teamelon.net
Open in
urlscan Pro
194.54.88.33
Malicious Activity!
Public Scan
Effective URL: https://teamelon.net/glveaway/start
Submission Tags: https://phish.report @phish_report Search All
Submission: On December 20 via api from FI — Scanned from DE
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on December 6th 2021. Valid for: a year.
This is the only time teamelon.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Crypto (Crypto Exchange)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 21 | 194.54.88.33 194.54.88.33 | 41665 (HOSTING-A...) (HOSTING-AS hosting.ua) | |
20 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
21 |
teamelon.net
1 redirects
teamelon.net |
1 MB |
20 | 1 |
Domain | Requested by | |
---|---|---|
21 | teamelon.net |
1 redirects
teamelon.net
|
20 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
teamelon.net Sectigo RSA Domain Validation Secure Server CA |
2021-12-06 - 2022-12-06 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://teamelon.net/glveaway/start
Frame ID: 79891D124BE5A268626A47E82345F826
Requests: 25 HTTP requests in this frame
Screenshot
Page Title
Massive ELON Airdrop – MediumPage URL History Show full URLs
-
http://teamelon.net/
HTTP 301
https://teamelon.net/ Page URL
- https://teamelon.net/glveaway/start Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://teamelon.net/
HTTP 301
https://teamelon.net/ Page URL
- https://teamelon.net/glveaway/start Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://teamelon.net/ HTTP 301
- https://teamelon.net/
20 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
teamelon.net/ Redirect Chain
|
200 B 328 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
start
teamelon.net/glveaway/ |
185 KB 186 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.4.1.min.js
teamelon.net/glveaway/mdf/ |
86 KB 86 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
m2.css
teamelon.net/glveaway/mdf/ |
63 KB 63 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main-branding-base.css
teamelon.net/glveaway/mdf/ |
510 KB 511 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
FfuCMlE.png
teamelon.net/glveaway/mdf/ |
12 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1UATD6Vui-5Xa4Vb2QAOtbg_002.png
teamelon.net/glveaway/mdf/ |
242 B 242 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1_8VDWw33n-eu85f0nFTbP5g.jpeg
teamelon.net/glveaway/mdf/ |
63 KB 63 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fzSkCnJ.jpg
teamelon.net/glveaway/mdf/ |
28 KB 28 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fxEuNMj.jpg
teamelon.net/glveaway/mdf/ |
59 KB 59 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
EmRUP3S.jpg
teamelon.net/glveaway/mdf/ |
6 KB 7 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ZmO7j4s.jpg
teamelon.net/glveaway/mdf/ |
78 KB 78 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
GOV2rh7.jpg
teamelon.net/glveaway/mdf/ |
102 KB 102 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
kKTtsr7.jpg
teamelon.net/glveaway/mdf/ |
18 KB 18 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
EyAtCTu.jpg
teamelon.net/glveaway/mdf/ |
31 KB 31 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
WzzWZyq.jpg
teamelon.net/glveaway/mdf/ |
19 KB 20 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ULdp2iV.jpg
teamelon.net/glveaway/mdf/ |
15 KB 15 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fzSkCnJ(1).jpg
teamelon.net/glveaway/mdf/ |
28 KB 28 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
14 KB 14 KB |
Font
font/opentype |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fell-400-normal.woff
teamelon.net/glveaway/mdf/ |
24 KB 25 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
15 KB 15 KB |
Font
font/opentype |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
charter-700-normal.woff
teamelon.net/glveaway/mdf/ |
15 KB 15 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
14 KB 14 KB |
Font
font/opentype |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Crypto (Crypto Exchange)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
teamelon.net/ | Name: picture Value: this |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
teamelon.net
194.54.88.33
03d71e2470a7b7f26c4eeb073b600f56acee001873b872df9f72065ac6f07132
0925e8ad7bd971391a8b1e98be8e87a6971919eb5b60c196485941c3c1df089a
0bf49c44b081b5734010a8ba3fd13b7c85d9c500cb1f5451b37b7054c212b4a7
2128998b5087ea97d27333e867ea5390d83c92da20fb2b33c7175fcb9f2bfa69
2d1196c31e454364bf96cc774bfd0da0e0fca248b334e2084d5f27fbc489d12d
3c8fa56a1e536381d657140c282211e5260357f4782bb7ccac9a2ab0398fad19
4370ae6c750b86a4ed5409ac3278fc076573eb04ed16619174ef01ed15f5f724
582a04757d62c3d9ad1c9cc5d7e40787a900fd02b3aeace43d41008a7658d071
8414c30a198206c39659a3480d99d096bbc830911bae3a1ca7022d500d548c3c
88c10ff3a9d5d2d66bdf798cb9ee05091f32f5c66c606d2a56e855778be76545
8c3c5f2623afaaa4ad6af8048c6e37fa1a4ead58a7a00c5d0b680f09b6850eab
8f70c1bb63bcd03623b5c8b4cb078b9b3bdc931692522bf49967d6a57ec0a9c6
9094904b0190a6b34af2b0a911ea582746d9707d8b69dc386267bf2c66507efe
99a9df080944a29084bf6f88ccc49b1f3a0cee1aed655c640ca433871a6af398
9be52c610363e850ea03db066caa9fc9fcdbb1e06541f9a430c3499f0f799099
b5d341b9eecdadc00ffa76fb9e5a05983b31cbac7ab6450f9c768202185ead4d
be9a62a389ef14e5aa7c9c7ef9f7bec271ecce1f86aa8f0cdcc9a5e3acf7948e
d1de21730854ea4db035a81914cb0bd57aa74d715af6f89b46a2d002917ca1ed
e1dcf10c94027fc9946bc9aaa7eb98cdec4d81b9c0693e2ab2959746f1043075
e8fed51ae35ba9d9c900b99b774df79551240e4954aa5bdd2289cf32d64c1715
f9d10459c0e3e0b29ebdae9a54c33abc5b95071d43006fb6b17cbf7608036173
fa98238b98383829699b89aa8d4b2835dd6856dc85e3d7525ac22b0b12d07e69
fc5fe349128c5c34464403ff2c77de78b74f24ec0f38c7919cd3603060667531
ff4c91bf9cb91b2fb2e0344577754e3f2ade240aa8d8d8db0171901c9115feb1