Submitted URL: http://click.womenseekingmales33.buzz/9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJlLXBvbGxvcw
Effective URL: http://clkdirect.site/unsub.php
Submission: On January 23 via api from BE

Summary

This website contacted 1 IPs in 1 countries across 2 domains to perform 5 HTTP transactions. The main IP is 77.120.101.11, located in Kyiv, Ukraine and belongs to VOLIA-AS, UA. The main domain is clkdirect.site.
This is the only time clkdirect.site was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
5 77.120.101.11 25229 (VOLIA-AS)
5 1
Domain Requested by
3 click.womenseekingmales33.buzz click.womenseekingmales33.buzz
2 clkdirect.site click.womenseekingmales33.buzz
clkdirect.site
5 2

This site contains no links.

Subject Issuer Validity Valid

This page contains 2 frames:

Primary Page: http://clkdirect.site/unsub.php
Frame ID: 8CE2136871D970C496E5058B81304F78
Requests: 4 HTTP requests in this frame

Frame: http://click.womenseekingmales33.buzz/track/frame/9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJlLXBvbGxvcw/9ef6ab22b94cea68f1e906e0ff37ba85/1579821401338
Frame ID: C55DAD0CB683E43AE4ED80567E223999
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://click.womenseekingmales33.buzz/9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJlLXBvbGxvcw Page URL
  2. http://click.womenseekingmales33.buzz/track/follow/9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJ... Page URL
  3. http://clkdirect.site/unsub.php Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^Apache-Coyote(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /^Apache-Coyote(?:\/([\d.]+))?/i

Page Statistics

5
Requests

0 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

1
IPs

1
Countries

14 kB
Transfer

13 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://click.womenseekingmales33.buzz/9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJlLXBvbGxvcw Page URL
  2. http://click.womenseekingmales33.buzz/track/follow/9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJlLXBvbGxvcw Page URL
  3. http://clkdirect.site/unsub.php Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Cookie set 9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJlLXBvbGxvcw
click.womenseekingmales33.buzz/
530 B
793 B
Document
General
Full URL
http://click.womenseekingmales33.buzz/9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJlLXBvbGxvcw
Protocol
HTTP/1.1
Server
77.120.101.11 Kyiv, Ukraine, ASN25229 (VOLIA-AS, UA),
Reverse DNS
11.101.120.77.colo.static.dcvolia.com
Software
Apache-Coyote/1.1 /
Resource Hash
3c5531b222bc4c78c19af314a582c1f63406e659e21fc3e7eeccb1491b05e7e3

Request headers

Host
click.womenseekingmales33.buzz
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 23 Jan 2020 23:04:52 GMT
Server
Apache-Coyote/1.1
Content-Type
text/html;charset=ISO-8859-1
Content-Language
en-US
Content-Length
530
Set-Cookie
s_sess=44FDB88F30D476D1AC26D229AE7BE0B6; Path=/; HttpOnly
Connection
close
9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJlLXBvbGxvcw
click.womenseekingmales33.buzz/track/follow/
10 KB
10 KB
Document
General
Full URL
http://click.womenseekingmales33.buzz/track/follow/9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJlLXBvbGxvcw
Requested by
Host: click.womenseekingmales33.buzz
URL: http://click.womenseekingmales33.buzz/9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJlLXBvbGxvcw
Protocol
HTTP/1.1
Server
77.120.101.11 Kyiv, Ukraine, ASN25229 (VOLIA-AS, UA),
Reverse DNS
11.101.120.77.colo.static.dcvolia.com
Software
Apache-Coyote/1.1 /
Resource Hash
421403fe646eb406fa75253768d57c39c8dbd076f04b4710105f23162569fb85

Request headers

Host
click.womenseekingmales33.buzz
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://click.womenseekingmales33.buzz/9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJlLXBvbGxvcw
Accept-Encoding
gzip, deflate
Cookie
s_sess=44FDB88F30D476D1AC26D229AE7BE0B6
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://click.womenseekingmales33.buzz/9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJlLXBvbGxvcw

Response headers

Date
Thu, 23 Jan 2020 23:04:52 GMT
Server
Apache-Coyote/1.1
Content-Type
text/html;charset=UTF-8
Content-Language
en-US
Connection
close
Transfer-Encoding
chunked
1579821401338
click.womenseekingmales33.buzz/track/frame/9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJlLXBvbGxvcw/9ef6ab22b94cea68f1e906e0ff37ba85/ Frame C55D
83 B
269 B
Document
General
Full URL
http://click.womenseekingmales33.buzz/track/frame/9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJlLXBvbGxvcw/9ef6ab22b94cea68f1e906e0ff37ba85/1579821401338
Requested by
Host: click.womenseekingmales33.buzz
URL: http://click.womenseekingmales33.buzz/track/follow/9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJlLXBvbGxvcw
Protocol
HTTP/1.1
Server
77.120.101.11 Kyiv, Ukraine, ASN25229 (VOLIA-AS, UA),
Reverse DNS
11.101.120.77.colo.static.dcvolia.com
Software
Apache-Coyote/1.1 /
Resource Hash
15f23e99bfc4398f94183af696fb90a2778d895658b78a0c11d30e95911c41e0

Request headers

Host
click.womenseekingmales33.buzz
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://click.womenseekingmales33.buzz/track/follow/9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJlLXBvbGxvcw
Accept-Encoding
gzip, deflate
Cookie
s_sess=44FDB88F30D476D1AC26D229AE7BE0B6
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://click.womenseekingmales33.buzz/track/follow/9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJlLXBvbGxvcw

Response headers

Date
Thu, 23 Jan 2020 23:04:52 GMT
Server
Apache-Coyote/1.1
Content-Type
text/html;charset=UTF-8
Content-Language
en-US
Content-Length
83
Connection
close
Primary Request unsub.php
clkdirect.site/
2 KB
2 KB
Document
General
Full URL
http://clkdirect.site/unsub.php
Requested by
Host: click.womenseekingmales33.buzz
URL: http://click.womenseekingmales33.buzz/track/follow/9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJlLXBvbGxvcw
Protocol
HTTP/1.1
Server
77.120.101.11 Kyiv, Ukraine, ASN25229 (VOLIA-AS, UA),
Reverse DNS
11.101.120.77.colo.static.dcvolia.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash
26dfa9e543ee1e02ca003cd983fbf61d335980619df214e764d27d7bc5c95847

Request headers

Host
clkdirect.site
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://click.womenseekingmales33.buzz/track/follow/9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJlLXBvbGxvcw
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://click.womenseekingmales33.buzz/track/follow/9p362DkTnlBU9-9yb2JpbndhbG9zemVrQGhvdG1haWwuY29t5HVuc3Vic2NyaWJlLXBvbGxvcw

Response headers

Date
Thu, 23 Jan 2020 23:04:53 GMT
Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
Content-Length
2238
Connection
close
Content-Type
text/html; charset=UTF-8
opt-me-out.css
clkdirect.site/
609 B
863 B
Stylesheet
General
Full URL
http://clkdirect.site/opt-me-out.css
Requested by
Host: clkdirect.site
URL: http://clkdirect.site/unsub.php
Protocol
HTTP/1.1
Server
77.120.101.11 Kyiv, Ukraine, ASN25229 (VOLIA-AS, UA),
Reverse DNS
11.101.120.77.colo.static.dcvolia.com
Software
Apache/2.2.15 (CentOS) /
Resource Hash
5527d4d2e6cb24135e5786666b35e92d6e9d19a71c9494f5a01ec62e820cdb4f

Request headers

Referer
http://clkdirect.site/unsub.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 23 Jan 2020 23:04:53 GMT
Last-Modified
Tue, 03 Nov 2015 10:02:59 GMT
Server
Apache/2.2.15 (CentOS)
ETag
"de05ee-261-5239fff9ffac0"
Content-Type
text/css
Connection
close
Accept-Ranges
bytes
Content-Length
609

Verdicts & Comments Add Verdict or Comment

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| emailValidate

0 Cookies