Submitted URL: http://godfuckingdamnitiguessitsforsale.com/
Effective URL: http://godfuckingdamnitiguessitsforsale.com/page/bouncy.php?&bpae=Gbiud60molx7j3N1PCspb4EZ22kJZ8MyMcU08F%2Bh%2FLVB0xxoAL9D2RewMS9bI9qXGJVVji...
Submission Tags: falconsandbox
Submission: On June 07 via api from US — Scanned from DE

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 3 HTTP transactions. The main IP is 50.28.56.190, located in United States and belongs to LIQUIDWEB, US. The main domain is godfuckingdamnitiguessitsforsale.com.
This is the only time godfuckingdamnitiguessitsforsale.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 50.28.56.190 32244 (LIQUIDWEB)
3 2
Domain Requested by
2 godfuckingdamnitiguessitsforsale.com godfuckingdamnitiguessitsforsale.com
0 notfound.php Failed godfuckingdamnitiguessitsforsale.com
3 2

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Frame: https://notfound.php/
Frame ID: 6B328C308B93C5AC39C791D0DC4E2A04
Requests: 3 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://godfuckingdamnitiguessitsforsale.com/ Page URL
  2. http://godfuckingdamnitiguessitsforsale.com/page/bouncy.php?&bpae=Gbiud60molx7j3N1PCspb4EZ22kJZ8MyMcU08F%2Bh%2FLVB0xxoAL... Page URL

Page Statistics

3
Requests

0 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

3 kB
Transfer

3 kB
Size

2
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://godfuckingdamnitiguessitsforsale.com/ Page URL
  2. http://godfuckingdamnitiguessitsforsale.com/page/bouncy.php?&bpae=Gbiud60molx7j3N1PCspb4EZ22kJZ8MyMcU08F%2Bh%2FLVB0xxoAL9D2RewMS9bI9qXGJVVjiEnUwjM6z6iBIJRXxFyQPoEWrMw8o0npqwVDqCl43m1QXEaMBCmbNIYZIBvCr10%2FNxjyO2bialg9HUjAu708w7HckOlUSSrOkkPQ5EaiE85jQb8wCLf2Kk2Dmkdp1pFzQPN%2FnCwYGNhBsOhtxhy4woN2oqFRgZvdZWtDhRZXIIYuNj3TkJjnr6X%2BOcKw89Gw44kv9fnHBu07axO6P9dpudsUzO2MF7nbPBugj8TQz8euSOiluWjqGQJevlLJzPX6kagE04GL6Kd0XLg9iu%2B09c8dVL6mwC8RhnRv8uwrSZGl3%2B%2BEFlhXbK2eQVMW9WiNU7ZFah124I1UeJFqf%2BPkR6o1rm7ULuEhBo%3D&redirectType=js&inIframe=false&inPopUp=false Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 1
  • https://simcast.com/?d=godfuckingdamnitiguessitsforsale.com&pcid=802&rid=152&a=1 HTTP 302
  • https://simcast.com/widgets/blockeddomains/rules.php?bklid=13144&tid=59&rid=1 HTTP 302
  • https://notfound.php/

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
godfuckingdamnitiguessitsforsale.com/
2 KB
2 KB
Document
General
Full URL
http://godfuckingdamnitiguessitsforsale.com/
Protocol
HTTP/1.1
Server
50.28.56.190 , United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
smoke.parklogic.com
Software
Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 / PHP/5.4.16
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.5005.61 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Date
Tue, 07 Jun 2022 01:57:02 GMT
Keep-Alive
timeout=5, max=100
Server
Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9
Transfer-Encoding
chunked
X-Powered-By
PHP/5.4.16
Primary Request bouncy.php
godfuckingdamnitiguessitsforsale.com/page/
766 B
1 KB
Document
General
Full URL
http://godfuckingdamnitiguessitsforsale.com/page/bouncy.php?&bpae=Gbiud60molx7j3N1PCspb4EZ22kJZ8MyMcU08F%2Bh%2FLVB0xxoAL9D2RewMS9bI9qXGJVVjiEnUwjM6z6iBIJRXxFyQPoEWrMw8o0npqwVDqCl43m1QXEaMBCmbNIYZIBvCr10%2FNxjyO2bialg9HUjAu708w7HckOlUSSrOkkPQ5EaiE85jQb8wCLf2Kk2Dmkdp1pFzQPN%2FnCwYGNhBsOhtxhy4woN2oqFRgZvdZWtDhRZXIIYuNj3TkJjnr6X%2BOcKw89Gw44kv9fnHBu07axO6P9dpudsUzO2MF7nbPBugj8TQz8euSOiluWjqGQJevlLJzPX6kagE04GL6Kd0XLg9iu%2B09c8dVL6mwC8RhnRv8uwrSZGl3%2B%2BEFlhXbK2eQVMW9WiNU7ZFah124I1UeJFqf%2BPkR6o1rm7ULuEhBo%3D&redirectType=js&inIframe=false&inPopUp=false
Requested by
Host: godfuckingdamnitiguessitsforsale.com
URL: http://godfuckingdamnitiguessitsforsale.com/
Protocol
HTTP/1.1
Server
50.28.56.190 , United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
smoke.parklogic.com
Software
Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 / PHP/5.4.16
Resource Hash

Request headers

Referer
http://godfuckingdamnitiguessitsforsale.com/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.5005.61 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Date
Tue, 07 Jun 2022 01:57:02 GMT
Keep-Alive
timeout=5, max=100
Server
Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9
Transfer-Encoding
chunked
X-Powered-By
PHP/5.4.16
/
notfound.php/
Redirect Chain
  • https://simcast.com/?d=godfuckingdamnitiguessitsforsale.com&pcid=802&rid=152&a=1
  • https://simcast.com/widgets/blockeddomains/rules.php?bklid=13144&tid=59&rid=1
  • https://notfound.php/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
notfound.php
URL
https://notfound.php/

Verdicts & Comments Add Verdict or Comment

6 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation

2 Cookies

Domain/Path Name / Value
simcast.com/ Name: PHPSESSID
Value: l7p1jge8rijvvsuheofdjinjtg
simcast.com/ Name: uidinfer
Value: 128755780

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

godfuckingdamnitiguessitsforsale.com
notfound.php
notfound.php
50.28.56.190