liquidgregware.com
Open in
urlscan Pro
207.55.244.7
Malicious Activity!
Public Scan
Submission: On March 01 via api from US — Scanned from FR
Summary
TLS certificate: Issued by R3 on February 28th 2024. Valid for: 3 months.
This is the only time liquidgregware.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: MVM Next (Utility)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 207.55.244.7 207.55.244.7 | 11989 (WEBINT) (WEBINT) | |
4 | 79.171.139.32 79.171.139.32 | 43928 (MVMI-AS M...) (MVMI-AS MVMI service network) | |
8 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
mvmnext.hu
belepes.mvmnext.hu |
15 KB |
1 |
liquidgregware.com
liquidgregware.com |
11 KB |
8 | 2 |
Domain | Requested by | |
---|---|---|
4 | belepes.mvmnext.hu |
liquidgregware.com
belepes.mvmnext.hu |
1 | liquidgregware.com | |
8 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
mvmfiok.mvmnext.hu |
Subject Issuer | Validity | Valid | |
---|---|---|---|
mail.liquidgregware.com R3 |
2024-02-28 - 2024-05-28 |
3 months | crt.sh |
*.mvmnext.hu e-Szigno Class3 SSL CA 2017 |
2024-01-17 - 2025-02-16 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://liquidgregware.com/flash/.well-known/acme-challenge/wash/iFitPaJXzmxzUXvornAx/user/
Frame ID: DC86FCB0A202C62563A8BBC18DFA829A
Requests: 8 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Title: Részletes információ a sütikről
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
liquidgregware.com/flash/.well-known/acme-challenge/wash/iFitPaJXzmxzUXvornAx/user/ |
10 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.min.css
belepes.mvmnext.hu//resources/l6y1w/login/mvm/dist/css/ |
49 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
forgot-password.svg
belepes.mvmnext.hu/resources/l6y1w/login/mvm/img/icon/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_white.svg
belepes.mvmnext.hu//resources/l6y1w/login/mvm/img/ |
3 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
keys.svg
belepes.mvmnext.hu//resources/l6y1w/login/mvm/img/icon/ |
5 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Panton-ExtraBold.woff2
belepes.mvmnext.hu//resources/l6y1w/login/mvm/fonts/Panton/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Panton-ExtraBold.woff
belepes.mvmnext.hu//resources/l6y1w/login/mvm/fonts/Panton/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Panton-ExtraBold.ttf
belepes.mvmnext.hu//resources/l6y1w/login/mvm/fonts/Panton/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- belepes.mvmnext.hu
- URL
- https://belepes.mvmnext.hu//resources/l6y1w/login/mvm/fonts/Panton/Panton-ExtraBold.woff2
- Domain
- belepes.mvmnext.hu
- URL
- https://belepes.mvmnext.hu//resources/l6y1w/login/mvm/fonts/Panton/Panton-ExtraBold.woff
- Domain
- belepes.mvmnext.hu
- URL
- https://belepes.mvmnext.hu//resources/l6y1w/login/mvm/fonts/Panton/Panton-ExtraBold.ttf
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: MVM Next (Utility)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
liquidgregware.com/ | Name: PHPSESSID Value: bbqu5kmlp906f9imne7f0p93c1 |
6 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
belepes.mvmnext.hu
liquidgregware.com
belepes.mvmnext.hu
207.55.244.7
79.171.139.32
428950679584381a8911ed1c184d678ce845eaded6e632893a4c1a7dba493890
6467d78bcc18f73b549223f4b140ca5e36b3e2db8b2e6345b8c075431d20e2a9
9408b74edf28db331cd822fdbd2f188451b60e610abb798d61838bcdf4dd6444
9f0885e9e7a00505f9c82da78a5ec8578202258ad8e6e8930899790f3d1f0f6d
fc90a81b7f8c21467a4c196b0b523a09f93cea13db51da2892f0fc3dbf8ac520