dating-m.xyz
Open in
urlscan Pro
2606:4700:3035::ac43:8a54
Malicious Activity!
Public Scan
Effective URL: https://dating-m.xyz/?u=eh5pte4&o=75nw7hh
Submission: On October 30 via api from DE
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on October 29th 2020. Valid for: a year.
This is the only time dating-m.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Scam (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 87.236.16.31 87.236.16.31 | 198610 (BEGET-AS) (BEGET-AS) | |
10 | 2606:4700:303... 2606:4700:3035::ac43:8a54 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:820::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2a00:1450:400... 2a00:1450:4001:815::2003 | 15169 (GOOGLE) (GOOGLE) | |
14 | 4 |
ASN198610 (BEGET-AS, RU)
PTR: ssl.sumo.beget.com
mail-d.xyz | |
jobware.xyz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
dating-m.xyz
dating-m.xyz |
325 KB |
2 |
gstatic.com
fonts.gstatic.com |
28 KB |
1 |
googleapis.com
fonts.googleapis.com |
2 KB |
1 |
jobware.xyz
1 redirects
jobware.xyz |
226 B |
1 |
mail-d.xyz
mail-d.xyz |
211 B |
14 | 5 |
Domain | Requested by | |
---|---|---|
10 | dating-m.xyz |
dating-m.xyz
|
2 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
dating-m.xyz
|
1 | jobware.xyz | 1 redirects |
1 | mail-d.xyz | |
14 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
mail-d.xyz Let's Encrypt Authority X3 |
2020-10-27 - 2021-01-25 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-10-29 - 2021-10-28 |
a year | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-10-06 - 2020-12-29 |
3 months | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-10-06 - 2020-12-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://dating-m.xyz/?u=eh5pte4&o=75nw7hh
Frame ID: 028BC389B247C54DCEB7A548AB45FE65
Requests: 14 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://mail-d.xyz/iaq/?18ut Page URL
-
https://jobware.xyz/g4
HTTP 302
https://dating-m.xyz/?u=eh5pte4&o=75nw7hh Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
animate.css (Web Frameworks) Expand
Detected patterns
- html /<link [^>]+(?:\/([\d.]+)\/)?animate\.(?:min\.)?css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://mail-d.xyz/iaq/?18ut Page URL
-
https://jobware.xyz/g4
HTTP 302
https://dating-m.xyz/?u=eh5pte4&o=75nw7hh Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
mail-d.xyz/iaq/ |
67 B 211 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
dating-m.xyz/ Redirect Chain
|
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
animate.min.css
dating-m.xyz/media/dating/toon2/css/ |
52 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
dating-m.xyz/media/dating/toon2/css/ |
8 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
js.cookie.js
dating-m.xyz/cookie/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
utils.js
dating-m.xyz/util/ |
7 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
123.jpg
dating-m.xyz/media/dating/toon2/images/ |
175 KB 167 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-2.2.4.min.js
dating-m.xyz/media/dating/toon2/js/ |
84 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bb.js
dating-m.xyz/media/ |
639 B 722 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
exit1.js
dating-m.xyz/media/exit-new/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
36 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg.jpg
dating-m.xyz/media/dating/toon2/images/ |
117 KB 107 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
S6u9w4BMUTPHh6UVSwiPGQ3q5d0.woff2
fonts.gstatic.com/s/lato/v17/ |
14 KB 14 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
S6uyw4BMUTPHjx4wXiWtFCc.woff2
fonts.gstatic.com/s/lato/v17/ |
14 KB 14 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Scam (Online)33 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes function| getBackendParams number| exDays boolean| validNavigation function| wireUpEvents function| Cookies function| docReady function| getParameterByName function| hideUnsub function| languageDetection function| writeLocation object| geoRefData function| showLocation function| appendPixels function| getCookie function| getBackendParamsByName function| addSessionId undefined| randomNumber function| $ function| jQuery boolean| PreventBb function| getUrlParameter function| getUrlWithParam boolean| PreventExitSplash string| exitsplashpage function| DisplayExitSplash function| addLoadEvent function| addClickEvent function| disablelinksfunc function| disableformsfunc2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
dating-m.xyz/ | Name: sid Value: t4~awfqsobba3htfzxxcgznn20b |
|
.dating-m.xyz/ | Name: __cfduid Value: dbe7ea210a7889635e5d0002ecd8235ed1604059946 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
dating-m.xyz
fonts.googleapis.com
fonts.gstatic.com
jobware.xyz
mail-d.xyz
2606:4700:3035::ac43:8a54
2a00:1450:4001:815::2003
2a00:1450:4001:820::200a
87.236.16.31
036d841b132c14046e26d8f2da1bc634c6ad34885ed1295660694a91c98933a6
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
1be1304c675449b1bad38ea8c3da6c1da0763ed2fad339ee1aa461c7bf4e2a68
1c7361fcec43aecb4c517914dde9ecbf1fe1aaa0969411a7a383391236f335f4
471d8279f171b44339d433bd1518a2b62c029e594983b95b4c633b16609251d8
61a77b17588859cd06968624082456e765975d9858207859e7dccb83e65013c8
6f094676c46dee819cb999b333cbf70077c5c141ae968e963e341d754e41d6fe
8fe3fa119255adb5e0c12479331f9e092e85bcff56ab6ecc0510bfa2056b898d
985659942ab60a92b3c0a7f876d9ef60e8f048ff655a622a172fa4b44f901b6c
9baad10e85c5be8d5697086479983b6b477197103bf8f0f11817b1bdfb9a7451
b28722475035fc8fdc751034c2df8f49d66eb25cf28cf031c4e7357414a131da
d7da80ad6233b7f65c2b7b599b44e2e4e16753fe14e148bba351bf5ead417d75
e2dd9e4ad69996057c54e86ed4f9d5631b39e026421663bc34209a20cc820672
f6113b1f6bdd279404fd53c920f6ba411b66a897db4c67e16d2129af22370a57