hotamusements.com
Open in
urlscan Pro
142.93.236.19
Malicious Activity!
Public Scan
Effective URL: http://hotamusements.com/rnhbnnyuq
Submission: On February 05 via manual from US
Summary
This is the only time hotamusements.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Porn Scam (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 91.234.35.247 91.234.35.247 | 56485 (THEHOST-AS) (THEHOST-AS) | |
1 1 | 195.28.183.126 195.28.183.126 | 15626 (ITLAS) (ITLAS) | |
2 | 142.93.236.19 142.93.236.19 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN - DigitalOcean) | |
1 | 2606:4700::68... 2606:4700::6813:c597 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
3 | 95.216.156.11 95.216.156.11 | 24940 (HETZNER-AS) (HETZNER-AS) | |
1 | 205.185.208.52 205.185.208.52 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
9 | 5 |
ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US)
hotamusements.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdnjs.cloudflare.com |
ASN24940 (HETZNER-AS, DE)
PTR: static.11.156.216.95.clients.your-server.de
t-r-f-k.com |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip052.ssl.hwcdn.net
code.jquery.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
t-r-f-k.com
t-r-f-k.com |
1 MB |
2 |
hotamusements.com
hotamusements.com |
6 KB |
2 |
lkik.us
lkik.us |
1 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
4 KB |
1 |
herodota.ru
1 redirects
herodota.ru |
664 B |
9 | 6 |
Domain | Requested by | |
---|---|---|
3 | t-r-f-k.com |
hotamusements.com
|
2 | hotamusements.com |
lkik.us
hotamusements.com |
2 | lkik.us |
lkik.us
|
1 | code.jquery.com |
hotamusements.com
|
1 | cdnjs.cloudflare.com |
hotamusements.com
|
1 | herodota.ru | 1 redirects |
9 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ssl412106.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2018-09-22 - 2019-03-31 |
6 months | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://hotamusements.com/rnhbnnyuq
Frame ID: CE791B5E7D20A42529B2397D75E4DA90
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://lkik.us/ Page URL
-
http://herodota.ru/?pakusay&charset=windows-1251&keyword=[KEYWORD]
HTTP 302
http://hotamusements.com/rnhbnnyuq Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://lkik.us/ Page URL
-
http://herodota.ru/?pakusay&charset=windows-1251&keyword=[KEYWORD]
HTTP 302
http://hotamusements.com/rnhbnnyuq Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
lkik.us/ |
720 B 721 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cs2.js
lkik.us/ |
301 B 531 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
rnhbnnyuq
hotamusements.com/ Redirect Chain
|
16 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
animate.min.css
cdnjs.cloudflare.com/ajax/libs/animate.css/3.5.2/ |
52 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
123.png
t-r-f-k.com/assets/a839d8605434e7a7e3dcac0469d935a7/images/ |
790 KB 790 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-2.2.4.min.js
code.jquery.com/ |
84 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
p.js
hotamusements.com/ |
388 B 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.jpg
t-r-f-k.com/assets/a839d8605434e7a7e3dcac0469d935a7/images/ |
121 KB 122 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Lato-Regular.ttf
t-r-f-k.com/assets/a839d8605434e7a7e3dcac0469d935a7/fonts/ |
117 KB 118 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Porn Scam (Online)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery string| u2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
hotamusements.com/ | Name: k Value: SFMyNTY.g3QAAAAIbQAAAARhdW5xbQAAABZ7IjEyMjgwIjoicGFlUHJnbUp5cCJ9bQAAAANoaWRtAAAAHEtNVXBVQWVLaFdNUnV3RXRQVnprR05NTVZMUGdtAAAAAmhsYQFtAAAAAnJkdAAAAARkAApfX3N0cnVjdF9fZAAYRWxpeGlyLlRkZXguUm90YXRpb25EYXRhZAAOY2xpY2tlZF9vZmZlcnN0AAAAAGQACGxhbmRpbmdzbAAAAAFiAAACuWpkAAtzZWVuX29mZmVyc2wAAAABYgAAP-FqbQAAAAVzdWJfMWQAA25pbG0AAAAFc3ViXzJkAANuaWxtAAAAB3RyYWNrZXJtAAAAB25vdHJhY2ttAAAAA3VucW0AAAAMTkFoWXZ6VkdQcXVW.W_Dl_DVvpPLb-gv98MMxK7qllXEGQ8t0MQXfZqcCHpk |
|
hotamusements.com/ | Name: uord Value: 9534aeff0cdf5ae7984063bbebd21b75 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
code.jquery.com
herodota.ru
hotamusements.com
lkik.us
t-r-f-k.com
142.93.236.19
195.28.183.126
205.185.208.52
2606:4700::6813:c597
91.234.35.247
95.216.156.11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