Submitted URL: https://medy.life/scam
Effective URL: https://direction-activation.duckdns.org/
Submission: On April 21 via manual from LU

Summary

This website contacted 4 IPs in 3 countries across 4 domains to perform 5 HTTP transactions. The main IP is 185.154.53.254, located in Russian Federation and belongs to EUROBYTE Eurobyte LLC, Moscow, Russia, RU. The main domain is direction-activation.duckdns.org.
TLS certificate: Issued by R3 on April 18th 2021. Valid for: 3 months.
This is the only time direction-activation.duckdns.org was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 3 23.227.186.26 54540 (INCERO-HVVC)
1 185.154.53.254 210079 (EUROBYTE ...)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
5 4
Domain Requested by
3 medy.life 1 redirects medy.life
1 fonts.gstatic.com fonts.googleapis.com
1 fonts.googleapis.com direction-activation.duckdns.org
1 direction-activation.duckdns.org
5 4

This site contains no links.

Subject Issuer Validity Valid
*.medy.life
R3
2021-04-08 -
2021-07-07
3 months crt.sh
direction-activation.duckdns.org
R3
2021-04-18 -
2021-07-17
3 months crt.sh
upload.video.google.com
GTS CA 1O1
2021-03-23 -
2021-06-15
3 months crt.sh
*.gstatic.com
GTS CA 1O1
2021-03-23 -
2021-06-15
3 months crt.sh

This page contains 1 frames:

Primary Page: https://direction-activation.duckdns.org/
Frame ID: 027F7F4F9A94547C3184618D45700037
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://medy.life/scam HTTP 301
    https://medy.life/scam/ Page URL
  2. https://direction-activation.duckdns.org/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^LiteSpeed$/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Page Statistics

5
Requests

100 %
HTTPS

50 %
IPv6

4
Domains

4
Subdomains

4
IPs

3
Countries

128 kB
Transfer

130 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://medy.life/scam HTTP 301
    https://medy.life/scam/ Page URL
  2. https://direction-activation.duckdns.org/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • https://medy.life/scam HTTP 301
  • https://medy.life/scam/

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
medy.life/scam/
Redirect Chain
  • https://medy.life/scam
  • https://medy.life/scam/
594 B
350 B
Document
General
Full URL
https://medy.life/scam/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
23.227.186.26 , United States, ASN54540 (INCERO-HVVC, US),
Reverse DNS
orange.whitelabelwebserver.com
Software
LiteSpeed /
Resource Hash
6af6a4f865bd14680d39302ae736729db88b675b1dc50bc1f7bcf2695e6814cd

Request headers

:method
GET
:authority
medy.life
:scheme
https
:path
/scam/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

content-type
text/html
last-modified
Sun, 18 Apr 2021 14:15:21 GMT
accept-ranges
bytes
content-encoding
br
vary
Accept-Encoding
content-length
253
date
Wed, 21 Apr 2021 09:23:30 GMT
server
LiteSpeed

Redirect headers

content-type
text/html
content-length
707
date
Wed, 21 Apr 2021 09:23:29 GMT
server
LiteSpeed
location
https://medy.life/scam/
alt-svc
quic=":443"; ma=2592000; v="43,46", h3-Q043=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-25=":443"; ma=2592000, h3-27=":443"; ma=2592000
fx.gif
medy.life/scam/
79 KB
79 KB
Image
General
Full URL
https://medy.life/scam/fx.gif
Requested by
Host: medy.life
URL: https://medy.life/scam/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
23.227.186.26 , United States, ASN54540 (INCERO-HVVC, US),
Reverse DNS
orange.whitelabelwebserver.com
Software
LiteSpeed /
Resource Hash
f382e83867a5108a4bf0b81f2e3459e40c80c448bd4d8f53e793d338ecc111cb

Request headers

:path
/scam/fx.gif
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
medy.life
referer
https://medy.life/scam/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://medy.life/scam/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 21 Apr 2021 09:23:30 GMT
last-modified
Fri, 27 Jul 2018 01:24:28 GMT
server
LiteSpeed
content-type
image/gif
cache-control
public, max-age=604800
accept-ranges
bytes
content-length
81063
expires
Wed, 28 Apr 2021 09:23:30 GMT
Primary Request /
direction-activation.duckdns.org/
1 KB
1 KB
Document
General
Full URL
https://direction-activation.duckdns.org/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
185.154.53.254 , Russian Federation, ASN210079 (EUROBYTE Eurobyte LLC, Moscow, Russia, RU),
Reverse DNS
vm446083.eurodir.ru
Software
nginx/1.18.0 /
Resource Hash
566d7223aabeec93a8e74e1747563f5de6a7ee30292d00d3950c1f6c6f6770c1

Request headers

Host
direction-activation.duckdns.org
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
document
Referer
https://medy.life/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://medy.life/

Response headers

Server
nginx/1.18.0
Date
Wed, 21 Apr 2021 09:23:34 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
keep-alive
css
fonts.googleapis.com/
3 KB
638 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Raleway:100,600
Requested by
Host: direction-activation.duckdns.org
URL: https://direction-activation.duckdns.org/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:812::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
e5d897fdfaf5bedcf10a4478849211f8a480adcd6e151da038f8696d34bd238f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://direction-activation.duckdns.org/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Wed, 21 Apr 2021 08:32:58 GMT
server
ESF
date
Wed, 21 Apr 2021 09:23:34 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Wed, 21 Apr 2021 09:23:34 GMT
1Ptug8zYS_SKggPNyC0ITw.woff2
fonts.gstatic.com/s/raleway/v19/
46 KB
46 KB
Font
General
Full URL
https://fonts.gstatic.com/s/raleway/v19/1Ptug8zYS_SKggPNyC0ITw.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Raleway:100,600
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:803::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1824e38c8fe9b23fb54ed5deafd63f31fcceed673d89111bebc8f05d1aa7b126
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://direction-activation.duckdns.org
Referer
https://fonts.googleapis.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Thu, 15 Apr 2021 10:38:22 GMT
x-content-type-options
nosniff
last-modified
Thu, 28 Jan 2021 22:37:32 GMT
server
sffe
age
513912
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
47272
x-xss-protection
0
expires
Fri, 15 Apr 2022 10:38:22 GMT

Verdicts & Comments Add Verdict or Comment

11 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated

0 Cookies