
- http://lingoto.xyz/1210ru?iuw86 HTTP 301
- http://lingoto.xyz/1210ru/?iuw86
- http://lingoto.xyz/tds/1010op HTTP 302
- https://ccpay.win/d/5f7989a1deb01
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
lingoto.xyz/1210ru/ Redirect Chain
|
90 B 639 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
5f7989a1deb01
ccpay.win/d/ Redirect Chain
|
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fp21.min.js
ccpay.win/frontend/web/js/ |
29 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
9jeburoe.xyz/game_h648/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cf.errors.css
9jeburoe.xyz/cdn-cgi/styles/ |
23 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon-exclamation.png
9jeburoe.xyz/cdn-cgi/images/ |
452 B 539 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes object| _cf_translation1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.9jeburoe.xyz/ | Name: __cfduid Value: d5b8a61ab2ab8a737d85528d0981c5a851602771516 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
9jeburoe.xyz
ccpay.win
clck.ru
lingoto.xyz
sba.yandex.net
190.115.26.117
2606:4700:3033::681b:96b0
2606:4700:3034::681b:b298
2a02:6b8::221
2a02:6b8::232
16fd28061d42cf29268600418d5aa26b585435027ca599a42141cbc820f2547c
af4ac135cf575e46eb783d82f6c659d92afb5e31b647e2ac9d62530c3e371bdb
c6bf7d30a4ccf41b4515c485bcda13e9005b074efab44341d22ecf47440171f2
dc0a424f482eda376d4845ce510cea28fbc25eea6e62affead9834696355b644
e94012a0e38d16adfeddf0e094c09375eba1eba6f7eefc9bf27848b382e5d66d
f1591a5221136c49438642155691ae6c68e25b7241f3d7ebe975b09a77662016