looking4fuck.com
Open in
urlscan Pro
3.161.82.121
Malicious Activity!
Public Scan
Submission: On June 26 via api from GB — Scanned from GB
Summary
TLS certificate: Issued by Amazon RSA 2048 M02 on November 1st 2023. Valid for: a year.
This is the only time looking4fuck.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 22 | 3.161.82.121 3.161.82.121 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 3.72.153.128 3.72.153.128 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2a00:1450:400... 2a00:1450:4001:81d::2008 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2600:9000:211... 2600:9000:211e:c600:10:a4a1:21c0:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
24 | 4 |
ASN16509 (AMAZON-02, US)
PTR: server-3-161-82-121.fra56.r.cloudfront.net
looking4fuck.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-3-72-153-128.eu-central-1.compute.amazonaws.com
bts.insigit.com |
ASN15169 (GOOGLE, US)
www.googletagmanager.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
22 |
looking4fuck.com
1 redirects
looking4fuck.com |
172 KB |
1 |
retarget2core.com
retarget2core.com — Cisco Umbrella Rank: 589451 |
679 B |
1 |
googletagmanager.com
www.googletagmanager.com — Cisco Umbrella Rank: 81 |
78 KB |
1 |
insigit.com
bts.insigit.com — Cisco Umbrella Rank: 657345 |
9 KB |
24 | 4 |
Domain | Requested by | |
---|---|---|
22 | looking4fuck.com |
1 redirects
looking4fuck.com
|
1 | retarget2core.com |
looking4fuck.com
|
1 | www.googletagmanager.com |
looking4fuck.com
|
1 | bts.insigit.com |
looking4fuck.com
|
24 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
looking4fuck.com Amazon RSA 2048 M02 |
2023-11-01 - 2024-11-29 |
a year | crt.sh |
*.google-analytics.com WR2 |
2024-06-03 - 2024-08-26 |
3 months | crt.sh |
retarget2core.com Amazon RSA 2048 M02 |
2023-11-02 - 2024-11-30 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://looking4fuck.com/jump?tds_id=b6935tro_jump_a_1636640937153&utm_source=dda&dci=7f61862c4abf3c36ae27b80fa11daa21102df343&_tgUrl=aHR0cHM6Ly9sb29raW5nNGZ1Y2suY29tL3Rkcy90Zy9zLzE3YmIyZDQ2YWI1MTFiOGUxOTBiYzM2NDk4NTlkNDZlP19fdD0xNzEwMzUwNTMyMzQ4Jl9fbD0zNjAw&tds_ao=1&id=22001&tds_ac_id=s1988kro&utm_campaign=tj_tab&utm_term=mob_bn_ita_ph_phone&tds_cid=89a625a0d841b64c70c6c467a7301071c91ec209&tds_oid=22001&s1=ddn&tds_host=looking4fuck.com&tds_campaign=b6935tro&utm_content=IT&s2=general
Frame ID: 529B794C71F5C1441D4505794A2DF692
Requests: 24 HTTP requests in this frame
Screenshot
Detected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Google Tag Manager (Tag Managers) Expand
Detected patterns
- <!-- (?:End )?Google Tag Manager -->
- googletagmanager\.com/gtm\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 5- https://looking4fuck.com/bts.js HTTP 301
- https://bts.insigit.com/bts.js
24 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
jump
looking4fuck.com/ |
13 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bd5bac3b03b0d3b25a723cd5778ad0ce.css
looking4fuck.com/landings/22001/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
479a9ecc07b5fdccd3eb1d2b82c8b2fa.js
looking4fuck.com/landings/22001/js/ |
96 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pic.gif
looking4fuck.com/landings/22001/images/ |
116 KB 117 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
intg.js
looking4fuck.com/bridge/ |
339 B 623 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
web-vitals.iife.js
looking4fuck.com/web-vitals@3.3.0/dist/ |
7 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bts.js
bts.insigit.com/ Redirect Chain
|
9 KB 9 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
gtm.js
www.googletagmanager.com/ |
218 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
index.js
looking4fuck.com/bridge/ |
18 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
integration.js
looking4fuck.com/ |
2 KB 1 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ac3fc68831981c704535980c826941a5
retarget2core.com/43fbb6270523e1760fa5f0d2579dea07/ |
35 B 679 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 232 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 231 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 231 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 231 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 231 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 231 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 230 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 232 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 232 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.js
looking4fuck.com/ufis/ |
199 B 455 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
tr
looking4fuck.com/b/ |
0 231 B |
Ping
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jump-favicon.ico
looking4fuck.com/images/ |
1 KB 441 B |
Other
image/vnd.microsoft.icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
interlayer
looking4fuck.com/tds/ |
0 429 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| event object| fence object| sharedStorage function| $ function| jQuery object| bts object| __bts_p object| adsLayer object| webVitals object| google_tag_manager object| google_tag_data function| attachScript function| getMainScriptUrl function| checkIsIpad2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
looking4fuck.com/ | Name: __bts_cid Value: 458f0b06045c47b18682e87b16725f53 |
|
.retarget2core.com/ | Name: dci Value: d339e37e2687e62612ba8f3cee277cc2ce740f7c |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bts.insigit.com
looking4fuck.com
retarget2core.com
www.googletagmanager.com
2600:9000:211e:c600:10:a4a1:21c0:93a1
2a00:1450:4001:81d::2008
3.161.82.121
3.72.153.128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