Submitted URL: https://cutt.ly/aOm6Yls
Effective URL: http://jkxtsk.xyz/uP3mzwHA
Submission Tags: volksbank phishing Search All
Submission: On February 02 via manual from DE — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 2 domains to perform 1 HTTP transactions. The main IP is 172.67.167.135, located in United States and belongs to CLOUDFLARENET, US. The main domain is jkxtsk.xyz.
This is the only time jkxtsk.xyz was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 2606:4700:10:... 13335 (CLOUDFLAR...)
1 172.67.167.135 13335 (CLOUDFLAR...)
1 1
Apex Domain
Subdomains
Transfer
1 jkxtsk.xyz
jkxtsk.xyz
825 B
1 cutt.ly
cutt.ly — Cisco Umbrella Rank: 63623
442 B
1 2
Domain Requested by
1 jkxtsk.xyz
1 cutt.ly 1 redirects
1 2

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://jkxtsk.xyz/uP3mzwHA
Frame ID: E515DDF5BA68C1C1828BF71AB435621D
Requests: 1 HTTP requests in this frame

Screenshot

Page Title

404 Not found

Page URL History Show full URLs

  1. https://cutt.ly/aOm6Yls HTTP 301
    http://jkxtsk.xyz/uP3mzwHA Page URL

Page Statistics

1
Requests

0 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

1
IPs

1
Countries

1 kB
Transfer

0 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://cutt.ly/aOm6Yls HTTP 301
    http://jkxtsk.xyz/uP3mzwHA Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request uP3mzwHA
jkxtsk.xyz/
Redirect Chain
  • https://cutt.ly/aOm6Yls
  • http://jkxtsk.xyz/uP3mzwHA
166 B
825 B
Document
General
Full URL
http://jkxtsk.xyz/uP3mzwHA
Protocol
HTTP/1.1
Server
172.67.167.135 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5ade9f55a47257de40d40eba8942fc52b177da328ce57a75872b25f753b0494e

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/97.0.4692.71 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

Date
Wed, 02 Feb 2022 20:03:17 GMT
Content-Type
text/html; charset=utf-8
Transfer-Encoding
chunked
Connection
keep-alive
access-control-allow-origin
*
CF-Cache-Status
DYNAMIC
Report-To
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=B3Y0JPINF9TvolfTf52CHq3%2Fx1rHsKz23ut2B%2FRK%2BrD53emnlLSeep%2Boy8XTB77eNl1tsNLIms%2BO3WDT%2FfVf1NTnmYPGgYRBHs%2BnyFVDsB3RIfHQlklApUBtaRwz"}],"group":"cf-nel","max_age":604800}
NEL
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server
cloudflare
CF-RAY
6d7605a149f68fe0-FRA
Content-Encoding
gzip
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400

Redirect headers

date
Wed, 02 Feb 2022 20:03:17 GMT
content-type
text/html; charset=UTF-8
location
http://jkXtsK.xyz/uP3mzwHA
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-cache, no-store, must-revalidate
pragma
no-cache
vary
Accept-Encoding
x-xss-protection
1; mode=block
x-frame-options
SAMEORIGIN
x-content-type-options
nosniff
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
6d76059fcfa75794-IAD
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

1 Cookies

Domain/Path Name / Value
cutt.ly/ Name: PHPSESSID
Value: fvq4sqcd6pat4msm2ni9pked93

1 Console Messages

Source Level URL
Text
network error URL: http://jkxtsk.xyz/uP3mzwHA
Message:
Failed to load resource: the server responded with a status of 404 (Not Found)

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

cutt.ly
jkxtsk.xyz
172.67.167.135
2606:4700:10::ac43:8ee
5ade9f55a47257de40d40eba8942fc52b177da328ce57a75872b25f753b0494e