www.excessfire.shop
Open in
urlscan Pro
2606:4700:3036::6815:1060
Public Scan
Effective URL: https://www.excessfire.shop/janeb/jioat3185rlxnx/cfz9uuqhaliy_npp9l21wec072lkq1t19l47aqxysyo/pinhdqdpbaxdva-kkvtjjhtoqh1e5-z...
Submission: On April 04 via api from US — Scanned from US
Summary
TLS certificate: Issued by GTS CA 1P5 on April 2nd 2024. Valid for: 3 months.
This is the only time www.excessfire.shop was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700:303... 2606:4700:3036::6815:1060 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 172.67.167.52 172.67.167.52 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
6 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
excessfire.shop
www.excessfire.shop |
43 KB |
0 |
obfuscatorjavascript.com
Failed
ww7.obfuscatorjavascript.com Failed |
|
6 | 2 |
Domain | Requested by | |
---|---|---|
5 | www.excessfire.shop |
www.excessfire.shop
|
0 | ww7.obfuscatorjavascript.com Failed |
www.excessfire.shop
|
6 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
excessfire.shop GTS CA 1P5 |
2024-04-02 - 2024-07-01 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.excessfire.shop/janeb/jioat3185rlxnx/cfz9uuqhaliy_npp9l21wec072lkq1t19l47aqxysyo/pinhdqdpbaxdva-kkvtjjhtoqh1e5-zovwoygllpdiksipwa3wra9jyrbs0efz0x
Frame ID: D84943BED1DD6E3DD3883094A77F5CA4
Requests: 6 HTTP requests in this frame
Screenshot
Page Title
RedirectingPage URL History Show full URLs
-
http://www.excessfire.shop/janeb/jioat3185rlxnx/cfz9uuqhaliy_npp9l21wec072lkq1t19l47aqxysyo/pinhdqdpbax...
HTTP 307
https://www.excessfire.shop/janeb/jioat3185rlxnx/cfz9uuqhaliy_npp9l21wec072lkq1t19l47aqxysyo/pinhdqdpbax... Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.excessfire.shop/janeb/jioat3185rlxnx/cfz9uuqhaliy_npp9l21wec072lkq1t19l47aqxysyo/pinhdqdpbaxdva-kkvtjjhtoqh1e5-zovwoygllpdiksipwa3wra9jyrbs0efz0x
HTTP 307
https://www.excessfire.shop/janeb/jioat3185rlxnx/cfz9uuqhaliy_npp9l21wec072lkq1t19l47aqxysyo/pinhdqdpbaxdva-kkvtjjhtoqh1e5-zovwoygllpdiksipwa3wra9jyrbs0efz0x Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- http://api.obfuscatorjavascript.com/?getsrc=ok&ref=&url=https%3A%2F%2Fwww.excessfire.shop%2Fjaneb%2Fjioat3185rlxnx%2Fcfz9uuqhaliy_npp9l21wec072lkq1t19l47aqxysyo%2Fpinhdqdpbaxdva-kkvtjjhtoqh1e5-zovwoygllpdiksipwa3wra9jyrbs0efz0x HTTP 302
- http://ww7.obfuscatorjavascript.com/?getsrc=ok&ref=&url=https%3A%2F%2Fwww.excessfire.shop%2Fjaneb%2Fjioat3185rlxnx%2Fcfz9uuqhaliy_npp9l21wec072lkq1t19l47aqxysyo%2Fpinhdqdpbaxdva-kkvtjjhtoqh1e5-zovwoygllpdiksipwa3wra9jyrbs0efz0x&usid=15&utid=27899200235
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
pinhdqdpbaxdva-kkvtjjhtoqh1e5-zovwoygllpdiksipwa3wra9jyrbs0efz0x
www.excessfire.shop/janeb/jioat3185rlxnx/cfz9uuqhaliy_npp9l21wec072lkq1t19l47aqxysyo/ Redirect Chain
|
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
style.css
www.excessfire.shop/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery-1.11.0.min.js
www.excessfire.shop/ |
94 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
js.js
www.excessfire.shop/ |
11 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
captcha.php
www.excessfire.shop/ |
2 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
/
ww7.obfuscatorjavascript.com/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- ww7.obfuscatorjavascript.com
- URL
- http://ww7.obfuscatorjavascript.com/?getsrc=ok&ref=&url=https%3A%2F%2Fwww.excessfire.shop%2Fjaneb%2Fjioat3185rlxnx%2Fcfz9uuqhaliy_npp9l21wec072lkq1t19l47aqxysyo%2Fpinhdqdpbaxdva-kkvtjjhtoqh1e5-zovwoygllpdiksipwa3wra9jyrbs0efz0x&usid=15&utid=27899200235
Verdicts & Comments Add Verdict or Comment
10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery string| O00 object| _0x84de function| O10 function| _00O string| _escape object| I1l object| _0OI object| _0xfe971 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.excessfire.shop/ | Name: PHPSESSID Value: 8ntrhqvsboc2470cjllr6csp0l |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ww7.obfuscatorjavascript.com
www.excessfire.shop
ww7.obfuscatorjavascript.com
172.67.167.52
2606:4700:3036::6815:1060
447a0a216d8ad339a037902d639d397b27b72dd2269659a5d576fb717d0fc015
8f22bcc6015abee7fe76a0fef7e89606bbc2181ff5ba8ee723c94b521da417e4
99b3608a65149dd46773d16b518d58bdc7a94df9b094e165294318aef78190ed
b294e973896f8f874e90a8eb1a8908ac790980d034c4c4bdf0fc3d37b8abf682
c26b84d8674c69387f0cfea3046e978aad292694233af251cec1bc6b7ccca234