![](/screenshots/1f333f84-a699-4960-9f68-6cf02ce69068.png)
covid.frst.pw
Open in
urlscan Pro
2606:4700:3032::681b:b8ab
Public Scan
Submission: On May 16 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on December 23rd 2019. Valid for: 10 months.
This is the only time covid.frst.pw was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 2606:4700:303... 2606:4700:3032::681b:b8ab | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:1a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2606:4700::68... 2606:4700::6810:5714 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 8 | 2a02:6b8::1:119 2a02:6b8::1:119 | 13238 (YANDEX) (YANDEX) | |
15 | 4 |
ASN20446 (HIGHWINDS3, US)
stackpath.bootstrapcdn.com | |
code.jquery.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
yandex.ru
2 redirects
mc.yandex.ru |
98 KB |
5 |
frst.pw
covid.frst.pw |
356 KB |
2 |
bootstrapcdn.com
stackpath.bootstrapcdn.com |
39 KB |
1 |
jsdelivr.net
cdn.jsdelivr.net |
8 KB |
1 |
jquery.com
code.jquery.com |
24 KB |
15 | 5 |
Domain | Requested by | |
---|---|---|
8 | mc.yandex.ru |
2 redirects
covid.frst.pw
mc.yandex.ru |
5 | covid.frst.pw |
covid.frst.pw
|
2 | stackpath.bootstrapcdn.com |
covid.frst.pw
|
1 | cdn.jsdelivr.net |
covid.frst.pw
|
1 | code.jquery.com |
covid.frst.pw
|
15 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-12-23 - 2020-10-09 |
10 months | crt.sh |
*.bootstrapcdn.com Sectigo RSA Domain Validation Secure Server CA |
2019-09-14 - 2020-10-13 |
a year | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
mc.yandex.ru Yandex CA |
2019-09-23 - 2020-09-22 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://covid.frst.pw/
Frame ID: 101F09B93B3D4F3308B9D3AF36607690
Requests: 15 HTTP requests in this frame
Screenshot
![](/screenshots/1f333f84-a699-4960-9f68-6cf02ce69068.png)
Detected technologies
![](/vendor/wappa/icons/Bootstrap.png)
Detected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
Detected patterns
- headers server /^cloudflare$/i
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 9- https://mc.yandex.ru/watch/61061704?wmode=7&page-url=https%3A%2F%2Fcovid.frst.pw%2F&charset=utf-8&browser-info=ti%3A10%3Ans%3A1589626501533%3As%3A1600x1200x24%3Ask%3A1%3Ahdl%3A1%3Afpr%3A216613626101%3Acn%3A1%3Aw%3A1600x1200%3Az%3A120%3Ai%3A20200516125503%3Aet%3A1589626504%3Aen%3Autf-8%3Ac%3A1%3Ala%3Aen-us%3Apv%3A1%3Als%3A1356083924353%3Arqn%3A1%3Arn%3A1008432585%3Ahid%3A690351573%3Ads%3A17%2C22%2C46%2C1%2C0%2C0%2C0%2C1582%2C1%2C%2C%2C%2C1670%3Afp%3A1673%3Awn%3A54199%3Ahl%3A2%3Agdpr%3A14%3Av%3A1853%3Awv%3A2%3Arqnl%3A1%3Ast%3A1589626504%3Au%3A1589626504461909212%3At%3A%D0%AD%D0%BA%D1%81%D0%BF%D1%80%D0%B5%D1%81%D1%81-%D1%82%D0%B5%D1%81%D1%82%20%D0%BD%D0%B0%20%D0%BA%D0%BE%D1%80%D0%BE%D0%BD%D0%B0%D0%B2%D0%B8%D1%80%D1%83%D1%81%20(COVID-19) HTTP 302
- https://mc.yandex.ru/watch/61061704/1?wmode=7&page-url=https%3A%2F%2Fcovid.frst.pw%2F&charset=utf-8&browser-info=ti%3A10%3Ans%3A1589626501533%3As%3A1600x1200x24%3Ask%3A1%3Ahdl%3A1%3Afpr%3A216613626101%3Acn%3A1%3Aw%3A1600x1200%3Az%3A120%3Ai%3A20200516125503%3Aet%3A1589626504%3Aen%3Autf-8%3Ac%3A1%3Ala%3Aen-us%3Apv%3A1%3Als%3A1356083924353%3Arqn%3A1%3Arn%3A1008432585%3Ahid%3A690351573%3Ads%3A17%2C22%2C46%2C1%2C0%2C0%2C0%2C1582%2C1%2C%2C%2C%2C1670%3Afp%3A1673%3Awn%3A54199%3Ahl%3A2%3Agdpr%3A14%3Av%3A1853%3Awv%3A2%3Arqnl%3A1%3Ast%3A1589626504%3Au%3A1589626504461909212%3At%3A%D0%AD%D0%BA%D1%81%D0%BF%D1%80%D0%B5%D1%81%D1%81-%D1%82%D0%B5%D1%81%D1%82%20%D0%BD%D0%B0%20%D0%BA%D0%BE%D1%80%D0%BE%D0%BD%D0%B0%D0%B2%D0%B8%D1%80%D1%83%D1%81%20%28COVID-19%29
- https://mc.yandex.ru/watch/61061704?page-url=https%3A%2F%2Fcovid.frst.pw%2F&charset=utf-8&force-urlencoded=1&browser-info=ti%3A1%3Adp%3A1%3Ans%3A1589626501533%3As%3A1600x1200x24%3Ask%3A1%3Ahdl%3A1%3Aadb%3A2%3Afpr%3A216613626101%3Acn%3A1%3Aw%3A1600x1200%3Az%3A120%3Ai%3A20200516125518%3Aet%3A1589626519%3Aen%3Autf-8%3Ac%3A1%3Ala%3Aen-us%3Aar%3A1%3Anb%3A1%3Acl%3A138%3Als%3A1356083924353%3Arqn%3A2%3Arn%3A304945617%3Ahid%3A690351573%3Ads%3A%2C%2C%2C%2C%2C%2C%2C%2C%2C2021%2C2021%2C1%2C%3Agdpr%3A14%3Aeu%3A1%3Av%3A1853%3Awv%3A2%3Arqnl%3A1%3Ast%3A1589626519%3Au%3A1589626504461909212 HTTP 302
- https://mc.yandex.ru/watch/61061704/1?page-url=https%3A%2F%2Fcovid.frst.pw%2F&charset=utf-8&force-urlencoded=1&browser-info=ti%3A1%3Adp%3A1%3Ans%3A1589626501533%3As%3A1600x1200x24%3Ask%3A1%3Ahdl%3A1%3Aadb%3A2%3Afpr%3A216613626101%3Acn%3A1%3Aw%3A1600x1200%3Az%3A120%3Ai%3A20200516125518%3Aet%3A1589626519%3Aen%3Autf-8%3Ac%3A1%3Ala%3Aen-us%3Aar%3A1%3Anb%3A1%3Acl%3A138%3Als%3A1356083924353%3Arqn%3A2%3Arn%3A304945617%3Ahid%3A690351573%3Ads%3A%2C%2C%2C%2C%2C%2C%2C%2C%2C2021%2C2021%2C1%2C%3Agdpr%3A14%3Aeu%3A1%3Av%3A1853%3Awv%3A2%3Arqnl%3A1%3Ast%3A1589626519%3Au%3A1589626504461909212
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
covid.frst.pw/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.4.1/css/ |
156 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
covid.frst.pw/css/ |
585 B 372 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
covid19.jpg
covid.frst.pw/img/ |
347 KB 348 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
yes.svg
covid.frst.pw/img/ |
7 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
no.svg
covid.frst.pw/img/ |
6 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.4.1.slim.min.js
code.jquery.com/ |
69 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdn.jsdelivr.net/npm/popper.js@1.16.0/dist/umd/ |
21 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.4.1/js/ |
59 KB 16 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tag.js
mc.yandex.ru/metrika/ |
363 KB 92 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1
mc.yandex.ru/watch/61061704/ Redirect Chain
|
171 B 720 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
advert.gif
mc.yandex.ru/metrika/ |
43 B 425 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
61061704
mc.yandex.ru/webvisor/ |
43 B 536 B |
XHR
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
61061704
mc.yandex.ru/webvisor/ |
43 B 536 B |
XHR
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1
mc.yandex.ru/watch/61061704/ Redirect Chain
|
43 B 444 B |
Other
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery function| Popper object| bootstrap function| ym object| Ya object| yaCounter610617043 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.frst.pw/ | Name: _ym_d Value: 1589626504 |
|
.frst.pw/ | Name: _ym_uid Value: 1589626504461909212 |
|
.frst.pw/ | Name: __cfduid Value: d4d698c372822eea77d4c20f36d6a50b11589626501 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.jsdelivr.net
code.jquery.com
covid.frst.pw
mc.yandex.ru
stackpath.bootstrapcdn.com
2001:4de0:ac19::1:b:1a
2606:4700:3032::681b:b8ab
2606:4700::6810:5714
2a02:6b8::1:119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