ransomware.in.th
Open in
urlscan Pro
122.8.157.33
Public Scan
Submission: On June 16 via api from US — Scanned from DE
Summary
TLS certificate: Issued by E6 on June 7th 2024. Valid for: 3 months.
This is the only time ransomware.in.th was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 122.8.157.33 122.8.157.33 | 136907 (HWCLOUDS-...) (HWCLOUDS-AS-AP HUAWEI CLOUDS) | |
1 | 2606:4700:303... 2606:4700:3036::6815:1b98 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2a00:1450:400... 2a00:1450:4001:829::200a | 15169 (GOOGLE) (GOOGLE) | |
1 2 | 104.17.3.184 104.17.3.184 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6812:bb1f | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 2 | 172.67.73.121 172.67.73.121 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2a00:1450:400... 2a00:1450:4001:811::2003 | 15169 (GOOGLE) (GOOGLE) | |
24 | 8 |
ASN136907 (HWCLOUDS-AS-AP HUAWEI CLOUDS, HK)
PTR: da33.dnsserverclub.com
ransomware.in.th |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
ransomware.in.th
ransomware.in.th |
5 MB |
2 |
gstatic.com
fonts.gstatic.com |
98 KB |
2 |
startbootstrap.com
1 redirects
cdn.startbootstrap.com — Cisco Umbrella Rank: 452485 |
4 KB |
2 |
cloudflare.com
1 redirects
challenges.cloudflare.com — Cisco Umbrella Rank: 4305 |
14 KB |
2 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 77 |
2 KB |
1 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 373 |
24 KB |
1 |
fontawesome.com
use.fontawesome.com — Cisco Umbrella Rank: 1380 |
494 KB |
24 | 7 |
Domain | Requested by | |
---|---|---|
6 | ransomware.in.th |
ransomware.in.th
|
2 | fonts.gstatic.com |
fonts.googleapis.com
|
2 | cdn.startbootstrap.com |
1 redirects
ransomware.in.th
|
2 | challenges.cloudflare.com |
1 redirects
ransomware.in.th
|
2 | fonts.googleapis.com |
ransomware.in.th
|
1 | cdn.jsdelivr.net |
ransomware.in.th
|
1 | use.fontawesome.com |
ransomware.in.th
|
24 | 7 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.servertoday.com |
www.facebook.com |
line.me |
Subject Issuer | Validity | Valid | |
---|---|---|---|
ransomware.in.th E6 |
2024-06-07 - 2024-09-05 |
3 months | crt.sh |
use.fontawesome.com Cloudflare Inc ECC CA-3 |
2023-10-12 - 2024-10-10 |
a year | crt.sh |
upload.video.google.com WR2 |
2024-05-27 - 2024-08-19 |
3 months | crt.sh |
*.jsdelivr.net Sectigo RSA Domain Validation Secure Server CA |
2024-05-04 - 2025-05-04 |
a year | crt.sh |
*.gstatic.com WR2 |
2024-05-27 - 2024-08-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ransomware.in.th/
Frame ID: 95D9227D9AFCF083A4A8371D1F6F6B05
Requests: 24 HTTP requests in this frame
Screenshot
Page Title
Ransomware ภัยคุกคามเงียบที่อาจทำลายธุรกิจของคุณDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
SweetAlert2 (JavaScript Libraries) Expand
Detected patterns
- sweetalert2(?:\.all)?(?:\.min)?\.js
jsDelivr (CDN) Expand
Detected patterns
- //cdn\.jsdelivr\.net/
Page Statistics
4 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 3- https://challenges.cloudflare.com/turnstile/v0/api.js?onload=onloadTurnstileCallback HTTP 302
- https://challenges.cloudflare.com/turnstile/v0/g/6aac8896f227/api.js
- https://cdn.startbootstrap.com/sb-forms-latest.js HTTP 302
- https://cdn.startbootstrap.com/sb-forms-0.4.1.js
24 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
ransomware.in.th/ |
28 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.js
use.fontawesome.com/releases/v6.3.0/js/ |
1 MB 494 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
1 KB 870 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styles.css
ransomware.in.th/css/ |
255 KB 31 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
api.js
challenges.cloudflare.com/turnstile/v0/g/6aac8896f227/ Redirect Chain
|
42 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sweetalert2.js
ransomware.in.th/js/ |
82 KB 21 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
servertoday-logo-white.svg
ransomware.in.th/assets/ |
23 KB 9 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lossdata.jpg
ransomware.in.th/assets/img/ |
5 MB 5 MB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
business1.jpg
ransomware.in.th/assets/img/ |
3 MB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
cost.jpg
ransomware.in.th/assets/img/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
company.jpg
ransomware.in.th/assets/img/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
black.jpg
ransomware.in.th/assets/img/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
target.jpg
ransomware.in.th/assets/img/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
640-2.png
ransomware.in.th/assets/img/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.bundle.min.js
cdn.jsdelivr.net/npm/bootstrap@5.2.3/dist/js/ |
79 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
scripts.js
ransomware.in.th/js/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sb-forms-0.4.1.js
cdn.startbootstrap.com/ Redirect Chain
|
7 KB 3 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
7 KB 877 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
bg-masthead1.jpg
ransomware.in.th/assets/img/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
bg-protect.png
ransomware.in.th/assets/img/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
bg-signup.jpg
ransomware.in.th/assets/img/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
iJWdBXeUZi_OHPqn4wq6hQ2_hZh5784.woff2
fonts.gstatic.com/s/notosansthai/v25/ |
54 KB 54 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
iJWdBXeUZi_OHPqn4wq6hQ2_hZht786tUQ.woff2
fonts.gstatic.com/s/notosansthai/v25/ |
44 KB 44 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
vdo.mp4
ransomware.in.th/assets/img/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- ransomware.in.th
- URL
- https://ransomware.in.th/assets/img/cost.jpg
- Domain
- ransomware.in.th
- URL
- https://ransomware.in.th/assets/img/company.jpg
- Domain
- ransomware.in.th
- URL
- https://ransomware.in.th/assets/img/black.jpg
- Domain
- ransomware.in.th
- URL
- https://ransomware.in.th/assets/img/target.jpg
- Domain
- ransomware.in.th
- URL
- https://ransomware.in.th/assets/img/640-2.png
- Domain
- ransomware.in.th
- URL
- https://ransomware.in.th/js/scripts.js
- Domain
- ransomware.in.th
- URL
- https://ransomware.in.th/assets/img/bg-masthead1.jpg
- Domain
- ransomware.in.th
- URL
- https://ransomware.in.th/assets/img/bg-protect.png
- Domain
- ransomware.in.th
- URL
- https://ransomware.in.th/assets/img/bg-signup.jpg
- Domain
- ransomware.in.th
- URL
- https://ransomware.in.th/assets/img/vdo.mp4
Verdicts & Comments Add Verdict or Comment
14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| event object| fence object| sharedStorage object| ___FONT_AWESOME___ object| FontAwesomeConfig object| FontAwesome function| Sweetalert2 function| SweetAlert function| Swal function| sweetAlert function| swal function| myfunction number| uidEvent object| bootstrap0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.jsdelivr.net
cdn.startbootstrap.com
challenges.cloudflare.com
fonts.googleapis.com
fonts.gstatic.com
ransomware.in.th
use.fontawesome.com
ransomware.in.th
104.17.3.184
122.8.157.33
172.67.73.121
2606:4700:3036::6815:1b98
2606:4700::6812:bb1f
2a00:1450:4001:811::2003
2a00:1450:4001:829::200a
0b19f154800fd7f537494902f315a8904e086bc3bc7c7fbc3cb6ed0a7c7fae76
14d96c8f3b341c11cc2a0eb682f59cf862bc9fb356af343bd8b4e622a94df7b7
22401f58443400f39ce653a1736059092e1e5f85ffbbbaeda4b11c16b5bade6e
423a89602d42055ed0545fd0fcd61487d3baa19355c14e77e502f19d0640bfe9
54dca1d241b3a50409ef9ff47410233790c3ebe1ef47509624161205a93bca74
59c961078cfedf024e31ed276b96245dab929c1490256f484eaaee5e3a60c987
5fed154c5c4a9e8eb1e2fa9a9242001d3d3cd6f5ede196fcc9fc47d23cff8e2c
76b191ff3e8ab4024ae82f087e5279ac879d9a980cae4d5e3068988275fa49f4
9520018fa5d81f4e4dc9d06afb576f90cbbaba209cfcc6cb60e1464647f7890b
b527ee2d28eaece10976110b637f45560ae0d0490e60ffffced2a5a43634230d
c16d8f6ce704d708bd5557aefa67988c368fd6dd0a6b8c320482de46e25792b7
d8b7b067cf5bef476c68c364b611eb743d46447bfe4dbe2c1b66428cd44ea086
fab2c8187c991c10de6cda9c90e44cc01fbfb9e26ecb646a15c600625863902b