www.fraudnetmailer.com
Open in
urlscan Pro
216.119.193.71
Public Scan
Effective URL: https://www.fraudnetmailer.com/external_pages/remove.aspx?cid=66651351&sid=1440290&lid=0&o=1
Submission: On May 31 via api from CH — Scanned from CA
Summary
TLS certificate: Issued by R3 on April 5th 2022. Valid for: 3 months.
This is the only time www.fraudnetmailer.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 4 | 216.119.193.71 216.119.193.71 | 33561 (LUNAVI-WY) (LUNAVI-WY) | |
3 | 1 |
ASN33561 (LUNAVI-WY, US)
PTR: smtp4071.fraudnetemail.com
www.fraudnetmailer.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
fraudnetmailer.com
1 redirects
www.fraudnetmailer.com |
9 KB |
3 | 1 |
Domain | Requested by | |
---|---|---|
4 | www.fraudnetmailer.com |
1 redirects
www.fraudnetmailer.com
|
3 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.fraudnetmailer.com R3 |
2022-04-05 - 2022-07-04 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.fraudnetmailer.com/external_pages/remove.aspx?cid=66651351&sid=1440290&lid=0&o=1
Frame ID: A89B8C605ABE16A4363D3C5BCCC9E49D
Requests: 3 HTTP requests in this frame
Screenshot
Page Title
Opt-OutPage URL History Show full URLs
-
https://www.fraudnetmailer.com/?cid=66651351&sid=1440290&lid=0&o=1
HTTP 302
https://www.fraudnetmailer.com/external_pages/remove.aspx?cid=66651351&sid=1440290&lid=0&o=1 Page URL
Detected technologies
Microsoft ASP.NET (Web Frameworks) ExpandDetected patterns
- \.aspx?(?:$|\?)
- <input[^>]+name="__VIEWSTATE
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.fraudnetmailer.com/?cid=66651351&sid=1440290&lid=0&o=1
HTTP 302
https://www.fraudnetmailer.com/external_pages/remove.aspx?cid=66651351&sid=1440290&lid=0&o=1 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
remove.aspx
www.fraudnetmailer.com/external_pages/ Redirect Chain
|
7 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
06122017103358.png
www.fraudnetmailer.com/images/branding/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
letter.gif
www.fraudnetmailer.com/images/ |
287 B 383 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails object| navigation object| theForm function| __doPostBack1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.fraudnetmailer.com/ | Name: ASPSESSIONIDSWCDQRTR Value: EFNBMMLCDNLHPNFHCDDBEABL |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.fraudnetmailer.com
216.119.193.71
34038e4b9e95a29d9c6c4333f9a7ca5e44a66d4178295615dbf093100ae04e7e
38e658096c7da44771ac215aba701d14b5091a6bb444e78c5e02f0d01d2b71ce
8070e90a0696428a3a5911bfde4a4ff3dbefbc1224864b6cdda94274fed811d6