URL: https://146.112.61.107/
Submission: On July 10 via api from LU — Scanned from US

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 3 HTTP transactions. The main IP is 146.112.61.107, located in United States and belongs to OPENDNS, US. The main domain is 146.112.61.107.
TLS certificate: Issued by Cisco Umbrella Secondary SubCA mia-SG on July 8th 2024. Valid for: 5 days.
This is the only time 146.112.61.107 was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 146.112.61.107 36692 (OPENDNS)
3 2

This site contains no links.

Subject Issuer Validity Valid
*.opendns.com
Cisco Umbrella Secondary SubCA mia-SG
2024-07-08 -
2024-07-13
5 days crt.sh

This page contains 1 frames:

Frame: http://146.112.61.107.x.d5137eff097560409b099260076e7fbb2ab5.d0452014.id.opendns.com/s/malware.opendns.com/?X-OpenDNS-Session=aa51dc5c0ccc5aad4_d5137eff097560409b099260076e7fbb2ab5_3b098ba60edf6798891e1c6222e3a8f47d8f3fea_url=146.112.61.107&server=mia2&prefs=&tagging=&nref
Frame ID: 0A78CA7846523F26FA74F07646BC9241
Requests: 6 HTTP requests in this frame

Screenshot


Page Statistics

3
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

1 kB
Transfer

8 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • https://malware.opendns.com/?url=146.112.61.107&server=mia2&prefs=&tagging=&nref HTTP 302
  • http://146.112.61.107.x.d5137eff097560409b099260076e7fbb2ab5.d0452014.id.opendns.com/s/malware.opendns.com/?X-OpenDNS-Session=aa51dc5c0ccc5aad4_d5137eff097560409b099260076e7fbb2ab5_3b098ba60edf6798891e1c6222e3a8f47d8f3fea_url=146.112.61.107&server=mia2&prefs=&tagging=&nref HTTP 307
  • https://146.112.61.107.x.d5137eff097560409b099260076e7fbb2ab5.d0452014.id.opendns.com/s/malware.opendns.com/?X-OpenDNS-Session=aa51dc5c0ccc5aad4_d5137eff097560409b099260076e7fbb2ab5_3b098ba60edf6798891e1c6222e3a8f47d8f3fea_url=146.112.61.107&server=mia2&prefs=&tagging=&nref HTTP 307
  • http://146.112.61.107.x.d5137eff097560409b099260076e7fbb2ab5.d0452014.id.opendns.com/s/malware.opendns.com/?X-OpenDNS-Session=aa51dc5c0ccc5aad4_d5137eff097560409b099260076e7fbb2ab5_3b098ba60edf6798891e1c6222e3a8f47d8f3fea_url=146.112.61.107&server=mia2&prefs=&tagging=&nref

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
146.112.61.107/
514 B
690 B
Document
General
Full URL
https://146.112.61.107/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
146.112.61.107 , United States, ASN36692 (OPENDNS, US),
Reverse DNS
hit-malware.opendns.com
Software
Cisco Umbrella /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.35 Safari/537.36

Response headers

Connection
keep-alive
Content-Type
text/html
Date
Wed, 10 Jul 2024 20:58:54 GMT
Server
Cisco Umbrella
Transfer-Encoding
chunked
/
146.112.61.107.x.d5137eff097560409b099260076e7fbb2ab5.d0452014.id.opendns.com/s/malware.opendns.com/
Redirect Chain
  • https://malware.opendns.com/?url=146.112.61.107&server=mia2&prefs=&tagging=&nref
  • http://146.112.61.107.x.d5137eff097560409b099260076e7fbb2ab5.d0452014.id.opendns.com/s/malware.opendns.com/?X-OpenDNS-Session=aa51dc5c0ccc5aad4_d5137eff097560409b099260076e7fbb2ab5_3b098ba60edf6798...
  • https://146.112.61.107.x.d5137eff097560409b099260076e7fbb2ab5.d0452014.id.opendns.com/s/malware.opendns.com/?X-OpenDNS-Session=aa51dc5c0ccc5aad4_d5137eff097560409b099260076e7fbb2ab5_3b098ba60edf679...
  • http://146.112.61.107.x.d5137eff097560409b099260076e7fbb2ab5.d0452014.id.opendns.com/s/malware.opendns.com/?X-OpenDNS-Session=aa51dc5c0ccc5aad4_d5137eff097560409b099260076e7fbb2ab5_3b098ba60edf6798...
0
0

truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
04d05978fdb111358073ab0524e5c1fafc0826615c206987618416b8bd8a4747

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.35 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e4222715b556e7d99622c83e620d2f8e090047e56adb07923047f95828d561f2

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.35 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
155 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7808605ddd1f0eaa454aa444293d2f0260943e51e53838fca46506e6a69fe521

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.35 Safari/537.36

Response headers

Content-Type
image/png
/
146.112.61.107.x.d5137eff097560409b099260076e7fbb2ab5.d0452014.id.opendns.com/s/malware.opendns.com/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
146.112.61.107.x.d5137eff097560409b099260076e7fbb2ab5.d0452014.id.opendns.com
URL
http://146.112.61.107.x.d5137eff097560409b099260076e7fbb2ab5.d0452014.id.opendns.com/s/malware.opendns.com/?X-OpenDNS-Session=aa51dc5c0ccc5aad4_d5137eff097560409b099260076e7fbb2ab5_3b098ba60edf6798891e1c6222e3a8f47d8f3fea_url=146.112.61.107&server=mia2&prefs=&tagging=&nref
Domain
146.112.61.107.x.d5137eff097560409b099260076e7fbb2ab5.d0452014.id.opendns.com
URL
http://146.112.61.107.x.d5137eff097560409b099260076e7fbb2ab5.d0452014.id.opendns.com/s/malware.opendns.com/?X-OpenDNS-Session=aa51dc5c0ccc5aad4_d5137eff097560409b099260076e7fbb2ab5_3b098ba60edf6798891e1c6222e3a8f47d8f3fea_url=146.112.61.107&server=mia2&prefs=&tagging=&nref

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

1 Cookies

Domain/Path Name / Value
malware.opendns.com/ Name: X-OpenDNS-Session
Value: d5137eff097560409b099260076e7fbb2ab5_3b098ba60edf6798891e1c6222e3a8f47d8f3fea

1 Console Messages

Source Level URL
Text
network error URL: https://146.112.61.107/
Message:
Failed to load resource: the server responded with a status of 403 (Forbidden)