Advertisement
moshsrv

https://cutt.ly/fEccSCx -->https://novo-nbnet.site/login?1

Sep 27th, 2021
785
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.39 KB | None | 0 0
  1. User agent android:
  2. Submitted URL: https://cutt.ly/fEccSCx
  3. Effective URL: https://novo-nbnet.site/login?1
  4.  
  5. 1 2606:4700:10::6816:1e8 (United States) 1 redirects
  6. ASN13335 (CLOUDFLARENET, US)
  7. cutt.ly
  8. 9 66.228.55.142 (Richardson, United States)
  9. ASN63949 (LINODE-AP Linode, LLC, US)
  10. PTR: li297-142.members.linode.com
  11. novo-nbnet.site
  12.  
  13. https://urlscan.io/result/48a26fde-eff3-4f3d-be6f-c92b8eb67798/
  14.  
  15. Submitted URL: https://cutt.ly/fEccSCx
  16. Effective URL: https://novo-nbnet.site/login?1
  17. [INFO] Date: 27/09/21 | Time: 10:50:56
  18. [INFO] ------TARGET info------
  19. [*] TARGET: https://novo-nbnet.site/?1
  20. [*] TARGET IP: 104.22.0.232
  21. [ALERT] cutt.ly has a load balancer for IPv4 with the following IPs:
  22. [*] 172.67.8.238
  23. [*] 104.22.1.232
  24. [*] 104.22.0.232
  25. [*] DNS servers: june.ns.cloudflare.com. ruben.ns.cloudflare.com.
  26. [*] TARGET server: cloudflare
  27. [*] CC: US
  28. [*] Country: United States
  29. [*] RegionCode: IL
  30. [*] RegionName: Illinois
  31. [*] City: Chicago
  32. [*] ASN: AS13335
  33. [*] BGP_PREFIX: 104.16.0.0/12
  34. [*] ISP: CLOUDFLARENET, US
  35. [INFO] SSL/HTTPS certificate detected
  36. [*] Issuer: issuer=C = US, O = DigiCert Inc, CN = RapidSSL TLS DV RSA Mixed SHA256 2020 CA-1
  37. [*] Subject: subject=CN = www.cutt.ly
  38. [INFO] Possible abuse mails are:
  39. [*] abuse@cloudflare.com
  40. [*] abuse@iq.pl
  41. [*] contact@cutt.ly
  42. [*] iq@iq.pl
  43. [INFO] NO PAC (Proxy Auto Configuration) file FOUND
  44. [ALERT] robots.txt file FOUND in http://cutt.ly/robots.txt
  45. [INFO] Checking for HTTP status codes recursively from http://cutt.ly/robots.txt
  46. [INFO] Status code Folders
  47. [INFO] Starting FUZZing in http://cutt.ly/FUzZzZzZzZz...
  48. [INFO] Status code Folders
  49. [*] 200 http://cutt.ly/index
  50. [*] 200 http://cutt.ly/images
  51. [*] 200 http://cutt.ly/download
  52. [*] 200 http://cutt.ly/2006
  53. [*] 200 http://cutt.ly/news
  54. [*] 200 http://cutt.ly/crack
  55. [*] abuse@cloudflare.com
  56. [*] abuse@iq.pl
  57. [*] contact@cutt.ly
  58. [*] iq@iq.pl
  59. [*] 200 http://cutt.ly/serial
  60. [*] 200 http://cutt.ly/warez
  61. [*] 200 http://cutt.ly/full
  62. [*] 200 http://cutt.ly/12
  63. [ALERT] Look in the source code. It may contain passwords
  64. [ALERT] Content in http://cutt.ly/ AND http://www.cutt.ly/ is different
  65. [INFO] MD5 for http://cutt.ly/ is: ad571c39e8384962c7ffa5f675dd6aa8
  66. [INFO] MD5 for http://www.cutt.ly/ is: 235b140e234e290ee1bcadeea89872ac
  67. [INFO] http://cutt.ly/ redirects to https://cutt.ly/
  68. [INFO] http://www.cutt.ly/ redirects to https://www.cutt.ly/
  69. [INFO] Links found from https://novo-nbnet.site/?1 http://104.22.0.232/:
  70. cut: invalid field range
  71. Try 'cut --help' for more information.
  72. [INFO] Shodan detected the following opened ports on 104.22.0.232:
  73. [INFO] ------VirusTotal SECTION------
  74. [INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
  75. [INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
  76. [INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
  77. [INFO] ------Alexa Rank SECTION------
  78. [INFO] Percent of Visitors Rank in Country:
  79. [INFO] Percent of Search Traffic:
  80. [INFO] Percent of Unique Visits:
  81. [INFO] Total Sites Linking In:
  82. [INFO] Useful links related to cutt.ly - 104.22.0.232:
  83. [*] https://www.virustotal.com/pt/ip-address/104.22.0.232/information/
  84. [*] https://www.hybrid-analysis.com/search?host=104.22.0.232
  85. [*] https://www.shodan.io/host/104.22.0.232
  86. [*] https://www.senderbase.org/lookup/?search_string=104.22.0.232
  87. [*] https://www.alienvault.com/open-threat-exchange/ip/104.22.0.232
  88. [*] http://pastebin.com/search?q=104.22.0.232
  89. [*] http://urlquery.net/search.php?q=104.22.0.232
  90. [*] http://www.alexa.com/siteinfo/cutt.ly
  91. [*] http://www.google.com/safebrowsing/diagnostic?site=cutt.ly
  92. [*] https://censys.io/ipv4/104.22.0.232
  93. [*] https://www.abuseipdb.com/check/104.22.0.232
  94. [*] https://urlscan.io/search/#104.22.0.232
  95. [*] https://github.com/search?q=104.22.0.232&type=Code
  96. [INFO] Useful links related to AS13335 - 104.16.0.0/12:
  97. [*] http://www.google.com/safebrowsing/diagnostic?site=AS:13335
  98. [*] https://www.senderbase.org/lookup/?search_string=104.16.0.0/12
  99. [*] http://bgp.he.net/AS13335
  100. [*] https://stat.ripe.net/AS13335
  101. [INFO] Date: 27/09/21 | Time: 10:51:26
  102. [INFO] Total time: 0 minute(s) and 30 second(s)
  103.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement