maliciousdomain.com
Open in
urlscan Pro
107.161.31.129
Public Scan
Submission: On September 26 via manual from DE — Scanned from DE
Summary
This is the only time maliciousdomain.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
16 | 107.161.31.129 107.161.31.129 | 3842 (RAMNODE) (RAMNODE) | |
1 | 2a00:1450:400... 2a00:1450:400e:801::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2606:4700::68... 2606:4700::6812:acf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2a00:1450:400... 2a00:1450:4001:801::2003 | 15169 (GOOGLE) (GOOGLE) | |
22 | 4 |
ASN3842 (RAMNODE, US)
PTR: app.maneeshkumar.com
maliciousdomain.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
maliciousdomain.com
maliciousdomain.com |
3 MB |
3 |
gstatic.com
fonts.gstatic.com |
101 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 691 |
70 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 40 |
1 KB |
22 | 4 |
Domain | Requested by | |
---|---|---|
16 | maliciousdomain.com |
maliciousdomain.com
|
3 | fonts.gstatic.com |
fonts.googleapis.com
|
2 | maxcdn.bootstrapcdn.com |
maliciousdomain.com
maxcdn.bootstrapcdn.com |
1 | fonts.googleapis.com |
maliciousdomain.com
|
22 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.ptr.tech |
www.linkedin.com |
twitter.com |
www.github.com |
gist.github.com |
bitbucket.org |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-01-29 - 2023-01-29 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://maliciousdomain.com/
Frame ID: 4D1A31C04640CDB31B185E7564E7F242
Requests: 22 HTTP requests in this frame
Screenshot
Page Title
Alex Kuhl: Experienced Human and HackerDetected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
7 Outgoing links
These are links going to different origins than the main page.
Title: Paper Traitors
Search URL Search Domain Scan URL
Title: LinkedIn
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
maliciousdomain.com/ |
18 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
reset.css
maliciousdomain.com/css/ |
1 KB 918 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
plugins.css
maliciousdomain.com/css/ |
26 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
maliciousdomain.com/css/ |
51 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
color.css
maliciousdomain.com/css/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
maliciousdomain.com/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
alex_at_rocky_mountains.jpg
maliciousdomain.com/images/ |
50 KB 51 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
maliciousdomain.com/js/ |
82 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
plugins.js
maliciousdomain.com/js/ |
166 KB 51 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
scripts.js
maliciousdomain.com/js/ |
16 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css
fonts.googleapis.com/ |
7 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
maxcdn.bootstrapcdn.com/font-awesome/4.4.0/css/ |
26 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
JTUSjIg1_i6t8kCHKm459Wlhyw.woff2
fonts.gstatic.com/s/montserrat/v25/ |
30 KB 31 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fontawesome-webfont.woff2
maxcdn.bootstrapcdn.com/font-awesome/4.4.0/fonts/ |
63 KB 64 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1Ptug8zYS_SKggPNyC0ITw.woff2
fonts.gstatic.com/s/raleway/v28/ |
45 KB 46 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
S6uyw4BMUTPHjx4wXg.woff2
fonts.gstatic.com/s/lato/v23/ |
23 KB 24 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
alex_at_sydney_harbor_bridge.jpg
maliciousdomain.com/images/bg/ |
472 KB 472 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
queenstown_new_zealand.jpg
maliciousdomain.com/images/bg/ |
483 KB 484 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aspens_rocky_mountains.jpg
maliciousdomain.com/images/bg/ |
488 KB 488 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
alex_at_uluru.jpg
maliciousdomain.com/images/bg/long/ |
197 KB 198 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sky_pond_rocky_mountains.jpg
maliciousdomain.com/images/bg/long/ |
666 KB 666 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sydney_opera_house_stairs.jpg
maliciousdomain.com/images/bg/long/ |
288 KB 288 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
68 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation function| $ function| jQuery function| init function| scrollArray function| wheel function| keydown function| mousedown function| setCache function| overflowingAncestor function| addEvent function| removeEvent function| isNodeName function| directionCheck function| pulse_ function| pulse number| framerate number| animtime number| stepsize boolean| pulseAlgorithm number| pulseScale number| pulseNormalize boolean| acceleration number| accelDelta number| accelMax boolean| keyboardsupport boolean| disableKeyboard number| arrowscroll string| exclude boolean| disabled boolean| frame object| direction boolean| initdone boolean| fixedback object| root object| activeElement object| key object| que boolean| pending number| lastScroll object| cache function| uniqueID function| requestFrame object| html5 object| Modernizr function| yepnope object| eventie function| docReady function| EventEmitter function| getStyleProperty function| getSize function| matchesSelector function| Outlayer function| Isotope function| Masonry function| imagesLoaded object| skrollr object| YTPlayer function| initBionick function| initparallax object| trueMobile object| s0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
maliciousdomain.com
maxcdn.bootstrapcdn.com
107.161.31.129
2606:4700::6812:acf
2a00:1450:4001:801::2003
2a00:1450:400e:801::200a
0108cf57a5359cdecc80699650b912a11731d0aeaec300d884a9d658ed96b295
1ed721ce559ed3b1246dd150f42d1513d054004522571145f19ad6dfff5e14a4
1f2c67931bcc9fbd8594e4a5f1060dfa31bbafc4323dfb6503cfc4a2fca149c5
23534bc35ad540965ce4c470854abc21d1d25ebd92dc1153374696b72ed3ef8a
302a4583a26deadb624433c79ab9ce45f7482ed152b7bcc62bd6230b00d9fc15
3863f7ad5f6f853156d3666cb2e5455b6ec4e47655f2c3c859a8f753bd04b93b
3c4a1bb7ce3234407184f0d80cc4dec075e4ad616b44dcc5778e1cfb1bc24019
405ceee1c2f5c31f1cb94ebc63d49a43fddd1471c2c7401a01c7c11bb1d93826
5c22bc1326414c9d0790e8b16c21de6f5162066f3c519773732bba4edcd3a444
61c8e3f8fdc6f90e13c26a415999b18b778b216df658db049e61070facc7879d
69afe3fd3833ae252c38d03331f6e9e93b0801248b7cc36ca474fae702349089
77e3ff8161f7002ee71b3ee2e195b45e35d5505cd617e701812599f7deff461e
7add832de0be60914c6bafda5e5621ae96b563a8e7f4b5187a8ccf310674f192
845b6b1b8ddb607ed91fe8c84023cd0fa75b5973f4865b5fe6299079e366f3d0
918b7dc3e2e2d015c16ce08b57bcb64d2253bafc1707658f361e72865498e537
936ffccdc35bc55221e669d0e76034af76ba8c080c1b1149144dbbd3b5311829
9c589e168fb8e72721c7a8c30c892eab66d2592d0bbbf5741b0cf1f33aad9be2
ae919a7c9f25f0fd97fc18e398ae8e453fcaae487e4a4cb4f896e7fecde4a780
b40ffefd480b707d126304f14810340e69d0b014fc7006c538aa761ed85f6eb9
d92f8489a0e3d930a47600aa9c9e26c33e498b77eb710600891921d72a281950
d9db26163d0fd27a64b6175a345b346d939cfb79ec3e86dff27795f5ebb4ae7a
dd8e21a2de069ee3cc64b46f0e31563014438b7ad497406a6a5d1b4ee58bbd71