truncated Open in urlscan Pro
  Malicious Activity! Public Scan

Submitted URL: http://jakkylinks.com/caly/
Effective URL: data://truncated
Submission: On March 21 via automatic, source phishtank

Summary

This website contacted 4 IPs in 1 countries across 3 domains to perform 3 HTTP transactions. The main IP is , located in and belongs to . The main domain is truncated.
This is the only time truncated was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
1 68.171.217.250 22878 (ASACENET1)
1 2400:cb00:204... 13335 (CLOUDFLAR...)
1 64.130.23.5 7859 (PAIR-NETW...)
3 4
Domain Requested by
1 www.bountifulbreast.co.uk text
1 icons.iconarchive.com text
1 jakkylinks.com
3 3

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: data://truncated
Frame ID: 27229.1
Requests: 4 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://jakkylinks.com/caly/ Page URL
  2. data://truncated Page URL

Page Statistics

3
Requests

0 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

4
IPs

1
Countries

298 kB
Transfer

479 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://jakkylinks.com/caly/ Page URL
  2. data://truncated Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
jakkylinks.com/caly/
242 KB
242 KB
Document
General
Full URL
http://jakkylinks.com/caly/
Protocol
HTTP/1.1
Server
68.171.217.250 Southfield, United States, ASN22878 (ASACENET1 - ACENET, INC., US),
Reverse DNS
yesod.webnetnspire.com
Software
Apache /
Resource Hash
162552e868f094dc3c1c30342b0e914873f3c12279fd2c1a0612b0c442a78b64

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate, sdch
Host
jakkylinks.com
Accept-Language
en-US,en;q=0.8
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Cache-Control
no-cache
Connection
keep-alive
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36

Response headers

Date
Tue, 21 Mar 2017 13:35:09 GMT
Last-Modified
Thu, 08 Dec 2016 08:31:47 GMT
Server
Apache
Connection
close
Accept-Ranges
bytes
Content-Length
247384
Content-Type
text/html
Primary Request truncated
/
181 KB
0
Document
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5e25b655b4f438275cba508533b84eac95c677aafcb45de8b92d8b9fc2b9d4b6

Request headers

Upgrade-Insecure-Requests
1
Referer
http://jakkylinks.com/caly/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Content-Type
text/html;charset=US-ASCII
Cookie set Google-Drive-icon.png
icons.iconarchive.com/icons/marcus-roberto/google-play/512/
52 KB
52 KB
Image
General
Full URL
http://icons.iconarchive.com/icons/marcus-roberto/google-play/512/Google-Drive-icon.png
Requested by
Host: text
URL: data:text/html;truncated
Protocol
HTTP/1.1
Server
2400:cb00:2048:1::6819:9c0d , United States, ASN13335 (CLOUDFLARENET - CloudFlare, Inc., US),
Reverse DNS
Software
cloudflare-nginx /
Resource Hash
aa7f8f7e425602f2cec93a7faf384eb61ce7af9d6206d77dca635a6eb7dcea66

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate, sdch
Host
icons.iconarchive.com
Accept-Language
en-US,en;q=0.8
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36
Accept
image/webp,image/*,*/*;q=0.8
Cache-Control
no-cache
Connection
keep-alive
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36

Response headers

Date
Tue, 21 Mar 2017 13:35:10 GMT
CF-Cache-Status
HIT
Last-Modified
Wed, 14 Dec 2016 23:17:41 GMT
Server
cloudflare-nginx
ETag
"3144190470"
Vary
Accept-Encoding
Content-Type
image/png
Set-Cookie
__cfduid=d80a522e55cd37a5814d504090a5c771c1490103310; expires=Wed, 21-Mar-18 13:35:10 GMT; path=/; domain=.iconarchive.com; HttpOnly
Cache-Control
public, max-age=172800
Connection
keep-alive
Accept-Ranges
bytes
CF-RAY
34314af904d8648d-FRA
Content-Length
53266
Expires
Thu, 23 Mar 2017 13:35:10 GMT
100Secure.jpg
www.bountifulbreast.co.uk/images/
5 KB
5 KB
Image
General
Full URL
http://www.bountifulbreast.co.uk/images/100Secure.jpg
Requested by
Host: text
URL: data:text/html;truncated
Protocol
HTTP/1.1
Server
64.130.23.5 Pittsburgh, United States, ASN7859 (PAIR-NETWORKS - pair Networks, US),
Reverse DNS
bountifulbreast.co.uk
Software
Apache/2.4.25 /
Resource Hash
2f71bea7601b970d07eea91af38bcee8b1c9fc197b5f85cbe9bae3b9f2b705c5

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate, sdch
Host
www.bountifulbreast.co.uk
Accept-Language
en-US,en;q=0.8
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36
Accept
image/webp,image/*,*/*;q=0.8
Cache-Control
no-cache
Connection
keep-alive
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36

Response headers

Date
Tue, 21 Mar 2017 13:35:10 GMT
Last-Modified
Fri, 08 Apr 2011 07:10:07 GMT
Server
Apache/2.4.25
ETag
"124f-4a062ea6b91c0"
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
4687

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies