![](/screenshots/71cc0d3c-ae98-47c3-9219-5fb83ea89388.png)
fuckvoi.top
Open in
urlscan Pro
2606:4700:3037::6815:48b5
Malicious Activity!
Public Scan
Effective URL: https://fuckvoi.top/
Submission: On May 21 via api from US — Scanned from US
Summary
TLS certificate: Issued by GTS CA 1P5 on May 21st 2023. Valid for: 3 months.
This is the only time fuckvoi.top was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Scam (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2606:50c0:800... 2606:50c0:8001::153 | 54113 (FASTLY) (FASTLY) | |
1 1 | 2606:4700:303... 2606:4700:3033::ac43:99d7 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 2606:4700:303... 2606:4700:3037::6815:48b5 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2607:f8b0:400... 2607:f8b0:400c:c32::5f | 15169 (GOOGLE) (GOOGLE) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:1a | 20446 (STACKPATH...) (STACKPATH-CDN) | |
1 | 2600:9000:251... 2600:9000:2510:8600:f:bbf4:e840:21 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2600:9000:251... 2600:9000:2512:f600:1c:b3e3:eb40:21 | 16509 (AMAZON-02) (AMAZON-02) | |
6 | 2600:9000:251... 2600:9000:2514:dc00:7:aad:f980:21 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2607:f8b0:400... 2607:f8b0:400c:c38::5e | 15169 (GOOGLE) (GOOGLE) | |
15 | 7 |
ASN16509 (AMAZON-02, US)
d224zw8q39rk4h.cloudfront.net |
ASN16509 (AMAZON-02, US)
d13pxqgp3ixdbh.cloudfront.net |
ASN16509 (AMAZON-02, US)
d2a80scaiwzqau.cloudfront.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
cloudfront.net
d224zw8q39rk4h.cloudfront.net d13pxqgp3ixdbh.cloudfront.net d2a80scaiwzqau.cloudfront.net |
29 KB |
5 |
fuckvoi.top
1 redirects
fuckvoi.top |
7 MB |
1 |
gstatic.com
fonts.gstatic.com |
32 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 696 |
30 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 35 |
885 B |
1 |
github.io
1 redirects
zyx6ssmdm4umx4b6.github.io |
526 B |
15 | 6 |
Domain | Requested by | |
---|---|---|
6 | d2a80scaiwzqau.cloudfront.net |
d224zw8q39rk4h.cloudfront.net
|
5 | fuckvoi.top |
1 redirects
fuckvoi.top
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | d13pxqgp3ixdbh.cloudfront.net |
fuckvoi.top
|
1 | d224zw8q39rk4h.cloudfront.net |
fuckvoi.top
|
1 | code.jquery.com |
fuckvoi.top
|
1 | fonts.googleapis.com |
fuckvoi.top
|
1 | zyx6ssmdm4umx4b6.github.io | 1 redirects |
15 | 8 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
fuckvoi.top GTS CA 1P5 |
2023-05-21 - 2023-08-19 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-04-24 - 2023-07-17 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2022-08-03 - 2023-07-14 |
a year | crt.sh |
*.cloudfront.net Amazon RSA 2048 M01 |
2022-12-08 - 2023-12-07 |
a year | crt.sh |
*.gstatic.com GTS CA 1C3 |
2023-04-24 - 2023-07-17 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://fuckvoi.top/
Frame ID: 97FA31F704EA9F6EC91E515508B8173E
Requests: 15 HTTP requests in this frame
Screenshot
![](/screenshots/71cc0d3c-ae98-47c3-9219-5fb83ea89388.png)
Page Title
FUCKVOI.TOPPage URL History Show full URLs
-
http://zyx6ssmdm4umx4b6.github.io/
HTTP 301
http://fuckvoi.top/ HTTP 301
https://fuckvoi.top/ Page URL
Detected technologies
![](/vendor/wappa/icons/Bootstrap.png)
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
![](/vendor/wappa/icons/Google Font API.png)
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://zyx6ssmdm4umx4b6.github.io/
HTTP 301
http://fuckvoi.top/ HTTP 301
https://fuckvoi.top/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
fuckvoi.top/ Redirect Chain
|
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
fuckvoi.top/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
6 KB 885 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.7.0.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
33eb20a.js
d224zw8q39rk4h.cloudfront.net/ |
24 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1684631019b321d1741076320089456246a0159072.png
d13pxqgp3ixdbh.cloudfront.net/uploads/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery-3.7.0.min.js
fuckvoi.top/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
html.3827219.6665f.0.js
d2a80scaiwzqau.cloudfront.net/public/external/v2/ |
9 KB 9 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css_front.css
d2a80scaiwzqau.cloudfront.net/public/external/ |
6 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
background.gif
fuckvoi.top/ |
7 MB 7 MB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xMQbuFFYT72XzQUpDg.woff2
fonts.gstatic.com/s/sora/v11/ |
31 KB 32 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css.css
d2a80scaiwzqau.cloudfront.net/public/clockers/CustomButton/ |
1010 B 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
guid
d2a80scaiwzqau.cloudfront.net/public/ |
0 278 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
check.php
d2a80scaiwzqau.cloudfront.net/public/external/ |
78 B 372 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
check.php
d2a80scaiwzqau.cloudfront.net/public/external/ |
78 B 373 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Scam (Online)22 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 boolean| credentialless function| $ function| jQuery object| CPABUILDSETTINGS object| CPABUILDContentLocker number| __cfRLUnblockHandlers function| CPBContentLocker function| CPABuildLock function| CPABuildGetFeedURL function| CPABuildGetIframeURL function| CPABuildGetIframeHTML function| CPABuildUnlock function| CPABuildOfferComplete function| CPABuildOffersComplete function| CPABuildCheckForLead function| og_load function| CPABuildComplete function| call_locker function| _0x43f3 function| _0x277159 function| _0x5f391 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
fuckvoi.top/ | Name: _cpguid Value: 9nyeva9hu |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
d13pxqgp3ixdbh.cloudfront.net
d224zw8q39rk4h.cloudfront.net
d2a80scaiwzqau.cloudfront.net
fonts.googleapis.com
fonts.gstatic.com
fuckvoi.top
zyx6ssmdm4umx4b6.github.io
2001:4de0:ac18::1:a:1a
2600:9000:2510:8600:f:bbf4:e840:21
2600:9000:2512:f600:1c:b3e3:eb40:21
2600:9000:2514:dc00:7:aad:f980:21
2606:4700:3033::ac43:99d7
2606:4700:3037::6815:48b5
2606:50c0:8001::153
2607:f8b0:400c:c32::5f
2607:f8b0:400c:c38::5e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