cheatingxladies.com Open in urlscan Pro
104.27.128.198  Malicious Activity! Public Scan

Submitted URL: http://fboobs.us/
Effective URL: https://cheatingxladies.com/ykksjqqcl?t=server240
Submission: On September 19 via manual from DZ

Summary

This website contacted 6 IPs in 2 countries across 6 domains to perform 9 HTTP transactions. The main IP is 104.27.128.198, located in San Francisco, United States and belongs to CLOUDFLARENET - Cloudflare, Inc., US. The main domain is cheatingxladies.com.
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on August 3rd 2018. Valid for: 6 months.
This is the only time cheatingxladies.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Porn Scam (Online)

Domain & IP information

IP Address AS Autonomous System
2 91.234.35.247 56485 (THEHOST-AS)
1 1 195.28.183.126 15626 (ITLAS)
2 104.27.128.198 13335 (CLOUDFLAR...)
1 2400:cb00:204... 13335 (CLOUDFLAR...)
2 54.192.94.198 16509 (AMAZON-02)
1 205.185.208.52 20446 (HIGHWINDS3)
9 6
Domain Requested by
2 d3ikljl879wvvx.cloudfront.net cheatingxladies.com
2 cheatingxladies.com fboobs.us
cheatingxladies.com
2 fboobs.us fboobs.us
1 code.jquery.com cheatingxladies.com
1 cdnjs.cloudflare.com cheatingxladies.com
1 herodota.ru 1 redirects
9 6

This site contains no links.

Subject Issuer Validity Valid
sni227034.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-08-03 -
2019-02-09
6 months crt.sh
ssl412106.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-04-14 -
2018-10-21
6 months crt.sh
*.cloudfront.net
DigiCert Global CA G2
2017-11-22 -
2018-11-21
a year crt.sh
code.jquery.com
Let's Encrypt Authority X3
2018-08-29 -
2018-11-27
3 months crt.sh

This page contains 1 frames:

Primary Page: https://cheatingxladies.com/ykksjqqcl?t=server240
Frame ID: 9A2669215C7C5A9DC8AC89FDC10AA1A2
Requests: 9 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://fboobs.us/ Page URL
  2. http://herodota.ru/?server240&charset=windows-1251&keyword=[KEYWORD] HTTP 302
    https://cheatingxladies.com/ykksjqqcl?t=server240 Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

9
Requests

67 %
HTTPS

17 %
IPv6

6
Domains

6
Subdomains

6
IPs

2
Countries

952 kB
Transfer

1064 kB
Size

4
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://fboobs.us/ Page URL
  2. http://herodota.ru/?server240&charset=windows-1251&keyword=[KEYWORD] HTTP 302
    https://cheatingxladies.com/ykksjqqcl?t=server240 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

9 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
fboobs.us/
1 KB
943 B
Document
General
Full URL
http://fboobs.us/
Protocol
HTTP/1.1
Server
91.234.35.247 , Ukraine, ASN56485 (THEHOST-AS, UA),
Reverse DNS
voron.freedomain.thehost.com.ua
Software
nginx/1.2.1 / PHP/5.4.45-0+deb7u5
Resource Hash
3d89ac29dbb86cca5240ac8a8ca43cb179af18d4b7fdab373c50ed64270e1558

Request headers

Host
fboobs.us
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Défaut
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Défaut

Response headers

Server
nginx/1.2.1
Date
Wed, 19 Sep 2018 16:05:52 GMT
Content-Type
text/html; charset=UTF-8
Content-Length
699
Connection
keep-alive
X-Powered-By
PHP/5.4.45-0+deb7u5
Vary
Accept-Encoding
Content-Encoding
gzip
cs2.js
fboobs.us/
303 B
533 B
Script
General
Full URL
http://fboobs.us/cs2.js
Requested by
Host: fboobs.us
URL: http://fboobs.us/
Protocol
HTTP/1.1
Server
91.234.35.247 , Ukraine, ASN56485 (THEHOST-AS, UA),
Reverse DNS
voron.freedomain.thehost.com.ua
Software
nginx/1.2.1 /
Resource Hash

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
fboobs.us
User-Agent
Défaut
Accept
*/*
Referer
http://fboobs.us/
Connection
keep-alive
Cache-Control
no-cache
Referer
http://fboobs.us/
User-Agent
Défaut

Response headers

Date
Wed, 19 Sep 2018 16:05:52 GMT
Last-Modified
Mon, 23 Apr 2018 15:19:54 GMT
Server
nginx/1.2.1
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
303
Content-Type
application/x-javascript
Primary Request ykksjqqcl
cheatingxladies.com/
Redirect Chain
  • http://herodota.ru/?server240&charset=windows-1251&keyword=[KEYWORD]
  • https://cheatingxladies.com/ykksjqqcl?t=server240
16 KB
5 KB
Document
General
Full URL
https://cheatingxladies.com/ykksjqqcl?t=server240
Requested by
Host: fboobs.us
URL: http://fboobs.us/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.27.128.198 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
7d45a529a41093e305e4a74dac79b613710e951d48cd1d11c5f34ece476090ae
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
cheatingxladies.com
:scheme
https
:path
/ykksjqqcl?t=server240
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Défaut
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
http://fboobs.us/
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Défaut
Referer
http://fboobs.us/

Response headers

status
200
date
Wed, 19 Sep 2018 16:05:53 GMT
content-type
text/html; charset=utf-8
set-cookie
__cfduid=d55271c6ad32e1cc6e7fdfdeb3e4df1d61537373152; expires=Thu, 19-Sep-19 16:05:52 GMT; path=/; domain=.cheatingxladies.com; HttpOnly uord=44cfb640a2025257acb7ba1fc8b3aec5; path=/; expires=Fri, 18 Sep 2020 16:05:52 GMT; max-age=63072000; HttpOnly k=SFMyNTY.g3QAAAAIbQAAAARhdW5xbQAAABV7IjE1NTMiOiJNd3pnTE1RZE1LIn1tAAAAA2hpZG0AAAAcd3lVV1VMeEtVTVBWU01qdUtMRUJ5YVZsdnZQcm0AAAACcmR0AAAABGQACl9fc3RydWN0X19kABhFbGl4aXIuVGRleC5Sb3RhdGlvbkRhdGFkAA5jbGlja2VkX29mZmVyc3QAAAAAZAAIbGFuZGluZ3NsAAAAAWIAAAK5amQAC3NlZW5fb2ZmZXJzbAAAAAFiAAAcxGptAAAABXN1Yl8xZAADbmlsbQAAAAVzdWJfMmQAA25pbG0AAAAHdHJhY2tlcm0AAAAJc2VydmVyMjQwbQAAAAN1bnFtAAAAC1ZBaE1XT3JRT3NqbQAAABx3eVVXVUx4S1VNUFZTTWp1S0xFQnlhVmx2dlBydAAAAAFkAAVhZmZpZGIAAJKg.b4gYxKJ0hqLIpxUy31HgqMmBEwriX_9lituq6Gs4-1w; path=/; expires=Thu, 19 Sep 2019 16:05:52 GMT; max-age=31536000 _opl=wyUWULxKUMPVSMjuKLEByaVlvvPr:37536; path=/; HttpOnly
vary
Accept-Encoding
cache-control
max-age=0, private, must-revalidate
x-request-id
2lathf5uh9ichg0di4r0ptt3
x-xss-protection
1; mode=block
x-content-type-options
nosniff
x-download-options
noopen
x-permitted-cross-domain-policies
none
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
45cd4bdbfdbc96d6-FRA
content-encoding
gzip

Redirect headers

Server
nginx
Date
Wed, 19 Sep 2018 16:05:50 GMT
Content-Type
text/html; charset=utf-8
Content-Length
20
Connection
keep-alive
Keep-Alive
timeout=60
X-Powered-By
PHP/5.4.45-0+deb7u8
Expires
Thu, 21 Jul 1977 07:30:00 GMT
Cache-Control
max-age=0
Pragma
no-cache
Set-Cookie
7de65=%7B%22streams%22%3A%7B%22753%22%3A1537362352%7D%2C%22campaigns%22%3A%7B%2282%22%3A1537362352%7D%2C%22time%22%3A1537362352%7D; expires=Sat, 20-Oct-2018 16:05:50 GMT; path=/; domain=.herodota.ru
Last-Modified
Wed, 19 Sep 2018 16:05:50 GMT
Location
https://cheatingxladies.com/ykksjqqcl?t=server240
Vary
Accept-Encoding
Content-Encoding
gzip
animate.min.css
cdnjs.cloudflare.com/ajax/libs/animate.css/3.5.2/
52 KB
4 KB
Stylesheet
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/animate.css/3.5.2/animate.min.css
Requested by
Host: cheatingxladies.com
URL: https://cheatingxladies.com/ykksjqqcl?t=server240
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6813:c697 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8fe3fa119255adb5e0c12479331f9e092e85bcff56ab6ecc0510bfa2056b898d
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains

Request headers

Referer
https://cheatingxladies.com/ykksjqqcl?t=server240
User-Agent
Défaut

Response headers

date
Wed, 19 Sep 2018 16:05:53 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
status
200
served-in-seconds
0.001
last-modified
Thu, 17 May 2018 09:15:36 GMT
server
cloudflare
etag
W/"5afd4838-ce35"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15780000; includeSubDomains
content-type
text/css
access-control-allow-origin
*
cache-control
public, max-age=30672000
cf-ray
45cd4bdf4a276385-FRA
expires
Mon, 09 Sep 2019 16:05:53 GMT
123.png
d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/images/
790 KB
790 KB
Image
General
Full URL
https://d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/images/123.png
Requested by
Host: cheatingxladies.com
URL: https://cheatingxladies.com/ykksjqqcl?t=server240
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.198 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-198.fra2.r.cloudfront.net
Software
nginx /
Resource Hash
e08eb5bb46cf75aa30658f3506f3de8c274af04007e1fbf27f175d0db00cdfe1

Request headers

Referer
https://cheatingxladies.com/ykksjqqcl?t=server240
User-Agent
Défaut

Response headers

Date
Sat, 15 Sep 2018 15:26:52 GMT
Via
1.1 a7cfc7facd5206ba992dff0c0b5504da.cloudfront.net (CloudFront)
Last-Modified
Fri, 14 Sep 2018 08:56:13 GMT
Server
nginx
Age
2319
ETag
"5b9b77ad-c569f"
X-Cache
Hit from cloudfront
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
808607
X-Amz-Cf-Id
eYA6LFh_PxOUR4pjQ3duJstRpsyoG7FuFmBvj--pHGgJ-yM_j2oegw==
jquery-2.2.4.min.js
code.jquery.com/
84 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-2.2.4.min.js
Requested by
Host: cheatingxladies.com
URL: https://cheatingxladies.com/ykksjqqcl?t=server240
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.208.52 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
vip052.ssl.hwcdn.net
Software
nginx /
Resource Hash
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e

Request headers

User-Agent
Défaut
Referer
https://cheatingxladies.com/ykksjqqcl?t=server240
Origin
https://cheatingxladies.com

Response headers

Date
Wed, 19 Sep 2018 16:05:53 GMT
Content-Encoding
gzip
Last-Modified
Fri, 20 May 2016 17:24:41 GMT
Server
nginx
ETag
W/"573f4859-14e4a"
Vary
Accept-Encoding
X-HW
1537373153.dop002.fr8.t,1537373153.cds130.fr8.shn,1537373153.cds130.fr8.c
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
29811
prm.js
cheatingxladies.com/
0
147 B
Script
General
Full URL
https://cheatingxladies.com/prm.js?mh=d3lVV1VMeEtVTVBWU01qdUtMRUJ5YVZsdnZQci04MTM3&a=37536&lid=2899
Requested by
Host: cheatingxladies.com
URL: https://cheatingxladies.com/ykksjqqcl?t=server240
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.27.128.198 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:path
/prm.js?mh=d3lVV1VMeEtVTVBWU01qdUtMRUJ5YVZsdnZQci04MTM3&a=37536&lid=2899
pragma
no-cache
cookie
__cfduid=d55271c6ad32e1cc6e7fdfdeb3e4df1d61537373152; uord=44cfb640a2025257acb7ba1fc8b3aec5; k=SFMyNTY.g3QAAAAIbQAAAARhdW5xbQAAABV7IjE1NTMiOiJNd3pnTE1RZE1LIn1tAAAAA2hpZG0AAAAcd3lVV1VMeEtVTVBWU01qdUtMRUJ5YVZsdnZQcm0AAAACcmR0AAAABGQACl9fc3RydWN0X19kABhFbGl4aXIuVGRleC5Sb3RhdGlvbkRhdGFkAA5jbGlja2VkX29mZmVyc3QAAAAAZAAIbGFuZGluZ3NsAAAAAWIAAAK5amQAC3NlZW5fb2ZmZXJzbAAAAAFiAAAcxGptAAAABXN1Yl8xZAADbmlsbQAAAAVzdWJfMmQAA25pbG0AAAAHdHJhY2tlcm0AAAAJc2VydmVyMjQwbQAAAAN1bnFtAAAAC1ZBaE1XT3JRT3NqbQAAABx3eVVXVUx4S1VNUFZTTWp1S0xFQnlhVmx2dlBydAAAAAFkAAVhZmZpZGIAAJKg.b4gYxKJ0hqLIpxUy31HgqMmBEwriX_9lituq6Gs4-1w; _opl=wyUWULxKUMPVSMjuKLEByaVlvvPr:37536
accept-encoding
gzip, deflate
user-agent
Défaut
accept
*/*
cache-control
no-cache
:authority
cheatingxladies.com
referer
https://cheatingxladies.com/ykksjqqcl?t=server240
:scheme
https
:method
GET
Referer
https://cheatingxladies.com/ykksjqqcl?t=server240
User-Agent
Défaut

Response headers

date
Wed, 19 Sep 2018 16:05:53 GMT
x-content-type-options
nosniff
cf-cache-status
MISS
x-permitted-cross-domain-policies
none
status
200
vary
Accept-Encoding
content-length
0
x-xss-protection
1; mode=block
x-request-id
2lathf68bqckn07970b71rl4
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-download-options
noopen
content-type
application/javascript; charset=utf-8
cache-control
public, max-age=14400
cf-ray
45cd4bdeeff496d6-FRA
expires
Wed, 19 Sep 2018 20:05:53 GMT
bg.jpg
d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/images/
121 KB
122 KB
Image
General
Full URL
https://d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/images/bg.jpg
Requested by
Host: cheatingxladies.com
URL: https://cheatingxladies.com/ykksjqqcl?t=server240
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.94.198 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-192-94-198.fra2.r.cloudfront.net
Software
nginx /
Resource Hash
a686d49f3fa9c90d45340f0e26975d8299f165f7091bf88a0597e05db49ed4cc

Request headers

Referer
https://cheatingxladies.com/ykksjqqcl?t=server240
User-Agent
Défaut

Response headers

Date
Fri, 14 Sep 2018 19:11:20 GMT
Via
1.1 d2625240b33e8b85b3cbea9bb40abb10.cloudfront.net (CloudFront)
Last-Modified
Fri, 14 Sep 2018 08:56:13 GMT
Server
nginx
Age
75184
ETag
"5b9b77ad-1e58c"
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
124300
X-Amz-Cf-Id
GVRk6aRV12NoAWX61WMBLOcQaPafJ2Sc14dXoaIKyfaIjFrW6tNTYA==
Lato-Regular.ttf
d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/fonts/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
d3ikljl879wvvx.cloudfront.net
URL
https://d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/fonts/Lato-Regular.ttf

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Porn Scam (Online)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| $ function| jQuery string| u

4 Cookies

Domain/Path Name / Value
cheatingxladies.com/ Name: _opl
Value: wyUWULxKUMPVSMjuKLEByaVlvvPr:37536
cheatingxladies.com/ Name: uord
Value: 44cfb640a2025257acb7ba1fc8b3aec5
cheatingxladies.com/ Name: k
Value: SFMyNTY.g3QAAAAIbQAAAARhdW5xbQAAABV7IjE1NTMiOiJNd3pnTE1RZE1LIn1tAAAAA2hpZG0AAAAcd3lVV1VMeEtVTVBWU01qdUtMRUJ5YVZsdnZQcm0AAAACcmR0AAAABGQACl9fc3RydWN0X19kABhFbGl4aXIuVGRleC5Sb3RhdGlvbkRhdGFkAA5jbGlja2VkX29mZmVyc3QAAAAAZAAIbGFuZGluZ3NsAAAAAWIAAAK5amQAC3NlZW5fb2ZmZXJzbAAAAAFiAAAcxGptAAAABXN1Yl8xZAADbmlsbQAAAAVzdWJfMmQAA25pbG0AAAAHdHJhY2tlcm0AAAAJc2VydmVyMjQwbQAAAAN1bnFtAAAAC1ZBaE1XT3JRT3NqbQAAABx3eVVXVUx4S1VNUFZTTWp1S0xFQnlhVmx2dlBydAAAAAFkAAVhZmZpZGIAAJKg.b4gYxKJ0hqLIpxUy31HgqMmBEwriX_9lituq6Gs4-1w
.cheatingxladies.com/ Name: __cfduid
Value: d55271c6ad32e1cc6e7fdfdeb3e4df1d61537373152