Submitted URL: https://href.li/?https://4howcrack.com/qabool/tenap/pluway.html?jumpaway=howck&khalil=VCE%20Exam%20Simulator%202...
Effective URL: http://rub.threadrub.club/505c03e58c12445291ebc71164e3cde6dda6744336c74fced7a7b509fa1397/
Submission: On August 16 via manual from IT

Summary

This website contacted 9 IPs in 3 countries across 7 domains to perform 9 HTTP transactions. The main IP is 52.87.100.16, located in Ashburn, United States and belongs to AMAZON-AES - Amazon.com, Inc., US. The main domain is rub.threadrub.club.
This is the only time rub.threadrub.club was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 192.0.78.26 2635 (AUTOMATTIC)
1 37.187.197.217 16276 (OVH)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2606:2800:133... 15133 (EDGECAST)
1 2600:9000:200... 16509 (AMAZON-02)
1 54.230.93.241 16509 (AMAZON-02)
1 52.87.100.16 14618 (AMAZON-AES)
9 9
Domain Requested by
1 rub.threadrub.club direction.orangesrecess.pw
rub.threadrub.club
1 direction.orangesrecess.pw java.azureedge.net
1 d2ddvr6asnpd9x.cloudfront.net java.azureedge.net
1 java.azureedge.net 4howcrack.com
1 ajax.googleapis.com 4howcrack.com
1 fonts.googleapis.com 4howcrack.com
1 4howcrack.com href.li
1 href.li
9 8

This site contains no links.

Subject Issuer Validity Valid
tls.automattic.com
Let's Encrypt Authority X3
2019-08-06 -
2019-11-04
3 months crt.sh
4howcrack.com
cPanel, Inc. Certification Authority
2019-06-12 -
2019-09-10
3 months crt.sh
*.googleapis.com
Google Internet Authority G3
2019-07-29 -
2019-10-21
3 months crt.sh
*.vo.msecnd.net
Microsoft IT TLS CA 2
2018-03-30 -
2020-03-30
2 years crt.sh
*.cloudfront.net
DigiCert Global CA G2
2018-10-08 -
2019-10-09
a year crt.sh

This page contains 1 frames:

Frame: http://rub.threadrub.club/505c03e58c12445291ebc71164e3cde6dda6744336c74fced7a7b509fa1397/
Frame ID: E375B29B3471F4C3D2BA359E62FB13C8
Requests: 9 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://href.li/?https://4howcrack.com/qabool/tenap/pluway.html?jumpaway=howck&khalil=VCE%20... Page URL
  2. https://4howcrack.com/qabool/tenap/pluway.html?jumpaway=howck&khalil=VCE%20Exam%20Simulator%202.6.... Page URL
  3. http://direction.orangesrecess.pw/505c03e58c12445291ebc71164e3cde6dda6744336c74fced7a7b509fa1397/ Page URL
  4. http://rub.threadrub.club/505c03e58c12445291ebc71164e3cde6dda6744336c74fced7a7b509fa1397/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

9
Requests

67 %
HTTPS

50 %
IPv6

7
Domains

8
Subdomains

9
IPs

3
Countries

40 kB
Transfer

113 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://href.li/?https://4howcrack.com/qabool/tenap/pluway.html?jumpaway=howck&khalil=VCE%20Exam%20Simulator%202.6.1%20With%20Crack%20(Latest) Page URL
  2. https://4howcrack.com/qabool/tenap/pluway.html?jumpaway=howck&khalil=VCE%20Exam%20Simulator%202.6.1%20With%20Crack%20(Latest) Page URL
  3. http://direction.orangesrecess.pw/505c03e58c12445291ebc71164e3cde6dda6744336c74fced7a7b509fa1397/ Page URL
  4. http://rub.threadrub.club/505c03e58c12445291ebc71164e3cde6dda6744336c74fced7a7b509fa1397/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

9 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
href.li/
855 B
490 B
Document
General
Full URL
https://href.li/?https://4howcrack.com/qabool/tenap/pluway.html?jumpaway=howck&khalil=VCE%20Exam%20Simulator%202.6.1%20With%20Crack%20(Latest)
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.78.26 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
dbb398286972c478fe6b454fd41e91c26a6256b717265e35b1931af4bc534584
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

:method
GET
:authority
href.li
:scheme
https
:path
/?https://4howcrack.com/qabool/tenap/pluway.html?jumpaway=howck&khalil=VCE%20Exam%20Simulator%202.6.1%20With%20Crack%20(Latest)
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
navigate
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

status
200
server
nginx
date
Fri, 16 Aug 2019 10:37:17 GMT
content-type
text/html; charset=utf-8
strict-transport-security
max-age=31536000
vary
Accept-Encoding
content-encoding
gzip
x-ac
3.ams _dfw
pluway.html
4howcrack.com/qabool/tenap/
3 KB
1 KB
Document
General
Full URL
https://4howcrack.com/qabool/tenap/pluway.html?jumpaway=howck&khalil=VCE%20Exam%20Simulator%202.6.1%20With%20Crack%20(Latest)
Requested by
Host: href.li
URL: https://href.li/?https://4howcrack.com/qabool/tenap/pluway.html?jumpaway=howck&khalil=VCE%20Exam%20Simulator%202.6.1%20With%20Crack%20(Latest)
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.187.197.217 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
5fde9563f31eb514adcfcbf4cbf1d08bb9e288547a06f7dcd5ea3337439766b2

Request headers

:method
GET
:authority
4howcrack.com
:scheme
https
:path
/qabool/tenap/pluway.html?jumpaway=howck&khalil=VCE%20Exam%20Simulator%202.6.1%20With%20Crack%20(Latest)
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate

Response headers

status
200
date
Fri, 16 Aug 2019 10:37:18 GMT
server
Apache
last-modified
Thu, 25 Jul 2019 07:59:33 GMT
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
br
content-length
1086
content-type
text/html
css
fonts.googleapis.com/
12 KB
1 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Open+Sans:400,300,700|Roboto+Condensed:300,400
Requested by
Host: 4howcrack.com
URL: https://4howcrack.com/qabool/tenap/pluway.html?jumpaway=howck&khalil=VCE%20Exam%20Simulator%202.6.1%20With%20Crack%20(Latest)
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
29c89082df024ed976ad05e4fee0d14e6b54c62902fe6d5dcc3446dc8914034b
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Fri, 16 Aug 2019 10:37:18 GMT
server
ESF
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
status
200
date
Fri, 16 Aug 2019 10:37:18 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
x-xss-protection
0
expires
Fri, 16 Aug 2019 10:37:18 GMT
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.12.0/
95 KB
34 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/1.12.0/jquery.min.js
Requested by
Host: 4howcrack.com
URL: https://4howcrack.com/qabool/tenap/pluway.html?jumpaway=howck&khalil=VCE%20Exam%20Simulator%202.6.1%20With%20Crack%20(Latest)
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
5f1ab65fe2ad6b381a1ae036716475bf78c9b2e309528cf22170c1ddeefddcbf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 12 Aug 2019 16:10:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
325598
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
34044
x-xss-protection
0
last-modified
Tue, 20 Dec 2016 18:17:03 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 11 Aug 2020 16:10:40 GMT
api.php
java.azureedge.net/
1 KB
2 KB
Script
General
Full URL
https://java.azureedge.net/api.php?t=domain_js&affId=7968
Requested by
Host: 4howcrack.com
URL: https://4howcrack.com/qabool/tenap/pluway.html?jumpaway=howck&khalil=VCE%20Exam%20Simulator%202.6.1%20With%20Crack%20(Latest)
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:133:206e:1315:22a5:2006:24fd , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx/1.10.1 / PHP/5.5.38
Resource Hash
0eca5735c0175f0c714f1c9696c8e844b318f73b2a552d823e1941fe001ca1ec

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 16 Aug 2019 10:37:18 GMT
via
1.1 7af5638099b4c0c5cbf2f9c79d5100fd.cloudfront.net (CloudFront)
server
nginx/1.10.1
x-amz-cf-pop
FRA2
x-powered-by
PHP/5.5.38
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
application/javascript
access-control-allow-origin
*
x-cache
Miss from cloudfront
access-control-allow-headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
x-amz-cf-id
5VJykmWHMyf03XtZzbvyIzha0sjG42L4NkPWot24Al0RwIef5q3Wcg==
api.php
d2ddvr6asnpd9x.cloudfront.net/
62 B
475 B
XHR
General
Full URL
https://d2ddvr6asnpd9x.cloudfront.net/api.php?extr=YWZmSWQ9Nzk2OCZpbnN0SWQ9Nzc4NCZhcHBUaXRsZT12Y2UlMjBleGFtJTIwc2ltdWxhdG9yJTIwMi42LjElMjB3aXRoJTIwY3JhY2slMjAobGF0ZXN0KSZzMT1ob3djayZzMj11bmRlZmluZWQ=
Requested by
Host: java.azureedge.net
URL: https://java.azureedge.net/api.php?t=domain_js&affId=7968
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:200c:ec00:1f:8f25:9d40:21 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
nginx/1.10.1 / PHP/5.5.38
Resource Hash

Request headers

Sec-Fetch-Mode
cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 16 Aug 2019 10:37:18 GMT
via
1.1 a0ca759832376930b4e288cce8d0a079.cloudfront.net (CloudFront)
server
nginx/1.10.1
x-amz-cf-pop
FRA2
x-powered-by
PHP/5.5.38
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/html
access-control-allow-origin
*
x-cache
Miss from cloudfront
access-control-allow-headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
x-amz-cf-id
LKy43kwpiyawb5IS8JQrXMepmSAEtv_pjyEznW-ISQOfdejiDKb6Bg==
Cookie set /
direction.orangesrecess.pw/505c03e58c12445291ebc71164e3cde6dda6744336c74fced7a7b509fa1397/
349 B
756 B
Document
General
Full URL
http://direction.orangesrecess.pw/505c03e58c12445291ebc71164e3cde6dda6744336c74fced7a7b509fa1397/
Requested by
Host: java.azureedge.net
URL: https://java.azureedge.net/api.php?t=domain_js&affId=7968
Protocol
HTTP/1.1
Server
54.230.93.241 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-93-241.fra2.r.cloudfront.net
Software
nginx/1.10.1 / PHP/5.5.38
Resource Hash
46a1ad5e811dddde0c75b671bdebf178d2d0578e9ebbdd8f8ee55ed3b7eb5aea

Request headers

Host
direction.orangesrecess.pw
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Server
nginx/1.10.1
Date
Fri, 16 Aug 2019 10:37:19 GMT
X-Powered-By
PHP/5.5.38
Set-Cookie
rello=1
X-Cache
Miss from cloudfront
Via
1.1 53e3dfdf8efd0c06e5d27cfdbfbe5876.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2
X-Amz-Cf-Id
tz0AFFFnSk4tW-xeYULRSv3jnNGrq-bfSZmrAMalIdiXFiyx-aexTw==
Primary Request Cookie set /
rub.threadrub.club/505c03e58c12445291ebc71164e3cde6dda6744336c74fced7a7b509fa1397/
349 B
563 B
Document
General
Full URL
http://rub.threadrub.club/505c03e58c12445291ebc71164e3cde6dda6744336c74fced7a7b509fa1397/
Requested by
Host: direction.orangesrecess.pw
URL: http://direction.orangesrecess.pw/505c03e58c12445291ebc71164e3cde6dda6744336c74fced7a7b509fa1397/
Protocol
HTTP/1.1
Server
52.87.100.16 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-87-100-16.compute-1.amazonaws.com
Software
nginx/1.10.1 / PHP/5.5.38
Resource Hash
46a1ad5e811dddde0c75b671bdebf178d2d0578e9ebbdd8f8ee55ed3b7eb5aea

Request headers

Host
rub.threadrub.club
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://direction.orangesrecess.pw/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
http://direction.orangesrecess.pw/

Response headers

Server
nginx/1.10.1
Date
Fri, 16 Aug 2019 10:37:22 GMT
Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
X-Powered-By
PHP/5.5.38
Set-Cookie
rello=1
/
rub.threadrub.club/505c03e58c12445291ebc71164e3cde6dda6744336c74fced7a7b509fa1397/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
rub.threadrub.club
URL
http://rub.threadrub.club/505c03e58c12445291ebc71164e3cde6dda6744336c74fced7a7b509fa1397/

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

1 Cookies

Domain/Path Name / Value
rub.threadrub.club/505c03e58c12445291ebc71164e3cde6dda6744336c74fced7a7b509fa1397 Name: rello
Value: 1

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000