cheatingxladies.com Open in urlscan Pro
104.27.128.198  Malicious Activity! Public Scan

Submitted URL: http://www.hboobs.us/
Effective URL: https://cheatingxladies.com/ykksjqqcl?t=server240
Submission: On July 15 via manual from IN

Summary

This website contacted 6 IPs in 2 countries across 6 domains to perform 9 HTTP transactions. The main IP is 104.27.128.198, located in San Francisco, United States and belongs to CLOUDFLARENET - Cloudflare, Inc., US. The main domain is cheatingxladies.com.
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on July 10th 2018. Valid for: 6 months.
This is the only time cheatingxladies.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Scam (Online)

Domain & IP information

IP Address AS Autonomous System
2 91.234.33.58 56485 (THEHOST-AS)
1 1 195.28.183.126 15626 (ITLAS)
2 104.27.128.198 13335 (CLOUDFLAR...)
1 2400:cb00:204... 13335 (CLOUDFLAR...)
2 52.85.182.149 16509 (AMAZON-02)
1 205.185.208.52 20446 (HIGHWINDS3)
9 6
Domain Requested by
2 d3ikljl879wvvx.cloudfront.net cheatingxladies.com
2 cheatingxladies.com www.hboobs.us
cheatingxladies.com
2 www.hboobs.us www.hboobs.us
1 code.jquery.com cheatingxladies.com
1 cdnjs.cloudflare.com cheatingxladies.com
1 herodota.ru 1 redirects
9 6

This site contains no links.

Subject Issuer Validity Valid
sni227034.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-07-10 -
2019-01-16
6 months crt.sh

This page contains 1 frames:

Primary Page: https://cheatingxladies.com/ykksjqqcl?t=server240
Frame ID: E74A223B69618959764C51A1F3B71C8D
Requests: 9 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://www.hboobs.us/ Page URL
  2. http://herodota.ru/?server240&charset=windows-1251&keyword=[KEYWORD] HTTP 302
    https://cheatingxladies.com/ykksjqqcl?t=server240 Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

9
Requests

22 %
HTTPS

17 %
IPv6

6
Domains

6
Subdomains

6
IPs

2
Countries

698 kB
Transfer

804 kB
Size

4
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://www.hboobs.us/ Page URL
  2. http://herodota.ru/?server240&charset=windows-1251&keyword=[KEYWORD] HTTP 302
    https://cheatingxladies.com/ykksjqqcl?t=server240 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

9 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
www.hboobs.us/
886 B
806 B
Document
General
Full URL
http://www.hboobs.us/
Protocol
HTTP/1.1
Server
91.234.33.58 , Ukraine, ASN56485 (THEHOST-AS, UA),
Reverse DNS
voron1.freedomain.thehost.com.ua
Software
nginx/1.2.1 / PHP/5.4.45-0+deb7u7
Resource Hash
7676a2645d149f2992145dcf336c8cbddba2e06e69433bccf61c274b08026523

Request headers

Host
www.hboobs.us
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
E74A223B69618959764C51A1F3B71C8D

Response headers

Server
nginx/1.2.1
Date
Sun, 15 Jul 2018 16:11:20 GMT
Content-Type
text/html; charset=UTF-8
Content-Length
562
Connection
keep-alive
X-Powered-By
PHP/5.4.45-0+deb7u7
Vary
Accept-Encoding
Content-Encoding
gzip
cs2.js
www.hboobs.us/
303 B
533 B
Script
General
Full URL
http://www.hboobs.us/cs2.js
Requested by
Host: www.hboobs.us
URL: http://www.hboobs.us/
Protocol
HTTP/1.1
Server
91.234.33.58 , Ukraine, ASN56485 (THEHOST-AS, UA),
Reverse DNS
voron1.freedomain.thehost.com.ua
Software
nginx/1.2.1 /
Resource Hash

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
www.hboobs.us
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
*/*
Referer
http://www.hboobs.us/
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.hboobs.us/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sun, 15 Jul 2018 16:11:20 GMT
Last-Modified
Mon, 23 Apr 2018 15:20:30 GMT
Server
nginx/1.2.1
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
303
Content-Type
application/x-javascript
Primary Request ykksjqqcl
cheatingxladies.com/
Redirect Chain
  • http://herodota.ru/?server240&charset=windows-1251&keyword=[KEYWORD]
  • https://cheatingxladies.com/ykksjqqcl?t=server240
16 KB
5 KB
Document
General
Full URL
https://cheatingxladies.com/ykksjqqcl?t=server240
Requested by
Host: www.hboobs.us
URL: http://www.hboobs.us/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.27.128.198 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
d306a358b8cc22ddcfbe5fd514aad93d899443c5043a5481ff920ce08170b616
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
cheatingxladies.com
:scheme
https
:path
/ykksjqqcl?t=server240
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
http://www.hboobs.us/
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
E74A223B69618959764C51A1F3B71C8D
Referer
http://www.hboobs.us/

Response headers

status
200
date
Sun, 15 Jul 2018 16:11:21 GMT
content-type
text/html; charset=utf-8
set-cookie
__cfduid=d9e8ce916193759b16f46ebfae0703c751531671081; expires=Mon, 15-Jul-19 16:11:21 GMT; path=/; domain=.cheatingxladies.com; HttpOnly uord=8e439759df465de2ae5cda3d847a52a9; path=/; expires=Tue, 14 Jul 2020 16:11:21 GMT; max-age=63072000; HttpOnly k=SFMyNTY.g3QAAAAIbQAAABxPUFVvVUtvVkNNUnBTTXB1eXZBWGpObE5QUEtBdAAAAAFkAAVhZmZpZGIAAJKgbQAAAARhdW5xbQAAABV7IjE1NTMiOiJCcGdWTk1KVkRLIn1tAAAAA2hpZG0AAAAcT1BVb1VLb1ZDTVJwU01wdXl2QVhqTmxOUFBLQW0AAAACcmR0AAAABGQACl9fc3RydWN0X19kABhFbGl4aXIuVGRleC5Sb3RhdGlvbkRhdGFkAA5jbGlja2VkX29mZmVyc3QAAAAAZAAIbGFuZGluZ3NsAAAAAWIAAAK5amQAC3NlZW5fb2ZmZXJzbAAAAAFiAAAcxGptAAAABXN1Yl8xZAADbmlsbQAAAAVzdWJfMmQAA25pbG0AAAAHdHJhY2tlcm0AAAAJc2VydmVyMjQwbQAAAAN1bnFtAAAAC1puaEJneGRCRWlt.GvIWGeoCPgKSc4K0UpUbWeo0c69-ZPovi3rWPvOV_qI; path=/; expires=Mon, 15 Jul 2019 16:11:21 GMT; max-age=31536000 _opl=OPUoUKoVCMRpSMpuyvAXjNlNPPKA:37536; path=/; HttpOnly
vary
Accept-Encoding
cache-control
max-age=0, private, must-revalidate
x-request-id
enh4huuv1sd68mr9oe0cnobf4vgu690u
x-xss-protection
1; mode=block
x-content-type-options
nosniff
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
43ad81229bee266c-FRA
content-encoding
gzip

Redirect headers

Server
nginx
Date
Sun, 15 Jul 2018 16:11:20 GMT
Content-Type
text/html; charset=utf-8
Content-Length
20
Connection
keep-alive
Keep-Alive
timeout=60
X-Powered-By
PHP/5.4.45-0+deb7u8
Expires
Thu, 21 Jul 1977 07:30:00 GMT
Cache-Control
max-age=0
Pragma
no-cache
Set-Cookie
7de65=%7B%22streams%22%3A%7B%22753%22%3A1531660282%7D%2C%22campaigns%22%3A%7B%2282%22%3A1531660282%7D%2C%22time%22%3A1531660282%7D; expires=Wed, 15-Aug-2018 16:11:20 GMT; path=/; domain=.herodota.ru
Last-Modified
Sun, 15 Jul 2018 16:11:20 GMT
Location
https://cheatingxladies.com/ykksjqqcl?t=server240
Vary
Accept-Encoding
Content-Encoding
gzip
animate.min.css
cdnjs.cloudflare.com/ajax/libs/animate.css/3.5.2/
52 KB
4 KB
Stylesheet
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/animate.css/3.5.2/animate.min.css
Requested by
Host: cheatingxladies.com
URL: https://cheatingxladies.com/ykksjqqcl?t=server240
Protocol
SPDY
Server
2400:cb00:2048:1::6813:c397 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8fe3fa119255adb5e0c12479331f9e092e85bcff56ab6ecc0510bfa2056b898d
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains

Request headers

Referer
https://cheatingxladies.com/ykksjqqcl?t=server240
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Sun, 15 Jul 2018 16:11:21 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
status
200
served-in-seconds
0.002
last-modified
Thu, 17 May 2018 09:15:38 GMT
server
cloudflare
etag
W/"5afd483a-ce35"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15780000; includeSubDomains
content-type
text/css
access-control-allow-origin
*
cache-control
public, max-age=30672000
cf-ray
43ad81253c9b2342-FRA
expires
Fri, 05 Jul 2019 16:11:21 GMT
123.png
d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/images/
535 KB
535 KB
Image
General
Full URL
https://d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/images/123.png
Requested by
Host: cheatingxladies.com
URL: https://cheatingxladies.com/ykksjqqcl?t=server240
Protocol
HTTP/1.1
Server
52.85.182.149 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-182-149.fra50.r.cloudfront.net
Software
nginx /
Resource Hash
759ba3df0d4b8c260131cb6eb6f4b9c2c4852ace5d507d1d219c6a98740b644c

Request headers

Referer
https://cheatingxladies.com/ykksjqqcl?t=server240
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Mon, 25 Jun 2018 14:52:56 GMT
Via
1.1 4446e317b7b7532307c7755d43835bff.cloudfront.net (CloudFront)
Last-Modified
Mon, 25 Jun 2018 10:30:42 GMT
Server
nginx
Age
4092
ETag
"5b30c452-85a68"
X-Cache
Hit from cloudfront
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
547432
X-Amz-Cf-Id
PQ8tTCRN33k_0KEQDwMfInbOzO3fxH1QDolbzgzPVNji6p2kqrVEmQ==
jquery-2.2.4.min.js
code.jquery.com/
84 KB
34 KB
Script
General
Full URL
https://code.jquery.com/jquery-2.2.4.min.js
Requested by
Host: cheatingxladies.com
URL: https://cheatingxladies.com/ykksjqqcl?t=server240
Protocol
HTTP/1.1
Server
205.185.208.52 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
vip052.ssl.hwcdn.net
Software
nginx /
Resource Hash
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cheatingxladies.com/ykksjqqcl?t=server240
Origin
https://cheatingxladies.com

Response headers

Date
Sun, 15 Jul 2018 16:11:21 GMT
Content-Encoding
gzip
Last-Modified
Fri, 20 May 2016 17:24:41 GMT
Server
nginx
ETag
"573f4859-14e4a"
Vary
Accept-Encoding
X-HW
1531671081.dop003.fr8.t,1531671081.cds014.fr8.shn,1531671081.cds014.fr8.c
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
34834
prm.js
cheatingxladies.com/
0
174 B
Script
General
Full URL
https://cheatingxladies.com/prm.js?mh=T1BVb1VLb1ZDTVJwU01wdXl2QVhqTmxOUFBLQS04MTM3&a=37536
Requested by
Host: cheatingxladies.com
URL: https://cheatingxladies.com/ykksjqqcl?t=server240
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.27.128.198 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:path
/prm.js?mh=T1BVb1VLb1ZDTVJwU01wdXl2QVhqTmxOUFBLQS04MTM3&a=37536
pragma
no-cache
cookie
__cfduid=d9e8ce916193759b16f46ebfae0703c751531671081; uord=8e439759df465de2ae5cda3d847a52a9; k=SFMyNTY.g3QAAAAIbQAAABxPUFVvVUtvVkNNUnBTTXB1eXZBWGpObE5QUEtBdAAAAAFkAAVhZmZpZGIAAJKgbQAAAARhdW5xbQAAABV7IjE1NTMiOiJCcGdWTk1KVkRLIn1tAAAAA2hpZG0AAAAcT1BVb1VLb1ZDTVJwU01wdXl2QVhqTmxOUFBLQW0AAAACcmR0AAAABGQACl9fc3RydWN0X19kABhFbGl4aXIuVGRleC5Sb3RhdGlvbkRhdGFkAA5jbGlja2VkX29mZmVyc3QAAAAAZAAIbGFuZGluZ3NsAAAAAWIAAAK5amQAC3NlZW5fb2ZmZXJzbAAAAAFiAAAcxGptAAAABXN1Yl8xZAADbmlsbQAAAAVzdWJfMmQAA25pbG0AAAAHdHJhY2tlcm0AAAAJc2VydmVyMjQwbQAAAAN1bnFtAAAAC1puaEJneGRCRWlt.GvIWGeoCPgKSc4K0UpUbWeo0c69-ZPovi3rWPvOV_qI; _opl=OPUoUKoVCMRpSMpuyvAXjNlNPPKA:37536
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
cheatingxladies.com
referer
https://cheatingxladies.com/ykksjqqcl?t=server240
:scheme
https
:method
GET
Referer
https://cheatingxladies.com/ykksjqqcl?t=server240
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Sun, 15 Jul 2018 16:11:22 GMT
x-content-type-options
nosniff
cf-cache-status
MISS
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
status
200
cache-control
public, max-age=14400
cf-ray
43ad81252d39266c-FRA
content-length
0
x-xss-protection
1; mode=block
x-request-id
s642hgppprt61stut3926gpqp5ucqm9p
expires
Sun, 15 Jul 2018 20:11:22 GMT
bg.jpg
d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/images/
117 KB
117 KB
Image
General
Full URL
https://d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/images/bg.jpg
Requested by
Host: cheatingxladies.com
URL: https://cheatingxladies.com/ykksjqqcl?t=server240
Protocol
HTTP/1.1
Server
52.85.182.149 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-182-149.fra50.r.cloudfront.net
Software
nginx /
Resource Hash
1c7361fcec43aecb4c517914dde9ecbf1fe1aaa0969411a7a383391236f335f4

Request headers

Referer
https://cheatingxladies.com/ykksjqqcl?t=server240
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Mon, 25 Jun 2018 18:46:08 GMT
Via
1.1 c76a5a41a8483a9e5dcccdfeb87a16ca.cloudfront.net (CloudFront)
Last-Modified
Mon, 25 Jun 2018 10:30:42 GMT
Server
nginx
Age
76826
ETag
"5b30c452-1d3ca"
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
119754
X-Amz-Cf-Id
A3_QLMDjgGwsI_CVyQt8WrnVBHc_EJzR-IiLs5P8Sxo_NhnRJ4N1iw==
Lato-Regular.ttf
d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/fonts/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
d3ikljl879wvvx.cloudfront.net
URL
https://d3ikljl879wvvx.cloudfront.net/assets/a839d8605434e7a7e3dcac0469d935a7/fonts/Lato-Regular.ttf

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Scam (Online)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| $ function| jQuery string| u

4 Cookies

Domain/Path Name / Value
cheatingxladies.com/ Name: _opl
Value: OPUoUKoVCMRpSMpuyvAXjNlNPPKA:37536
cheatingxladies.com/ Name: uord
Value: 8e439759df465de2ae5cda3d847a52a9
cheatingxladies.com/ Name: k
Value: SFMyNTY.g3QAAAAIbQAAABxPUFVvVUtvVkNNUnBTTXB1eXZBWGpObE5QUEtBdAAAAAFkAAVhZmZpZGIAAJKgbQAAAARhdW5xbQAAABV7IjE1NTMiOiJCcGdWTk1KVkRLIn1tAAAAA2hpZG0AAAAcT1BVb1VLb1ZDTVJwU01wdXl2QVhqTmxOUFBLQW0AAAACcmR0AAAABGQACl9fc3RydWN0X19kABhFbGl4aXIuVGRleC5Sb3RhdGlvbkRhdGFkAA5jbGlja2VkX29mZmVyc3QAAAAAZAAIbGFuZGluZ3NsAAAAAWIAAAK5amQAC3NlZW5fb2ZmZXJzbAAAAAFiAAAcxGptAAAABXN1Yl8xZAADbmlsbQAAAAVzdWJfMmQAA25pbG0AAAAHdHJhY2tlcm0AAAAJc2VydmVyMjQwbQAAAAN1bnFtAAAAC1puaEJneGRCRWlt.GvIWGeoCPgKSc4K0UpUbWeo0c69-ZPovi3rWPvOV_qI
.cheatingxladies.com/ Name: __cfduid
Value: d9e8ce916193759b16f46ebfae0703c751531671081