Submitted URL: https://firkahua.tk/nbc?ui3__=Steven@wynn.com
Effective URL: https://firkahua.tk/nbc/?ui3__=Steven@wynn.com
Submission: On September 13 via manual from US

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 148.163.67.138, located in Phoenix, United States and belongs to IOFLOOD - Input Output Flood LLC, US. The main domain is firkahua.tk.
TLS certificate: Issued by cPanel, Inc. Certification Authority on August 28th 2019. Valid for: 3 months.
This is the only time firkahua.tk was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 2 148.163.67.138 53755 (IOFLOOD)
1 1
Apex Domain
Subdomains
Transfer
2 firkahua.tk
firkahua.tk
471 B
1 1
Domain Requested by
2 firkahua.tk 1 redirects
1 1

This site contains no links.

Subject Issuer Validity Valid
firkahua.tk
cPanel, Inc. Certification Authority
2019-08-28 -
2019-11-26
3 months crt.sh

This page contains 1 frames:

Primary Page: https://firkahua.tk/nbc/?ui3__=Steven@wynn.com
Frame ID: 0CF5B9F98FE1B6F25CBA9CE5C8C5A306
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.


Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
firkahua.tk/nbc/
Redirect Chain
  • https://firkahua.tk/nbc?ui3__=Steven@wynn.com
  • https://firkahua.tk/nbc/?ui3__=Steven@wynn.com
0
204 B
Document
General
Full URL
https://firkahua.tk/nbc/?ui3__=Steven@wynn.com
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
148.163.67.138 Phoenix, United States, ASN53755 (IOFLOOD - Input Output Flood LLC, US),
Reverse DNS
budget4.noc401.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Host
firkahua.tk
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
none
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

Date
Fri, 13 Sep 2019 17:20:03 GMT
Server
Apache
Vary
User-Agent
Content-Length
0
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Fri, 13 Sep 2019 17:20:01 GMT
Server
Apache
Location
https://firkahua.tk/nbc/?ui3__=Steven@wynn.com
Content-Length
254
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=iso-8859-1

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

firkahua.tk
148.163.67.138
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855