Submitted URL: https://biletlotofree.blogspot.com/
Effective URL: https://superlink.one/14cy?tds=1request_uri={request_uri}
Submission: On March 07 via manual from RU

Summary

This website contacted 3 IPs in 4 countries across 3 domains to perform 5 HTTP transactions. The main IP is 190.115.19.30, located in Belize and belongs to DDOS-GUARD CORP., BZ. The main domain is superlink.one.
TLS certificate: Issued by Let's Encrypt Authority X3 on March 7th 2020. Valid for: 3 months.
This is the only time superlink.one was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 2a00:1450:400... 15169 (GOOGLE)
1 1 91.215.152.164 59729 (ITL-)
1 3 190.115.19.30 262254 (DDOS-GUAR...)
2 185.129.100.100 57724 (DDOS-GUARD)
5 3
Apex Domain
Subdomains
Transfer
3 superlink.one
superlink.one
938 B
2 ddos-guard.net
check.ddos-guard.net
726 B
1 blogspot.com
biletlotofree.blogspot.com
16 KB
5 3
Domain Requested by
3 superlink.one 1 redirects biletlotofree.blogspot.com
superlink.one
2 check.ddos-guard.net superlink.one
1 biletlotofree.blogspot.com
5 3

This site contains no links.

Subject Issuer Validity Valid
*.googleusercontent.com
GTS CA 1O1
2020-02-12 -
2020-05-06
3 months crt.sh
superlink.one
Let's Encrypt Authority X3
2020-03-07 -
2020-06-05
3 months crt.sh
*.ddos-guard.net
Sectigo RSA Domain Validation Secure Server CA
2019-07-03 -
2021-07-02
2 years crt.sh

This page contains 1 frames:

Primary Page: https://superlink.one/14cy?tds=1request_uri={request_uri}
Frame ID: 907CC7A89206F656F503108FE66CE71E
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://biletlotofree.blogspot.com/ Page URL
  2. http://91.215.152.164/BJxsCM HTTP 302
    https://superlink.one/tds/9gxe?request_uri={request_uri} HTTP 302
    http://superlink.one/14cy?tds=1request_uri={request_uri} HTTP 307
    https://superlink.one/14cy?tds=1request_uri={request_uri} Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • url /^https?:\/\/[^\/]+\.blogspot\.com/i

Overall confidence: 100%
Detected patterns
  • url /^https?:\/\/[^\/]+\.blogspot\.com/i

Overall confidence: 100%
Detected patterns
  • headers server /GSE/i

Overall confidence: 100%
Detected patterns
  • headers server /GSE/i

Page Statistics

5
Requests

100 %
HTTPS

25 %
IPv6

3
Domains

3
Subdomains

3
IPs

4
Countries

17 kB
Transfer

72 kB
Size

2
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://biletlotofree.blogspot.com/ Page URL
  2. http://91.215.152.164/BJxsCM HTTP 302
    https://superlink.one/tds/9gxe?request_uri={request_uri} HTTP 302
    http://superlink.one/14cy?tds=1request_uri={request_uri} HTTP 307
    https://superlink.one/14cy?tds=1request_uri={request_uri} Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
biletlotofree.blogspot.com/
71 KB
16 KB
Document
General
Full URL
https://biletlotofree.blogspot.com/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
biletlotofree.blogspot.com
:scheme
https
:path
/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
document
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document

Response headers

status
200
content-security-policy
upgrade-insecure-requests
content-security-policy-report-only
default-src https: blob: data: 'unsafe-inline' 'unsafe-eval'; report-uri https://www.blogger.com/cspreport
content-type
text/html; charset=UTF-8
expires
Sat, 07 Mar 2020 18:07:23 GMT
date
Sat, 07 Mar 2020 18:07:23 GMT
cache-control
private, max-age=0
last-modified
Fri, 06 Mar 2020 08:30:56 GMT
etag
W/"c16931510d0e8ba30c9b7c57f95e32779d4d6c1470bc81b36b95e2033e59824d"
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
15684
server
GSE
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
Primary Request 14cy
superlink.one/
Redirect Chain
  • http://91.215.152.164/BJxsCM
  • https://superlink.one/tds/9gxe?request_uri={request_uri}
  • http://superlink.one/14cy?tds=1request_uri={request_uri}
  • https://superlink.one/14cy?tds=1request_uri={request_uri}
382 B
404 B
Document
General
Full URL
https://superlink.one/14cy?tds=1request_uri={request_uri}
Requested by
Host: biletlotofree.blogspot.com
URL: https://biletlotofree.blogspot.com/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
190.115.19.30 , Belize, ASN262254 (DDOS-GUARD CORP., BZ),
Reverse DNS
Software
ngjit /
Resource Hash
5999e0f41cbf36e234300fc3b4b1728e9383119bc2c887ae209bb7d6a1ed001d

Request headers

:method
GET
:authority
superlink.one
:scheme
https
:path
/14cy?tds=1request_uri={request_uri}
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
__ddg1=v1aA2J4hEY8n1jkjU8Ct
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://biletlotofree.blogspot.com/

Response headers

status
404
server
ngjit
date
Sat, 07 Mar 2020 18:07:23 GMT
content-type
text/html; charset=utf-8

Redirect headers

Location
https://superlink.one/14cy?tds=1request_uri={request_uri}
Non-Authoritative-Reason
HSTS
check.js
check.ddos-guard.net/
152 B
480 B
Script
General
Full URL
https://check.ddos-guard.net/check.js
Requested by
Host: superlink.one
URL: https://superlink.one/14cy?tds=1request_uri={request_uri}
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.129.100.100 , Russian Federation, ASN57724 (DDOS-GUARD, RU),
Reverse DNS
ddos-guard.net
Software
ngjit /
Resource Hash
9f44c4662d2c9366b40c4ced2a149b4f09f8bc744ddd5560e282b5ccf4ce3712

Request headers

Referer
https://superlink.one/14cy?tds=1request_uri={request_uri}
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Sat, 07 Mar 2020 18:07:24 GMT
last-modified
Thu, 01 Jan 1970 00:00:00 GMT
server
ngjit
etag
TeBiuByuTG6mKtL6
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
status
200
cache-control
private, s-maxage=0, max-age=31536000
content-type
application/javascript
content-length
152
expires
Sun, 07 Mar 2021 18:07:24 GMT
TeBiuByuTG6mKtL6
superlink.one/.well-known/ddos-guard/id/
68 B
239 B
Image
General
Full URL
https://superlink.one/.well-known/ddos-guard/id/TeBiuByuTG6mKtL6
Requested by
Host: superlink.one
URL: https://superlink.one/14cy?tds=1request_uri={request_uri}
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
190.115.19.30 , Belize, ASN262254 (DDOS-GUARD CORP., BZ),
Reverse DNS
Software
ngjit /
Resource Hash
f309b7c03d9cae63a9bedbee6ed655f3dbcdb194132943639344dead5f3b9710

Request headers

Referer
https://superlink.one/14cy?tds=1request_uri={request_uri}
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

status
200
date
Sat, 07 Mar 2020 18:07:24 GMT
cache-control
no-cache
server
ngjit
content-type
image/png
content-length
68
expires
Thu, 01 Jan 1970 00:00:00 GMT
TeBiuByuTG6mKtL6
check.ddos-guard.net/set/id/
68 B
246 B
Image
General
Full URL
https://check.ddos-guard.net/set/id/TeBiuByuTG6mKtL6
Requested by
Host: superlink.one
URL: https://superlink.one/14cy?tds=1request_uri={request_uri}
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.129.100.100 , Russian Federation, ASN57724 (DDOS-GUARD, RU),
Reverse DNS
ddos-guard.net
Software
ngjit /
Resource Hash
f309b7c03d9cae63a9bedbee6ed655f3dbcdb194132943639344dead5f3b9710

Request headers

Referer
https://superlink.one/14cy?tds=1request_uri={request_uri}
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Sat, 07 Mar 2020 18:07:24 GMT
server
ngjit
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
status
200
cache-control
no-cache
content-type
image/png
content-length
68
expires
Thu, 01 Jan 1970 00:00:00 GMT

Verdicts & Comments Add Verdict or Comment

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

2 Cookies

Domain/Path Name / Value
.superlink.one/ Name: __ddg2
Value: TeBiuByuTG6mKtL6
.superlink.one/ Name: __ddg1
Value: v1aA2J4hEY8n1jkjU8Ct

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy upgrade-insecure-requests
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block