See: https://urlscan.io/result/b4490a36-b9ec-4e0d-8e51-acbcc6143105/
Rescan: https://urlscan.io/result/1d3935a8-5a82-4842-a51c-5b230bc1dc56
redirecting to: -https://play.leadzuaf.com/red/?code=2KKE0ZC39KLK&a=6797840723048661510&pubid=1163
web sniffer results: 6 1124 font (cache) 20:30:18(207ms) 200 GET fonts.gstatic.com
/s/roboto/v20/KFOlCnqEu92Fr1MmEU9fBBc4.woff2
6 15
6 1123 font (cache) 20:30:18(198ms) 200 GET -fonts.gstatic.com
/s/roboto/v20/KFOmCnqEu92Fr1Mu4mxK.woff2
6 15
6 1122 font (cache) 20:30:18(178ms) 200 GET -fonts.gstatic.com
/s/roboto/v20/KFOlCnqEu92Fr1MmSU5fBBc4.woff2
6 15
6 1121 image 20:30:18(240ms) 200 GET -g2agiftcard.com
/favicon.ico
3 12
6 1120 stylesheet (cache) 20:30:18(65ms) 200 GET -fonts.googleapis.com
/css
1 5 15
6 1114 main_frame 20:30:17(562ms) 200 GET -g2agiftcard.com
/
4 11
After redirecct I get: 9 1858 main_frame 20:35:42(379ms) net::ERR_CONNECTION_RESET GET -play.leadzuaf.com
/red/ ad malware - Play.leadzuaf.com is an advertising service that website publishers use to generate revenue on their sites. Unfortunately, there are some adware programs that are injecting these ads on websites you visit without the permission of the publisher in order to generate revenue.
See: https://aw-snap.info/file-viewer/?protocol=not-secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=ZzJ8Z1tmdF58fSMuXl1t~enc & https://privacyscore.org/site/157215/ EnCWeb issues!
The brand “-g2agiftcard” has not been identified as a major victim of phishing by ISITPHISHING.
The phishing emails targeting “g2agiftcard” are detected by a generic and predictive algorithm that does not identify the brand
polonus