URL: https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
Submission: On May 04 via manual from US

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 8 HTTP transactions. The main IP is 185.199.111.153, located in United States and belongs to FASTLY, US. The main domain is www.exandroid.dev.
TLS certificate: Issued by R3 on March 23rd 2021. Valid for: 3 months.
This is the only time www.exandroid.dev was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 7 185.199.111.153 54113 (FASTLY)
2 2a00:1450:400... 15169 (GOOGLE)
8 2
Apex Domain
Subdomains
Transfer
7 exandroid.dev
www.exandroid.dev
150 KB
2 google-analytics.com
www.google-analytics.com
19 KB
8 2
Domain Requested by
7 www.exandroid.dev 1 redirects www.exandroid.dev
2 www.google-analytics.com www.exandroid.dev
www.google-analytics.com
8 2

This site contains links to these domains. Also see Links.

Domain
en.wikipedia.org
github.com
twitter.com
Subject Issuer Validity Valid
www.exandroid.dev
R3
2021-03-23 -
2021-06-21
3 months crt.sh
*.google-analytics.com
GTS CA 1C3
2021-04-13 -
2021-07-06
3 months crt.sh

This page contains 1 frames:

Primary Page: https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
Frame ID: 279A31159A8889E80DE176CBA3E24EBE
Requests: 8 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite HTTP 301
    https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<!-- Begin Jekyll SEO tag/i
  • meta generator /Jekyll (v[\d.]+)?/i

Overall confidence: 100%
Detected patterns
  • headers server /^GitHub\.com$/i

Overall confidence: 100%
Detected patterns
  • headers via /varnish(?: \(Varnish\/([\d.]+)\))?/i

Overall confidence: 100%
Detected patterns
  • headers server /^GitHub\.com$/i

Overall confidence: 100%
Detected patterns
  • headers server /^GitHub\.com$/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Page Statistics

8
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

169 kB
Transfer

210 kB
Size

3
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite HTTP 301
    https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

8 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
Redirect Chain
  • https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite
  • https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
14 KB
6 KB
Document
General
Full URL
https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.111.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-111-153.github.com
Software
GitHub.com /
Resource Hash
340cb70cae64f7c976b75115ca4e782f4898c876e883ece3e0ed0a0195bfa4f5

Request headers

:method
GET
:authority
www.exandroid.dev
:scheme
https
:path
/2021/04/24/phishing-with-fake-meeting-invite/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

server
GitHub.com
content-type
text/html; charset=utf-8
last-modified
Tue, 04 May 2021 10:31:44 GMT
access-control-allow-origin
*
etag
W/"60912290-3736"
expires
Tue, 04 May 2021 13:49:58 GMT
cache-control
max-age=600
content-encoding
gzip
x-proxy-cache
MISS
x-github-request-id
18FE:9168:96457:9950D:60914EAE
accept-ranges
bytes
date
Tue, 04 May 2021 13:39:58 GMT
via
1.1 varnish
age
0
x-served-by
cache-fra19157-FRA
x-cache
MISS
x-cache-hits
0
x-timer
S1620135598.232482,VS0,VE94
vary
Accept-Encoding
x-fastly-request-id
49af40544d3ca72bd66cc90ced78c8f6a02b403c
content-length
5801

Redirect headers

server
GitHub.com
content-type
text/html
location
https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
access-control-allow-origin
*
expires
Tue, 04 May 2021 13:49:58 GMT
cache-control
max-age=600
x-proxy-cache
MISS
x-github-request-id
18FE:9168:96449:99503:60914EAE
accept-ranges
bytes
date
Tue, 04 May 2021 13:39:58 GMT
via
1.1 varnish
age
0
x-served-by
cache-fra19157-FRA
x-cache
MISS
x-cache-hits
0
x-timer
S1620135598.133359,VS0,VE92
vary
Accept-Encoding
x-fastly-request-id
06a1fb6d54f120c09c4a54f2681d800bf26b83bf
content-length
162
styles.css
www.exandroid.dev/
8 KB
3 KB
Stylesheet
General
Full URL
https://www.exandroid.dev/styles.css
Requested by
Host: www.exandroid.dev
URL: https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.111.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-111-153.github.com
Software
GitHub.com /
Resource Hash
db41be6afa1a6912c539455d01d4853932fdccb7e3eb845abe3aec8b39e83ff4

Request headers

:path
/styles.css
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
www.exandroid.dev
referer
https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
f5bf62b8ae714dc68d27594fc2feac3335fe5e34
date
Tue, 04 May 2021 13:39:58 GMT
content-encoding
gzip
age
0
x-cache
MISS
content-length
2515
x-served-by
cache-fra19157-FRA
access-control-allow-origin
*
last-modified
Tue, 04 May 2021 10:31:44 GMT
server
GitHub.com
x-github-request-id
DA0C:B28A:1954BE:19DD2B:60914EAE
x-timer
S1620135598.341646,VS0,VE88
etag
W/"60912290-217c"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
via
1.1 varnish
expires
Tue, 04 May 2021 13:49:58 GMT
cache-control
max-age=600
accept-ranges
bytes
x-proxy-cache
MISS
x-cache-hits
0
create_meeting.png
www.exandroid.dev/assets/
47 KB
47 KB
Image
General
Full URL
https://www.exandroid.dev/assets/create_meeting.png
Requested by
Host: www.exandroid.dev
URL: https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.111.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-111-153.github.com
Software
GitHub.com /
Resource Hash
b5d106f5838f6dd3dc6ad2a0c89055c80e9a79694eb797a9b2f237d1e6fa3372

Request headers

:path
/assets/create_meeting.png
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.exandroid.dev
referer
https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
b241ff2e3a43dccaf0255bf20abcee9a756458ee
date
Tue, 04 May 2021 13:39:58 GMT
via
1.1 varnish
age
0
x-cache
MISS
x-cache-hits
0
content-length
48157
x-served-by
cache-fra19157-FRA
last-modified
Tue, 04 May 2021 10:31:40 GMT
server
GitHub.com
x-github-request-id
FD54:C845:178EC0:180AFF:60914AB2
x-timer
S1620135598.341736,VS0,VE85
etag
"6091228c-bc1d"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=600
accept-ranges
bytes
x-proxy-cache
MISS
expires
Tue, 04 May 2021 13:32:58 GMT
meeting_invite.png
www.exandroid.dev/assets/
48 KB
49 KB
Image
General
Full URL
https://www.exandroid.dev/assets/meeting_invite.png
Requested by
Host: www.exandroid.dev
URL: https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.111.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-111-153.github.com
Software
GitHub.com /
Resource Hash
aaf7593178f2efda76d0ad8fb04a817f29691ac2c85e5eb4fc813a8a9352e155

Request headers

:path
/assets/meeting_invite.png
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.exandroid.dev
referer
https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
d6f3bc826f40b6b689488885b874044991c2e3f2
date
Tue, 04 May 2021 13:39:58 GMT
via
1.1 varnish
age
0
x-cache
HIT
content-length
49449
x-served-by
cache-fra19157-FRA
last-modified
Tue, 04 May 2021 10:31:40 GMT
server
GitHub.com
x-github-request-id
9AF2:C844:1C68B:1D6C5:609122E6
x-timer
S1620135598.342983,VS0,VE87
etag
"6091228c-c129"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
expires
Tue, 04 May 2021 10:43:10 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
protonmail_receives_outlook_meeting_invite.png
www.exandroid.dev/assets/
10 KB
10 KB
Image
General
Full URL
https://www.exandroid.dev/assets/protonmail_receives_outlook_meeting_invite.png
Requested by
Host: www.exandroid.dev
URL: https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.111.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-111-153.github.com
Software
GitHub.com /
Resource Hash
6836bc1f13ad6f47ad14d030b5b40c18c14ecf2aece7846b3637b1ec3079f0d9

Request headers

:path
/assets/protonmail_receives_outlook_meeting_invite.png
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.exandroid.dev
referer
https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
f94ec20d2d81d737763db6b77b05f5c214eb41c1
date
Tue, 04 May 2021 13:39:58 GMT
via
1.1 varnish
age
0
x-cache
HIT
x-cache-hits
1
content-length
9861
x-served-by
cache-fra19157-FRA
last-modified
Tue, 04 May 2021 10:31:40 GMT
server
GitHub.com
x-github-request-id
E990:8A95:29995:2AFD0:60912627
x-timer
S1620135598.343016,VS0,VE87
etag
"6091228c-2685"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=600
accept-ranges
bytes
x-proxy-cache
MISS
expires
Tue, 04 May 2021 10:57:03 GMT
end_result.png
www.exandroid.dev/assets/
35 KB
36 KB
Image
General
Full URL
https://www.exandroid.dev/assets/end_result.png
Requested by
Host: www.exandroid.dev
URL: https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.111.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-111-153.github.com
Software
GitHub.com /
Resource Hash
e13e201afd848056abac66170458055aec660bfbb4dcec5cd064e4e4c3bef801

Request headers

:path
/assets/end_result.png
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.exandroid.dev
referer
https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
0a036094085206895e90ce5b36a9165121144aec
date
Tue, 04 May 2021 13:39:58 GMT
via
1.1 varnish
age
0
x-cache
HIT
x-cache-hits
1
content-length
36172
x-served-by
cache-fra19157-FRA
last-modified
Tue, 04 May 2021 10:31:40 GMT
server
GitHub.com
x-github-request-id
4EE8:DA93:3F1C1:4083A:609122E6
x-timer
S1620135598.343093,VS0,VE86
etag
"6091228c-8d4c"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=600
accept-ranges
bytes
x-proxy-cache
MISS
expires
Tue, 04 May 2021 10:43:10 GMT
analytics.js
www.google-analytics.com/
48 KB
19 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.exandroid.dev
URL: https://www.exandroid.dev/2021/04/24/phishing-with-fake-meeting-invite/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
2cb09c7b3e19bfc41743ca3624ef81c3258d56525647feac76aa757e0292627a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.exandroid.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 09 Apr 2021 23:59:54 GMT
server
Golfe2
age
7163
date
Tue, 04 May 2021 11:40:35 GMT
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=7200
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
19569
expires
Tue, 04 May 2021 13:40:35 GMT
collect
www.google-analytics.com/j/
2 B
22 B
XHR
General
Full URL
https://www.google-analytics.com/j/collect?v=1&_v=j90&a=69125386&t=pageview&_s=1&dl=https%3A%2F%2Fwww.exandroid.dev%2F2021%2F04%2F24%2Fphishing-with-fake-meeting-invite%2F&ul=en-us&de=UTF-8&dt=Phishing%20with%20fake%20meeting%20invite%20%C2%B7%20Ex%20Android%20Dev&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=IEBAAEABAAAAAC~&jid=290632699&gjid=2108009169&cid=1695247757.1620135599&tid=UA-193334062-1&_gid=1679530023.1620135599&_r=1&_slc=1&z=1756451564
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H3-29
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:808::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
a048e640908046be06e00eab37742b5d5ff80964af58cfd22f7cb2de4dfe375f
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.exandroid.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Tue, 04 May 2021 13:39:58 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
content-type
text/plain
access-control-allow-origin
https://www.exandroid.dev
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2
expires
Fri, 01 Jan 1990 00:00:00 GMT

Verdicts & Comments Add Verdict or Comment

17 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated string| GoogleAnalyticsObject function| ga object| google_tag_data object| gaplugins object| gaGlobal object| gaData

3 Cookies

Domain/Path Name / Value
.exandroid.dev/ Name: _gat
Value: 1
.exandroid.dev/ Name: _gid
Value: GA1.2.1679530023.1620135599
.exandroid.dev/ Name: _ga
Value: GA1.2.1695247757.1620135599