infoaccount2e5c5318677b36694283548a40.xyz Open in urlscan Pro
217.8.117.8  Malicious Activity! Public Scan

URL: http://infoaccount2e5c5318677b36694283548a40.xyz/login/verify.php
Submission: On June 06 via automatic, source openphish

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 7 HTTP transactions. The main IP is 217.8.117.8, located in Russian Federation and belongs to CREXFEXPEX-LITHUANIA Autonomous System for Lithuania Clients, RU. The main domain is infoaccount2e5c5318677b36694283548a40.xyz.
This is the only time infoaccount2e5c5318677b36694283548a40.xyz was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Facebook (Social Network)

Domain & IP information

IP Address AS Autonomous System
2 217.8.117.8 60031 (CREXFEXPE...)
7 2
Domain Requested by
2 infoaccount2e5c5318677b36694283548a40.xyz infoaccount2e5c5318677b36694283548a40.xyz
0 static.xx.fbcdn.net Failed infoaccount2e5c5318677b36694283548a40.xyz
7 2

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://infoaccount2e5c5318677b36694283548a40.xyz/login/verify.php
Frame ID: 5EB24189417EC354307E98A8E5025FB9
Requests: 8 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /Ubuntu/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i

Page Statistics

7
Requests

0 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

855 kB
Transfer

1241 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request verify.php
infoaccount2e5c5318677b36694283548a40.xyz/login/
1 MB
855 KB
Document
General
Full URL
http://infoaccount2e5c5318677b36694283548a40.xyz/login/verify.php
Protocol
HTTP/1.1
Server
217.8.117.8 , Russian Federation, ASN60031 (CREXFEXPEX-LITHUANIA Autonomous System for Lithuania Clients, RU),
Reverse DNS
Software
Apache/2.4.18 (Ubuntu) /
Resource Hash
9803da673426cbc5b1b1e6e10c5b15a7ca4daaa084ffd1940df7be16f374fddd

Request headers

Host
infoaccount2e5c5318677b36694283548a40.xyz
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 06 Jun 2019 16:01:45 GMT
Server
Apache/2.4.18 (Ubuntu)
Vary
Accept-Encoding
Content-Encoding
gzip
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
pBYEwhIStl6.js
static.xx.fbcdn.net/rsrc.php/v3ia7q4/yu/l/fr_FR/
0
0

eTjyy1sq5Pb.js
static.xx.fbcdn.net/rsrc.php/v3if1h4/y2/l/fr_FR/
0
0

ZEHQe8_eAh6.js
static.xx.fbcdn.net/rsrc.php/v3/yv/r/
0
0

j4g5goKSDpw.js
static.xx.fbcdn.net/rsrc.php/v3/yS/r/
0
0

Geb2ucamE4k.js
static.xx.fbcdn.net/rsrc.php/v3/y-/r/
0
0

truncated
/
31 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
72b57d229e163164cf6bcf281bcd98914617c1ccdcde4fddf73380eace27e734

Request headers

Referer
http://infoaccount2e5c5318677b36694283548a40.xyz/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
GPGyYijOozz.png
infoaccount2e5c5318677b36694283548a40.xyz/rsrc.php/v3/yQ/r/
337 B
337 B
Image
General
Full URL
http://infoaccount2e5c5318677b36694283548a40.xyz/rsrc.php/v3/yQ/r/GPGyYijOozz.png
Requested by
Host: infoaccount2e5c5318677b36694283548a40.xyz
URL: http://infoaccount2e5c5318677b36694283548a40.xyz/login/verify.php
Protocol
HTTP/1.1
Server
217.8.117.8 , Russian Federation, ASN60031 (CREXFEXPEX-LITHUANIA Autonomous System for Lithuania Clients, RU),
Reverse DNS
Software
Apache/2.4.18 (Ubuntu) /
Resource Hash
2065628cab75513b6a33e93da5325e372c2310e0bcf4c6f6dc9960041536d468

Request headers

Referer
http://infoaccount2e5c5318677b36694283548a40.xyz/login/verify.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 06 Jun 2019 16:01:45 GMT
Server
Apache/2.4.18 (Ubuntu)
Connection
Keep-Alive
Keep-Alive
timeout=5, max=99
Content-Length
337
Content-Type
text/html; charset=iso-8859-1

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
static.xx.fbcdn.net
URL
https://static.xx.fbcdn.net/rsrc.php/v3ia7q4/yu/l/fr_FR/pBYEwhIStl6.js
Domain
static.xx.fbcdn.net
URL
https://static.xx.fbcdn.net/rsrc.php/v3if1h4/y2/l/fr_FR/eTjyy1sq5Pb.js
Domain
static.xx.fbcdn.net
URL
https://static.xx.fbcdn.net/rsrc.php/v3/yv/r/ZEHQe8_eAh6.js
Domain
static.xx.fbcdn.net
URL
https://static.xx.fbcdn.net/rsrc.php/v3/yS/r/j4g5goKSDpw.js
Domain
static.xx.fbcdn.net
URL
https://static.xx.fbcdn.net/rsrc.php/v3/y-/r/Geb2ucamE4k.js

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Facebook (Social Network)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask

0 Cookies