ghuuio66.cvcv.my.id
Open in
urlscan Pro
172.67.173.232
Malicious Activity!
Public Scan
Submission: On March 03 via api from US — Scanned from US
Summary
TLS certificate: Issued by GTS CA 1P5 on January 18th 2024. Valid for: 3 months.
This is the only time ghuuio66.cvcv.my.id was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 172.67.173.232 172.67.173.232 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 151.101.129.229 151.101.129.229 | 54113 (FASTLY) (FASTLY) | |
1 | 172.64.147.188 172.64.147.188 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
5 | 172.64.164.7 172.64.164.7 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
12 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
fontawesome.com
kit.fontawesome.com — Cisco Umbrella Rank: 1405 ka-f.fontawesome.com — Cisco Umbrella Rank: 2898 |
188 KB |
4 |
cvcv.my.id
ghuuio66.cvcv.my.id |
76 KB |
2 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 310 |
49 KB |
12 | 3 |
Domain | Requested by | |
---|---|---|
5 | ka-f.fontawesome.com |
kit.fontawesome.com
|
4 | ghuuio66.cvcv.my.id |
ghuuio66.cvcv.my.id
|
2 | cdn.jsdelivr.net |
ghuuio66.cvcv.my.id
|
1 | kit.fontawesome.com |
ghuuio66.cvcv.my.id
|
12 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cvcv.my.id GTS CA 1P5 |
2024-01-18 - 2024-04-17 |
3 months | crt.sh |
jsdelivr.net GlobalSign Atlas R3 DV TLS CA 2023 Q3 |
2023-09-27 - 2024-10-28 |
a year | crt.sh |
*.fontawesome.com DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2023-12-04 - 2025-01-03 |
a year | crt.sh |
ka-f.fontawesome.com GTS CA 1P5 |
2024-01-06 - 2024-04-05 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ghuuio66.cvcv.my.id/
Frame ID: 42088B31EEC978FD0A5E59C54C3B0D6D
Requests: 12 HTTP requests in this frame
Screenshot
Page Title
Masuk | Masuk FacebookDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- kit\.fontawesome\.com/([0-9a-z]+).js
jsDelivr (CDN) Expand
Detected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
ghuuio66.cvcv.my.id/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/css/ |
152 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fathz.css
ghuuio66.cvcv.my.id/assets/ |
8 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logofb4.jpg
ghuuio66.cvcv.my.id/assets/img/ |
37 KB 37 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fbsesi.jpg
ghuuio66.cvcv.my.id/assets/img/ |
35 KB 35 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
08380760ee.js
kit.fontawesome.com/ |
12 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.bundle.min.js
cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/js/ |
77 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free.min.css
ka-f.fontawesome.com/releases/v6.5.1/css/ |
101 KB 23 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-v4-shims.min.css
ka-f.fontawesome.com/releases/v6.5.1/css/ |
27 KB 5 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-v5-font-face.min.css
ka-f.fontawesome.com/releases/v6.5.1/css/ |
823 B 709 B |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-v4-font-face.min.css
ka-f.fontawesome.com/releases/v6.5.1/css/ |
2 KB 1 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-fa-solid-900.woff2
ka-f.fontawesome.com/releases/v6.5.1/webfonts/ |
153 KB 153 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| FontAwesomeKitConfig number| uidEvent object| bootstrap0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.jsdelivr.net
ghuuio66.cvcv.my.id
ka-f.fontawesome.com
kit.fontawesome.com
151.101.129.229
172.64.147.188
172.64.164.7
172.67.173.232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