dinerogeek.com
Open in
urlscan Pro
2a06:98c1:3120::3
Malicious Activity!
Public Scan
Submission: On December 03 via manual from US — Scanned from NL
Summary
TLS certificate: Issued by GTS CA 1P5 on October 18th 2023. Valid for: 3 months.
This is the only time dinerogeek.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 1 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 2a06:98c1:312... 2a06:98c1:3120::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2606:4700::68... 2606:4700::6811:3b8 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
12 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
dinerogeek.com
dinerogeek.com |
87 KB |
2 |
cloudflare.com
challenges.cloudflare.com — Cisco Umbrella Rank: 5770 |
11 KB |
12 | 2 |
Domain | Requested by | |
---|---|---|
9 | dinerogeek.com |
dinerogeek.com
|
2 | challenges.cloudflare.com |
dinerogeek.com
challenges.cloudflare.com |
12 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dinerogeek.com GTS CA 1P5 |
2023-10-18 - 2024-01-16 |
3 months | crt.sh |
challenges.cloudflare.com Cloudflare Inc ECC CA-3 |
2023-08-18 - 2024-08-17 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://dinerogeek.com/g0bl0ck
Frame ID: 0435820D41682FBB873446177C346707
Requests: 12 HTTP requests in this frame
Frame:
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/a8hze/0x4AAAAAAADnPIDROrmt1Wwj/light/normal
Frame ID: 84384456C62895FBABCFE76EB5346ADB
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Just a moment...Page URL History Show full URLs
- https://dinerogeek.com/g0bl0ck Page URL
- https://dinerogeek.com/g0bl0ck Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://dinerogeek.com/g0bl0ck Page URL
- https://dinerogeek.com/g0bl0ck Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
g0bl0ck
dinerogeek.com/ |
7 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
challenges.css
dinerogeek.com/cdn-cgi/styles/ |
6 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
v1
dinerogeek.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/ |
163 KB 56 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
api.js
challenges.cloudflare.com/turnstile/v0/b/56d3063b/ |
33 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
dinerogeek.com/ |
6 KB 6 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
586 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET BLOB |
b452a5b1-6198-43e5-bdb3-51b839b89d66
https://dinerogeek.com/ |
13 B 0 |
Other
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
1460e6fe4bb109a
dinerogeek.com/cdn-cgi/challenge-platform/h/b/flow/ov1/71865729:1701644943:CcsOlcjuJQ8GWNR0Oo4e03T7dvpcQ2i1Il5oYhOUKO8/82ffaa786d290e78/ |
12 KB 10 KB |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
normal
challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/a8hze/0x4AAAAAAADnPIDROrmt1Wwj/light/ Frame 8438 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
1460e6fe4bb109a
dinerogeek.com/cdn-cgi/challenge-platform/h/b/flow/ov1/71865729:1701644943:CcsOlcjuJQ8GWNR0Oo4e03T7dvpcQ2i1Il5oYhOUKO8/82ffaa786d290e78/ |
14 B 590 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
g0bl0ck
dinerogeek.com/ |
6 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
challenges.css
dinerogeek.com/cdn-cgi/styles/ |
6 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
v1
dinerogeek.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/ |
100 KB 0 |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
page.domain
Submitted on
December 3rd 2023, 11:44:49 pm
UTC —
From United States
Threats:
Malware
Unwanted Software
Potentially Harmful Application
Comment: RUSSIAN SPYWARE: https://dinerogeek.com/g0bl0ck sent by RUSSIAN MALNET using harvested emails and MALICIOUS websites: https://docs.google.com https://www.google.com https://dinerogeek.com http://dolatiaschan.com http://dukingdraon.com http://ewhareey.com http://fodsoack.com http://groorsoa.net http://oulsools.com http://phomoach.net http://poghaurs.com https://alltopjournal.com https://chromewebstore.google.com https://dolatiaschan.com https://dukingdraon.com https://fodsoack.com
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture object| _cf_chl_opt1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
dinerogeek.com/ | Name: cf_chl_rc_m Value: 1 |
8 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
challenges.cloudflare.com
dinerogeek.com
2606:4700::6811:3b8
2a06:98c1:3120::3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