medy3.badp4r.biz.id
Open in
urlscan Pro
2606:4700:3030::6815:5d5
Malicious Activity!
Public Scan
Submission: On April 30 via api from US — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1P5 on April 13th 2024. Valid for: 3 months.
This is the only time medy3.badp4r.biz.id was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: WhatsApp (Instant Messenger)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700:303... 2606:4700:3030::6815:5d5 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:81c::200a | 15169 (GOOGLE) (GOOGLE) | |
3 | 2606:4700:440... 2606:4700:4400::ac40:93bc | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6811:f5cb | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 104.18.10.207 104.18.10.207 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 104.17.24.14 104.17.24.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
7 | 172.67.133.220 172.67.133.220 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
5 | 162.19.58.156 162.19.58.156 | 16276 (OVH) (OVH) | |
1 | 2a00:1450:400... 2a00:1450:4001:810::2003 | 15169 (GOOGLE) (GOOGLE) | |
22 | 9 |
ASN13335 (CLOUDFLARENET, US)
site-assets.fontawesome.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
badp4r.biz.id
medy3.badp4r.biz.id |
3 MB |
5 |
ibb.co
i.ibb.co — Cisco Umbrella Rank: 11175 |
463 KB |
3 |
fontawesome.com
site-assets.fontawesome.com — Cisco Umbrella Rank: 65628 |
818 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 231 |
34 KB |
1 |
gstatic.com
fonts.gstatic.com |
46 KB |
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 3015 |
7 KB |
1 |
unpkg.com
unpkg.com — Cisco Umbrella Rank: 744 |
11 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 33 |
1 KB |
22 | 8 |
Domain | Requested by | |
---|---|---|
8 | medy3.badp4r.biz.id |
medy3.badp4r.biz.id
|
5 | i.ibb.co |
medy3.badp4r.biz.id
|
3 | site-assets.fontawesome.com |
medy3.badp4r.biz.id
site-assets.fontawesome.com |
2 | cdnjs.cloudflare.com |
medy3.badp4r.biz.id
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | stackpath.bootstrapcdn.com |
medy3.badp4r.biz.id
|
1 | unpkg.com |
medy3.badp4r.biz.id
|
1 | fonts.googleapis.com |
medy3.badp4r.biz.id
|
22 | 8 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
badp4r.biz.id GTS CA 1P5 |
2024-04-13 - 2024-07-12 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2024-04-16 - 2024-07-09 |
3 months | crt.sh |
*.fontawesome.com DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2023-12-04 - 2025-01-03 |
a year | crt.sh |
unpkg.com GTS CA 1P5 |
2024-04-01 - 2024-06-30 |
3 months | crt.sh |
bootstrapcdn.com GTS CA 1P5 |
2024-03-27 - 2024-06-25 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
ibb.co R3 |
2024-04-22 - 2024-07-21 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2024-04-16 - 2024-07-09 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://medy3.badp4r.biz.id/
Frame ID: D23DFFE906F43D6A9A15D79FFBDD1D86
Requests: 22 HTTP requests in this frame
Screenshot
Page Title
Join the viral groupDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
medy3.badp4r.biz.id/ |
10 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
21 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.css
site-assets.fontawesome.com/releases/v6.1.1/css/ |
486 KB 80 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boxicons.min.css
unpkg.com/boxicons@2.0.9/css/ |
62 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
font-awesome.min.css
stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
material-design-iconic-font.min.css
cdnjs.cloudflare.com/ajax/libs/material-design-iconic-font/2.2.0/css/ |
69 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
style.css
medy3.badp4r.biz.id/css/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
facebook.css
medy3.badp4r.biz.id/css/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
tt.jpg
medy3.badp4r.biz.id/img/ |
3 MB 3 MB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
46534653647534676.png
i.ibb.co/6btqPzf/ |
90 KB 90 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
foto.jpg
medy3.badp4r.biz.id/img/ |
7 KB 7 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
9429795792947.png
i.ibb.co/6JWXqcQ/ |
155 KB 155 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
236272365237.png
i.ibb.co/HYCbNV0/ |
99 KB 99 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
165325118357786736-1.png
i.ibb.co/zbkXm2T/ |
61 KB 61 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
165325118357786736.png
i.ibb.co/85YydzM/ |
57 KB 57 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
navbar.png
medy3.badp4r.biz.id/img/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
model.png
medy3.badp4r.biz.id/img/ |
146 KB 146 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.6.0/ |
87 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
UcC73FwrK3iLTeHuS_fvQtMwCp50KnMa1ZL7.woff2
fonts.gstatic.com/s/inter/v13/ |
46 KB 46 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-solid-900.woff2
site-assets.fontawesome.com/releases/v6.1.1/webfonts/ |
321 KB 322 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-light-300.woff2
site-assets.fontawesome.com/releases/v6.1.1/webfonts/ |
415 KB 415 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
model.png
medy3.badp4r.biz.id/img/ |
146 KB 0 |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: WhatsApp (Instant Messenger)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| alxgab function| alxcls function| tstalxwrg function| opalexf function| showFbPassword function| hideFbPassword function| alexf0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
fonts.googleapis.com
fonts.gstatic.com
i.ibb.co
medy3.badp4r.biz.id
site-assets.fontawesome.com
stackpath.bootstrapcdn.com
unpkg.com
104.17.24.14
104.18.10.207
162.19.58.156
172.67.133.220
2606:4700:3030::6815:5d5
2606:4700:4400::ac40:93bc
2606:4700::6811:f5cb
2a00:1450:4001:810::2003
2a00:1450:4001:81c::200a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