Submitted URL: https://extractionsponge.top/T9T7llXd1myq?mkny1699887605286
Effective URL: https://v7183.qozf.sbs/go.php?ad=dpmly88mjyqsa7zl6x30&sid=M7300971462892978323&pub=25426&pid=25426-5a4e140z&c=0&app=unk...
Submission: On November 13 via manual from JO — Scanned from DE

Summary

This website contacted 5 IPs in 2 countries across 5 domains to perform 7 HTTP transactions. The main IP is 162.55.4.52, located in Germany and belongs to HETZNER-AS, DE. The main domain is v7183.qozf.sbs.
TLS certificate: Issued by R3 on September 16th 2023. Valid for: 3 months.
This is the only time v7183.qozf.sbs was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 2606:4700:303... 13335 (CLOUDFLAR...)
1 2a06:98c1:312... 13335 (CLOUDFLAR...)
2 108.178.23.114 32475 (SINGLEHOP...)
1 162.55.4.52 24940 (HETZNER-AS)
7 5
Domain Requested by
2 prize.youarelucky.click ad.admo.buzz
prize.youarelucky.click
2 extractionsponge.top extractionsponge.top
1 v7183.qozf.sbs prize.youarelucky.click
1 ad.admo.buzz extractionsponge.top
0 hm.baidu.com Failed extractionsponge.top
7 5

This site contains no links.

Subject Issuer Validity Valid
extractionsponge.top
E1
2023-11-04 -
2024-02-02
3 months crt.sh
admo.buzz
E1
2023-10-18 -
2024-01-16
3 months crt.sh
prize.youarelucky.click
R3
2023-10-11 -
2024-01-09
3 months crt.sh
v7183.qozf.sbs
R3
2023-09-16 -
2023-12-15
3 months crt.sh

This page contains 1 frames:

Primary Page: https://v7183.qozf.sbs/go.php?ad=dpmly88mjyqsa7zl6x30&sid=M7300971462892978323&pub=25426&pid=25426-5a4e140z&c=0&app=unknown&br=Chrome&os=[[os]]&d=Google+Chrome&ca=DE+WiFi&a=0
Frame ID: BF3A9E5D86A282C658A32D4F046C85D1
Requests: 7 HTTP requests in this frame

Screenshot

Page Title

their very for she just some do could if by

Page URL History Show full URLs

  1. https://extractionsponge.top/T9T7llXd1myq?mkny1699887605286 Page URL
  2. https://extractionsponge.top/404/nfp.html Page URL
  3. https://ad.admo.buzz/mt/?pn=nfp Page URL
  4. https://prize.youarelucky.click/?utm_medium=c7069e939b860228ac9c4f5b0798b92843c0aa3c&utm_campaign=nfpf&4=22 Page URL
  5. https://prize.youarelucky.click/proc.php?7ff3c1a9c263838873ac5a01982ce8397876b9e0 Page URL
  6. https://v7183.qozf.sbs/go.php?ad=dpmly88mjyqsa7zl6x30&sid=M7300971462892978323&pub=25426&pid=25426-... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Page Statistics

7
Requests

86 %
HTTPS

50 %
IPv6

5
Domains

5
Subdomains

5
IPs

2
Countries

161 kB
Transfer

166 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://extractionsponge.top/T9T7llXd1myq?mkny1699887605286 Page URL
  2. https://extractionsponge.top/404/nfp.html Page URL
  3. https://ad.admo.buzz/mt/?pn=nfp Page URL
  4. https://prize.youarelucky.click/?utm_medium=c7069e939b860228ac9c4f5b0798b92843c0aa3c&utm_campaign=nfpf&4=22 Page URL
  5. https://prize.youarelucky.click/proc.php?7ff3c1a9c263838873ac5a01982ce8397876b9e0 Page URL
  6. https://v7183.qozf.sbs/go.php?ad=dpmly88mjyqsa7zl6x30&sid=M7300971462892978323&pub=25426&pid=25426-5a4e140z&c=0&app=unknown&br=Chrome&os=[[os]]&d=Google+Chrome&ca=DE+WiFi&a=0 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
T9T7llXd1myq
extractionsponge.top/
1 KB
1 KB
Document
General
Full URL
https://extractionsponge.top/T9T7llXd1myq?mkny1699887605286
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::6815:cc5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.123 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

access-control-allow-headers
X-Requested-With,X_Requested_With,X-PINGOTHER,Content-Type
access-control-allow-methods
POST,GET,OPTIONS
access-control-allow-origin
*
alt-svc
h3=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
82581983ad98818c-IAD
content-encoding
br
content-type
text/html; charset=UTF-8
date
Mon, 13 Nov 2023 15:38:04 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=84N33KKEItIJ1J2CvCrUYIpoypNbzq6oQc7mpOsxU4LVQOgI%2Fozen0yQ3JPWoCIFNAp8CbiTrjGUCUHQGQFVXcJwe2jeyvdSrz9WVY4vDsEPQg4H2rHQpYJYcu2Jcb%2BjRoO5PBo6VUkkNZq3b4j0mdKHFA%3D%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding
nfp.html
extractionsponge.top/404/
836 B
756 B
Document
General
Full URL
https://extractionsponge.top/404/nfp.html
Requested by
Host: extractionsponge.top
URL: https://extractionsponge.top/T9T7llXd1myq?mkny1699887605286
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::6815:cc5 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.123 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

alt-svc
h3=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
825819857fcf818c-IAD
content-encoding
br
content-type
text/html
date
Mon, 13 Nov 2023 15:38:05 GMT
last-modified
Sat, 21 Oct 2023 05:35:06 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=7G8EFFYFr%2FtiWtP1Gn0ZoUzA%2BGs%2FjIDlzGlLJ%2FtsNq1ctMZfWpiGp6FgvT7%2F1QCr4PuYzdLwmJlYu0HBbgDkIVtUtqhwxpJDYgspqjjPwE6ftQXzKyTqbyd20H%2BBWqWuHCtBckXNPJvjUPlCsgUwrZ6KOA%3D%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
hm.js
hm.baidu.com/
0
0

/
ad.admo.buzz/mt/
179 B
607 B
Document
General
Full URL
https://ad.admo.buzz/mt/?pn=nfp
Requested by
Host: extractionsponge.top
URL: https://extractionsponge.top/404/nfp.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a06:98c1:3120::3 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

Referer
https://extractionsponge.top/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.123 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

alt-svc
h3=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
825819880bc937e4-FRA
content-encoding
br
content-type
text/html; charset=UTF-8
date
Mon, 13 Nov 2023 15:38:05 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=wd7xGehEQhsr4HvYCGXPrKrOD3E6kyhgHzkrY9QJjzMazKDKhApNOTGkGiBIJisP0E%2FqmAvAOLh3i4abDlxM7HBdY%2BMotEuGiHojzosSTWVpzr4NI%2BwiVH5Ro7RN7qHtTSWovpqcyudzwyY%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding
/
prize.youarelucky.click/
8 KB
3 KB
Document
General
Full URL
https://prize.youarelucky.click/?utm_medium=c7069e939b860228ac9c4f5b0798b92843c0aa3c&utm_campaign=nfpf&4=22
Requested by
Host: ad.admo.buzz
URL: https://ad.admo.buzz/mt/?pn=nfp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
108.178.23.114 , United States, ASN32475 (SINGLEHOP-LLC, US),
Reverse DNS
server04.com-2.mobi
Software
nginx / PHP/8.2.12
Resource Hash
527a39049ccfe331feed32363275c83270b5ead7e1931bf6cf764b19dcbb77b6

Request headers

Referer
https://ad.admo.buzz/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.123 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

accept-ch
Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version
cache-control
no-store, no-cache, must-revalidate, max-age=0
content-encoding
gzip
content-type
text/html; charset=utf-8
date
Mon, 13 Nov 2023 15:38:05 GMT
expires
Thu, 01 Jan 1970 00:00:00 GMT
pragma
no-cache
server
nginx
vary
Accept-Encoding
x-powered-by
PHP/8.2.12
proc.php
prize.youarelucky.click/
1 KB
1 KB
Document
General
Full URL
https://prize.youarelucky.click/proc.php?7ff3c1a9c263838873ac5a01982ce8397876b9e0
Requested by
Host: prize.youarelucky.click
URL: https://prize.youarelucky.click/?utm_medium=c7069e939b860228ac9c4f5b0798b92843c0aa3c&utm_campaign=nfpf&4=22
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
108.178.23.114 , United States, ASN32475 (SINGLEHOP-LLC, US),
Reverse DNS
server04.com-2.mobi
Software
nginx / PHP/8.2.12
Resource Hash

Request headers

Referer
https://prize.youarelucky.click/?utm_medium=c7069e939b860228ac9c4f5b0798b92843c0aa3c&utm_campaign=nfpf&4=22
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.123 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

accept-ch
Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version
cache-control
no-store, no-cache, must-revalidate, max-age=0
content-encoding
gzip
content-type
text/html; charset=UTF-8
date
Mon, 13 Nov 2023 15:38:06 GMT
expires
Thu, 01 Jan 1970 00:00:00 GMT
location
https://v7183.qozf.sbs/go.php?ad=dpmly88mjyqsa7zl6x30&sid=M7300971462892978323&pub=25426&pid=25426-5a4e140z&c=0&app=unknown&br=Chrome&os=[[os]]&d=Google+Chrome&ca=DE+WiFi&a=0
pragma
no-cache
server
nginx
vary
Accept-Encoding
x-powered-by
PHP/8.2.12
Primary Request go.php
v7183.qozf.sbs/
154 KB
154 KB
Document
General
Full URL
https://v7183.qozf.sbs/go.php?ad=dpmly88mjyqsa7zl6x30&sid=M7300971462892978323&pub=25426&pid=25426-5a4e140z&c=0&app=unknown&br=Chrome&os=[[os]]&d=Google+Chrome&ca=DE+WiFi&a=0
Requested by
Host: prize.youarelucky.click
URL: https://prize.youarelucky.click/proc.php?7ff3c1a9c263838873ac5a01982ce8397876b9e0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, CHACHA20_POLY1305
Server
162.55.4.52 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.52.4.55.162.clients.your-server.de
Software
nginx/1.24.0 /
Resource Hash
631623baba3152fd4b3a0a29642df75ce5f63091a0bff6dff0961ce4c9692826
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://prize.youarelucky.click/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.123 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Connection
keep-alive
Content-Type
text/html; charset=UTF-8
Date
Mon, 13 Nov 2023 15:38:06 GMT
Server
nginx/1.24.0
Strict-Transport-Security
max-age=31536000
Transfer-Encoding
chunked

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
hm.baidu.com
URL
https://hm.baidu.com/hm.js?e6d5c1513b650adee00ba52513a6c25c

Verdicts & Comments Add Verdict or Comment

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| documentPictureInPicture

0 Cookies