ffdytjhmbb.tk
Open in
urlscan Pro
37.72.168.245
Malicious Activity!
Public Scan
Submission: On February 05 via api from CA
Summary
This is the only time ffdytjhmbb.tk was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DHL (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 37.72.168.245 37.72.168.245 | 35017 (SWIFTWAY-...) (SWIFTWAY-AS Netherlands) | |
11 | 2 |
ASN35017 (SWIFTWAY-AS Netherlands, GB)
PTR: 245.168.72.37.static.swiftway.net
ffdytjhmbb.tk |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
ffdytjhmbb.tk
ffdytjhmbb.tk |
348 KB |
0 |
whatsmyip.us
Failed
www.whatsmyip.us Failed |
|
11 | 2 |
Domain | Requested by | |
---|---|---|
10 | ffdytjhmbb.tk |
ffdytjhmbb.tk
|
0 | www.whatsmyip.us Failed |
ffdytjhmbb.tk
|
11 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.whatsmyip.us |
globalbuyersonline.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://ffdytjhmbb.tk/megaload/TEJ3dI/
Frame ID: 770492149C5C3FCF60D93B7EFC647909
Requests: 11 HTTP requests in this frame
Screenshot
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
CloudFlare (CDN) Expand
Detected patterns
- env /^CloudFlare$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: IP
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
ffdytjhmbb.tk/megaload/TEJ3dI/ |
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
facebox.css
ffdytjhmbb.tk/megaload/TEJ3dI/javascript/facebox/src/ |
1 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.6.2.min.js
ffdytjhmbb.tk/megaload/TEJ3dI/javascript/ |
89 KB 90 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
facebox.js
ffdytjhmbb.tk/megaload/TEJ3dI/javascript/facebox/src/ |
9 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.watermark.js
ffdytjhmbb.tk/megaload/TEJ3dI/javascript/watermark/ |
19 KB 19 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
javascript1.js
ffdytjhmbb.tk/megaload/TEJ3dI/javascript/ |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
showipsimple.php
www.whatsmyip.us/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dhl.jpg
ffdytjhmbb.tk/megaload/TEJ3dI/img/ |
2 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
static-logo.jpg
ffdytjhmbb.tk/megaload/TEJ3dI/img/ |
27 KB 27 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cloudflare.min.js
ffdytjhmbb.tk/ajax.cloudflare.com/cdn-cgi/nexp/dok3v%3d919620257c/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dhl%20bg.jpg
ffdytjhmbb.tk/megaload/TEJ3dI/img/ |
189 KB 189 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.whatsmyip.us
- URL
- http://www.whatsmyip.us/showipsimple.php
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DHL (Transportation)28 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask object| CloudFlare function| $ function| jQuery object| jQuery16202909840175119234 function| script function| click_to_download function| make_the_delay function| redirect_the function| now_download function| MM_reloadPage function| updateclock function| WorldClock number| zone boolean| isitlocal string| ampm object| now number| ofst number| secs number| sec number| mins number| min number| hr number| hrs string| statusampm string| hr20 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ffdytjhmbb.tk
www.whatsmyip.us
www.whatsmyip.us
37.72.168.245
016f9cfa001792db7ad2be1e1ea1424cea09f108f68e7efb1caf4c5e65ac1335
0395076fb9954f3b49953bd564c8eb72de592a50fc89129fc97228a7fb5c75a4
4fd220434d37eda069ab40a66a6242d586cb3ff5424070dc30c8699d20c3dc44
9a2a983c9ea36e030b6ee8f7f08a2d966fed84f445af2710fcc49dd98b37e832
be130dcaea2b5c13d9126ecca918f78dec5b7db72b23306f8ccda3849beba2fd
d16d07a0353405fcec95f7efc50a2621bc7425f9a5e8895078396fb0dc460c4f
f1623225d55c29bd8661b2329e207d51286142a931725c573505c0bfa5c2198a
fc1051ff8ece6493b643873b420df97c3cb5037337891450cad3051a9bba1754
fd9249bcb8bf277f4db71cbc03a12f1b39b4da133e4661e3a72be3baf5303623