lucky-winners.github.io
Open in
urlscan Pro
185.199.111.153
Malicious Activity!
Public Scan
Submission: On July 20 via api from US
Summary
TLS certificate: Issued by DigiCert SHA2 High Assurance Server CA on May 6th 2020. Valid for: 2 years.
This is the only time lucky-winners.github.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Crypto (Crypto Exchange)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 185.199.111.153 185.199.111.153 | 54113 (FASTLY) (FASTLY) | |
1 | 2a0b:4d07:101::1 2a0b:4d07:101::1 | 44239 (PROINITY ...) (PROINITY PROINITY) | |
1 | 2606:4700:10:... 2606:4700:10::6816:186d | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 66.29.141.36 66.29.141.36 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
4 | 5 |
ASN54113 (FASTLY, US)
PTR: cdn-185-199-111-153.github.com
lucky-winners.github.io |
ASN44239 (PROINITY PROINITY, CH)
mk0boxminingmedysvof.kinstacdn.com |
ASN22612 (NAMECHEAP-NET, US)
PTR: server310-4.web-hosting.com
emflow.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
github.io
1 redirects
lucky-winners.github.io |
2 MB |
1 |
emflow.org
emflow.org |
35 KB |
1 |
luno.com
www.luno.com |
6 KB |
1 |
kinstacdn.com
mk0boxminingmedysvof.kinstacdn.com |
41 KB |
4 | 4 |
Domain | Requested by | |
---|---|---|
2 | lucky-winners.github.io | 1 redirects |
1 | emflow.org |
lucky-winners.github.io
|
1 | www.luno.com |
lucky-winners.github.io
|
1 | mk0boxminingmedysvof.kinstacdn.com |
lucky-winners.github.io
|
4 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.github.com DigiCert SHA2 High Assurance Server CA |
2020-05-06 - 2022-04-14 |
2 years | crt.sh |
*.kinstacdn.com Sectigo RSA Domain Validation Secure Server CA |
2021-02-08 - 2022-03-10 |
a year | crt.sh |
luno.com Cloudflare Inc ECC CA-3 |
2021-06-10 - 2022-06-09 |
a year | crt.sh |
emflow.org Sectigo RSA Domain Validation Secure Server CA |
2021-07-17 - 2022-07-17 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://lucky-winners.github.io/btc/
Frame ID: FC8E3EB3D6B8B153C54BFE726A3EAEBD
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://lucky-winners.github.io/btc
HTTP 301
https://lucky-winners.github.io/btc/ Page URL
Detected technologies
Ruby (Programming Languages) ExpandDetected patterns
- url /^https?:\/\/[^/]+\.github\.io\//i
- headers server /^GitHub\.com$/i
Varnish (Cache Tools) Expand
Detected patterns
- headers via /varnish(?: \(Varnish\/([\d.]+)\))?/i
Ruby on Rails (Web Frameworks) Expand
Detected patterns
- url /^https?:\/\/[^/]+\.github\.io\//i
- headers server /^GitHub\.com$/i
GitHub Pages (CDN) Expand
Detected patterns
- url /^https?:\/\/[^/]+\.github\.io\//i
- headers server /^GitHub\.com$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://lucky-winners.github.io/btc
HTTP 301
https://lucky-winners.github.io/btc/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
lucky-winners.github.io/btc/ Redirect Chain
|
2 MB 2 MB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
CZ-Binance-interview.jpg
mk0boxminingmedysvof.kinstacdn.com/wp-content/uploads/2020/08/ |
41 KB 41 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
796 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
39 KB 39 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
qr_code_png
www.luno.com/share/ |
510 B 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
645 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
193 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
emflow.org/btc/content/ |
125 KB 35 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Crypto (Crypto Exchange)23 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| ClipboardJS function| $ function| jQuery object| btns object| clipboard function| randomString number| divCounter function| randomInteger function| genDiv function| setProgress number| ctd object| waiting0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31556952 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
emflow.org
lucky-winners.github.io
mk0boxminingmedysvof.kinstacdn.com
www.luno.com
185.199.111.153
2606:4700:10::6816:186d
2a0b:4d07:101::1
66.29.141.36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