cheatingxladies.com Open in urlscan Pro
104.27.129.198  Malicious Activity! Public Scan

Submitted URL: http://www.fkik.us/
Effective URL: https://cheatingxladies.com/ykksjqqcl?t=new_server2
Submission: On July 27 via manual from GE

Summary

This website contacted 7 IPs in 2 countries across 6 domains to perform 9 HTTP transactions. The main IP is 104.27.129.198, located in San Francisco, United States and belongs to CLOUDFLARENET - Cloudflare, Inc., US. The main domain is cheatingxladies.com.
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on July 25th 2018. Valid for: 6 months.
This is the only time cheatingxladies.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Porn Scam (Online)

Domain & IP information

IP Address AS Autonomous System
2 91.234.35.247 56485 (THEHOST-AS)
1 1 195.28.183.126 15626 (ITLAS)
2 104.27.129.198 13335 (CLOUDFLAR...)
1 2400:cb00:204... 13335 (CLOUDFLAR...)
1 52.85.177.250 16509 (AMAZON-02)
1 205.185.208.52 20446 (HIGHWINDS3)
1 52.85.177.188 16509 (AMAZON-02)
9 7
Domain Requested by
2 d3ikljl879wvvx.cloudfront.net cheatingxladies.com
2 cheatingxladies.com www.fkik.us
cheatingxladies.com
2 www.fkik.us www.fkik.us
1 code.jquery.com cheatingxladies.com
1 cdnjs.cloudflare.com cheatingxladies.com
1 herodota.ru 1 redirects
9 6

This site contains no links.

Subject Issuer Validity Valid
sni227034.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-07-25 -
2019-01-31
6 months crt.sh

This page contains 1 frames:

Primary Page: https://cheatingxladies.com/ykksjqqcl?t=new_server2
Frame ID: D027D62093D037B5A68E81A657F4D08C
Requests: 9 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://www.fkik.us/ Page URL
  2. http://herodota.ru/?sliv2&charset=windows-1251&keyword=[KEYWORD] HTTP 302
    https://cheatingxladies.com/ykksjqqcl?t=new_server2 Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

9
Requests

22 %
HTTPS

14 %
IPv6

6
Domains

6
Subdomains

7
IPs

2
Countries

957 kB
Transfer

1063 kB
Size

4
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://www.fkik.us/ Page URL
  2. http://herodota.ru/?sliv2&charset=windows-1251&keyword=[KEYWORD] HTTP 302
    https://cheatingxladies.com/ykksjqqcl?t=new_server2 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

9 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
www.fkik.us/
679 B
715 B
Document
General
Full URL
http://www.fkik.us/
Protocol
HTTP/1.1
Server
91.234.35.247 , Ukraine, ASN56485 (THEHOST-AS, UA),
Reverse DNS
voron.freedomain.thehost.com.ua
Software
nginx/1.2.1 / PHP/5.4.45-0+deb7u5
Resource Hash
c676c9d10373826837bbe7edab0ff7155a801137425f254981b36a78a0bb1bc1

Request headers

Host
www.fkik.us
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
D027D62093D037B5A68E81A657F4D08C

Response headers

Server
nginx/1.2.1
Date
Fri, 27 Jul 2018 14:49:27 GMT
Content-Type
text/html; charset=UTF-8
Content-Length
471
Connection
keep-alive
X-Powered-By
PHP/5.4.45-0+deb7u5
Vary
Accept-Encoding
Content-Encoding
gzip
cs2.js
www.fkik.us/
299 B
529 B
Script
General
Full URL
http://www.fkik.us/cs2.js
Requested by
Host: www.fkik.us
URL: http://www.fkik.us/
Protocol
HTTP/1.1
Server
91.234.35.247 , Ukraine, ASN56485 (THEHOST-AS, UA),
Reverse DNS
voron.freedomain.thehost.com.ua
Software
nginx/1.2.1 /
Resource Hash

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
www.fkik.us
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
*/*
Referer
http://www.fkik.us/
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.fkik.us/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 27 Jul 2018 14:49:27 GMT
Last-Modified
Wed, 11 Apr 2018 17:32:38 GMT
Server
nginx/1.2.1
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
299
Content-Type
application/x-javascript
Primary Request ykksjqqcl
cheatingxladies.com/
Redirect Chain
  • http://herodota.ru/?sliv2&charset=windows-1251&keyword=[KEYWORD]
  • https://cheatingxladies.com/ykksjqqcl?t=new_server2
16 KB
5 KB
Document
General
Full URL
https://cheatingxladies.com/ykksjqqcl?t=new_server2
Requested by
Host: www.fkik.us
URL: http://www.fkik.us/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.27.129.198 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2382899b96baa9dc2313e4bb37fb70075e1412674cec37c7d2b474b8f8c4c728
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
cheatingxladies.com
:scheme
https
:path
/ykksjqqcl?t=new_server2
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
http://www.fkik.us/
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
D027D62093D037B5A68E81A657F4D08C
Referer
http://www.fkik.us/

Response headers

status
200
date
Fri, 27 Jul 2018 14:49:28 GMT
content-type
text/html; charset=utf-8
set-cookie
__cfduid=dd61551064f24245d9516bf324069b5e91532702967; expires=Sat, 27-Jul-19 14:49:27 GMT; path=/; domain=.cheatingxladies.com; HttpOnly uord=edcae74b155c514caa8e4fe32289b480; path=/; expires=Sun, 26 Jul 2020 14:49:28 GMT; max-age=63072000; HttpOnly k=SFMyNTY.g3QAAAAIbQAAABxLTVVwVWJQeklWT0VId0V0QmpNdnZ2bXdLT3lFdAAAAAFkAAVhZmZpZGIAAJKgbQAAAARhdW5xbQAAABV7IjE1NTMiOiJqUkV2bEdrcXl3In1tAAAAA2hpZG0AAAAcS01VcFViUHpJVk9FSHdFdEJqTXZ2dm13S095RW0AAAACcmR0AAAABGQACl9fc3RydWN0X19kABhFbGl4aXIuVGRleC5Sb3RhdGlvbkRhdGFkAA5jbGlja2VkX29mZmVyc3QAAAAAZAAIbGFuZGluZ3NsAAAAAWIAAAK5amQAC3NlZW5fb2ZmZXJzbAAAAAFiAAAcxGptAAAABXN1Yl8xZAADbmlsbQAAAAVzdWJfMmQAA25pbG0AAAAHdHJhY2tlcm0AAAALbmV3X3NlcnZlcjJtAAAAA3VucW0AAAALa0JoTGFqa1pWaUc.WlOEPvpSIsbXjjmqop1lfitNfzfFQOvOrYJpou90POc; path=/; expires=Sat, 27 Jul 2019 14:49:28 GMT; max-age=31536000 _opl=KMUpUbPzIVOEHwEtBjMvvvmwKOyE:37536; path=/; HttpOnly
vary
Accept-Encoding
cache-control
max-age=0, private, must-revalidate
x-request-id
38ibbe7298357a5kvomee67afel13nl2
x-xss-protection
1; mode=block
x-content-type-options
nosniff
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
440fe9acbb51231e-FRA
content-encoding
gzip

Redirect headers

Server
nginx
Date
Fri, 27 Jul 2018 14:49:27 GMT
Content-Type
text/html; charset=utf-8
Content-Length
20
Connection
keep-alive
Keep-Alive
timeout=60
X-Powered-By
PHP/5.4.45-0+deb7u8
Expires
Thu, 21 Jul 1977 07:30:00 GMT
Cache-Control
max-age=0
Pragma
no-cache
Set-Cookie
7de65=%7B%22streams%22%3A%7B%22751%22%3A1532692169%7D%2C%22campaigns%22%3A%7B%2280%22%3A1532692169%7D%2C%22time%22%3A1532692169%7D; expires=Mon, 27-Aug-2018 14:49:27 GMT; path=/; domain=.herodota.ru
Last-Modified
Fri, 27 Jul 2018 14:49:27 GMT
Location
https://cheatingxladies.com/ykksjqqcl?t=new_server2
Vary
Accept-Encoding
Content-Encoding
gzip
animate.min.css
cdnjs.cloudflare.com/ajax/libs/animate.css/3.5.2/
52 KB
4 KB
Stylesheet
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/animate.css/3.5.2/animate.min.css
Requested by
Host: cheatingxladies.com
URL: https://cheatingxladies.com/ykksjqqcl?t=new_server2
Protocol
SPDY
Server
2400:cb00:2048:1::6813:c797 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8fe3fa119255adb5e0c12479331f9e092e85bcff56ab6ecc0510bfa2056b898d
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains

Request headers

Referer
https://cheatingxladies.com/ykksjqqcl?t=new_server2
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 27 Jul 2018 14:49:28 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
status
200
served-in-seconds
0.002
last-modified
Thu, 17 May 2018 09:15:38 GMT
server
cloudflare
etag
W/"5afd483a-ce35"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15780000; includeSubDomains
content-type
text/css
access-control-allow-origin
*
cache-control
public, max-age=30672000
cf-ray
440fe9af58cd63af-FRA
expires
Wed, 17 Jul 2019 14:49:28 GMT
123.png
d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/images/
790 KB
790 KB
Image
General
Full URL
https://d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/images/123.png
Requested by
Host: cheatingxladies.com
URL: https://cheatingxladies.com/ykksjqqcl?t=new_server2
Protocol
HTTP/1.1
Server
52.85.177.250 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-177-250.fra6.r.cloudfront.net
Software
nginx /
Resource Hash
e08eb5bb46cf75aa30658f3506f3de8c274af04007e1fbf27f175d0db00cdfe1

Request headers

Referer
https://cheatingxladies.com/ykksjqqcl?t=new_server2
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 26 Jul 2018 15:08:04 GMT
Via
1.1 f17892129c0657c8d9d0809a1b0b00be.cloudfront.net (CloudFront)
Last-Modified
Wed, 25 Jul 2018 14:55:35 GMT
Server
nginx
Age
85284
ETag
"5b588f67-c569f"
X-Cache
Hit from cloudfront
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
808607
X-Amz-Cf-Id
LmXlTi8290jB0GWohTc5eXzIA1Kek6hyqBYJZS0x0N5q3XyTVe1i6A==
jquery-2.2.4.min.js
code.jquery.com/
84 KB
34 KB
Script
General
Full URL
https://code.jquery.com/jquery-2.2.4.min.js
Requested by
Host: cheatingxladies.com
URL: https://cheatingxladies.com/ykksjqqcl?t=new_server2
Protocol
HTTP/1.1
Server
205.185.208.52 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
vip052.ssl.hwcdn.net
Software
nginx /
Resource Hash
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cheatingxladies.com/ykksjqqcl?t=new_server2
Origin
https://cheatingxladies.com

Response headers

Date
Fri, 27 Jul 2018 14:49:28 GMT
Content-Encoding
gzip
Last-Modified
Fri, 20 May 2016 17:24:41 GMT
Server
nginx
ETag
W/"573f4859-14e4a"
Vary
Accept-Encoding
X-HW
1532702968.dop001.fr8.shc,1532702968.dop001.fr8.t,1532702968.cds010.fr8.c
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
34834
prm.js
cheatingxladies.com/
0
150 B
Script
General
Full URL
https://cheatingxladies.com/prm.js?mh=S01VcFViUHpJVk9FSHdFdEJqTXZ2dm13S095RS04MTM3&a=37536
Requested by
Host: cheatingxladies.com
URL: https://cheatingxladies.com/ykksjqqcl?t=new_server2
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.27.129.198 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:path
/prm.js?mh=S01VcFViUHpJVk9FSHdFdEJqTXZ2dm13S095RS04MTM3&a=37536
pragma
no-cache
cookie
__cfduid=dd61551064f24245d9516bf324069b5e91532702967; uord=edcae74b155c514caa8e4fe32289b480; k=SFMyNTY.g3QAAAAIbQAAABxLTVVwVWJQeklWT0VId0V0QmpNdnZ2bXdLT3lFdAAAAAFkAAVhZmZpZGIAAJKgbQAAAARhdW5xbQAAABV7IjE1NTMiOiJqUkV2bEdrcXl3In1tAAAAA2hpZG0AAAAcS01VcFViUHpJVk9FSHdFdEJqTXZ2dm13S095RW0AAAACcmR0AAAABGQACl9fc3RydWN0X19kABhFbGl4aXIuVGRleC5Sb3RhdGlvbkRhdGFkAA5jbGlja2VkX29mZmVyc3QAAAAAZAAIbGFuZGluZ3NsAAAAAWIAAAK5amQAC3NlZW5fb2ZmZXJzbAAAAAFiAAAcxGptAAAABXN1Yl8xZAADbmlsbQAAAAVzdWJfMmQAA25pbG0AAAAHdHJhY2tlcm0AAAALbmV3X3NlcnZlcjJtAAAAA3VucW0AAAALa0JoTGFqa1pWaUc.WlOEPvpSIsbXjjmqop1lfitNfzfFQOvOrYJpou90POc; _opl=KMUpUbPzIVOEHwEtBjMvvvmwKOyE:37536
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
cheatingxladies.com
referer
https://cheatingxladies.com/ykksjqqcl?t=new_server2
:scheme
https
:method
GET
Referer
https://cheatingxladies.com/ykksjqqcl?t=new_server2
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 27 Jul 2018 14:49:28 GMT
x-content-type-options
nosniff
cf-cache-status
MISS
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
status
200
cache-control
public, max-age=14400
cf-ray
440fe9af6d62231e-FRA
content-length
0
x-xss-protection
1; mode=block
x-request-id
ene8uarq42la7st5noe2k4o320i91c42
expires
Fri, 27 Jul 2018 18:49:28 GMT
bg.jpg
d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/images/
121 KB
122 KB
Image
General
Full URL
https://d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/images/bg.jpg
Requested by
Host: cheatingxladies.com
URL: https://cheatingxladies.com/ykksjqqcl?t=new_server2
Protocol
HTTP/1.1
Server
52.85.177.188 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-177-188.fra6.r.cloudfront.net
Software
nginx /
Resource Hash
a686d49f3fa9c90d45340f0e26975d8299f165f7091bf88a0597e05db49ed4cc

Request headers

Referer
https://cheatingxladies.com/ykksjqqcl?t=new_server2
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 25 Jul 2018 18:55:54 GMT
Via
1.1 f735992a47971208bce91329a45dbeca.cloudfront.net (CloudFront)
Last-Modified
Wed, 25 Jul 2018 14:55:35 GMT
Server
nginx
Age
71609
ETag
"5b588f67-1e58c"
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
124300
X-Amz-Cf-Id
oxAyY8y35C5Bx-_qZhItNxPwVCcOlsO02h1pMHrWaKfJiW5-fg-BYg==
Lato-Regular.ttf
d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/fonts/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
d3ikljl879wvvx.cloudfront.net
URL
https://d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/fonts/Lato-Regular.ttf

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Porn Scam (Online)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| $ function| jQuery string| u

4 Cookies

Domain/Path Name / Value
cheatingxladies.com/ Name: _opl
Value: KMUpUbPzIVOEHwEtBjMvvvmwKOyE:37536
cheatingxladies.com/ Name: uord
Value: edcae74b155c514caa8e4fe32289b480
cheatingxladies.com/ Name: k
Value: SFMyNTY.g3QAAAAIbQAAABxLTVVwVWJQeklWT0VId0V0QmpNdnZ2bXdLT3lFdAAAAAFkAAVhZmZpZGIAAJKgbQAAAARhdW5xbQAAABV7IjE1NTMiOiJqUkV2bEdrcXl3In1tAAAAA2hpZG0AAAAcS01VcFViUHpJVk9FSHdFdEJqTXZ2dm13S095RW0AAAACcmR0AAAABGQACl9fc3RydWN0X19kABhFbGl4aXIuVGRleC5Sb3RhdGlvbkRhdGFkAA5jbGlja2VkX29mZmVyc3QAAAAAZAAIbGFuZGluZ3NsAAAAAWIAAAK5amQAC3NlZW5fb2ZmZXJzbAAAAAFiAAAcxGptAAAABXN1Yl8xZAADbmlsbQAAAAVzdWJfMmQAA25pbG0AAAAHdHJhY2tlcm0AAAALbmV3X3NlcnZlcjJtAAAAA3VucW0AAAALa0JoTGFqa1pWaUc.WlOEPvpSIsbXjjmqop1lfitNfzfFQOvOrYJpou90POc
.cheatingxladies.com/ Name: __cfduid
Value: dd61551064f24245d9516bf324069b5e91532702967