dev.shop.secure.gideonhack.pw
Open in
urlscan Pro
185.11.145.249
Public Scan
Effective URL: https://dev.shop.secure.gideonhack.pw/
Submission Tags: phishing spamreports malicious Search All
Submission: On January 25 via api from BG
Summary
TLS certificate: Issued by R3 on December 11th 2020. Valid for: 3 months.
This is the only time dev.shop.secure.gideonhack.pw was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 6 | 185.11.145.249 185.11.145.249 | 47674 (NETSOLUTIONS) (NETSOLUTIONS) | |
5 | 2 |
ASN47674 (NETSOLUTIONS, NL)
PTR: hosted-by.blazingfast.io
dev.shop.secure.gideonhack.pw |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
gideonhack.pw
2 redirects
dev.shop.secure.gideonhack.pw |
247 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
6 | dev.shop.secure.gideonhack.pw |
2 redirects
dev.shop.secure.gideonhack.pw
|
5 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dev.shop.secure.gideonhack.pw R3 |
2020-12-11 - 2021-03-11 |
3 months | crt.sh |
This page contains 1 frames:
Frame:
https://dev.shop.secure.gideonhack.pw/
Frame ID: 0C8D6B0C9E7A297E9ECB956DA1E61F91
Requests: 7 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://dev.shop.secure.gideonhack.pw/
HTTP 301
https://dev.shop.secure.gideonhack.pw/ Page URL
-
https://dev.shop.secure.gideonhack.pw/blzgfst-shark/?bfu=%2F&blazing_answer=289983537
HTTP 302
https://dev.shop.secure.gideonhack.pw/ Page URL
Detected technologies
Lua (Programming Languages) ExpandDetected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
OpenResty (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://dev.shop.secure.gideonhack.pw/
HTTP 301
https://dev.shop.secure.gideonhack.pw/ Page URL
-
https://dev.shop.secure.gideonhack.pw/blzgfst-shark/?bfu=%2F&blazing_answer=289983537
HTTP 302
https://dev.shop.secure.gideonhack.pw/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://dev.shop.secure.gideonhack.pw/ HTTP 301
- https://dev.shop.secure.gideonhack.pw/
- https://dev.shop.secure.gideonhack.pw/blzgfst-shark/?bfu=%2F&blazing_answer=418156680 HTTP 302
- https://dev.shop.secure.gideonhack.pw/
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
dev.shop.secure.gideonhack.pw/ Redirect Chain
|
116 KB 85 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bf.jquery.max.js
dev.shop.secure.gideonhack.pw/ |
94 KB 38 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
85 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
dev.shop.secure.gideonhack.pw/ Redirect Chain
|
116 KB 85 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bf.jquery.max.js
dev.shop.secure.gideonhack.pw/ |
94 KB 38 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
85 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
/
dev.shop.secure.gideonhack.pw/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- dev.shop.secure.gideonhack.pw
- URL
- https://dev.shop.secure.gideonhack.pw/
Verdicts & Comments Add Verdict or Comment
11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.gideonhack.pw/ | Name: BlazingWebCookie Value: 5ZRyONoDuXJK0sjDC8TOf8FZfp30DcDeJG1p60IYqWCiWPD0Wu38wGO3d19uGH2i |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
dev.shop.secure.gideonhack.pw
dev.shop.secure.gideonhack.pw
185.11.145.249
0fee152086352d9d2425b6a13e3810a6549ea844b4badfa809216dccd3b7a81d
186e3011917eb056c06039bf95c0126ca8b81baf715da619e2e1f9e0245d6479
1e02b0d23b51157c1481f2b947c4e659e2ee4ec37aec3e96c818857b2a238769
2ecd295d295bec062cedebe177e54b9d6b19fc0a841dc5c178c654c9ccff09c0