fultonarw.top
Open in
urlscan Pro
2606:4700:30::681f:46e0
Malicious Activity!
Public Scan
Submission: On December 09 via automatic, source phishtank
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on December 7th 2019. Valid for: 10 months.
This is the only time fultonarw.top was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Xfinity (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 8 | 2606:4700:30:... 2606:4700:30::681f:46e0 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
3 | 2a02:26f0:6c0... 2a02:26f0:6c00:28a::1b62 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
9 | 3 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
fultonarw.top |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
fultonarw.top
2 redirects
fultonarw.top |
1 MB |
3 |
xfinity.com
sdx.xfinity.com |
80 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
8 | fultonarw.top |
2 redirects
fultonarw.top
|
3 | sdx.xfinity.com |
fultonarw.top
|
9 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-12-07 - 2020-10-09 |
10 months | crt.sh |
www.xfinity.comcast.net COMODO RSA Organization Validation Secure Server CA |
2019-09-10 - 2021-09-09 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://fultonarw.top/ute/jhkt/
Frame ID: F7EA72EBCBB1CD77938D6BBE9CD854DB
Requests: 11 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://fultonarw.top/ute/jhkt
HTTP 301
http://fultonarw.top/ute/jhkt/ HTTP 301
https://fultonarw.top/ute/jhkt/ Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://fultonarw.top/ute/jhkt
HTTP 301
http://fultonarw.top/ute/jhkt/ HTTP 301
https://fultonarw.top/ute/jhkt/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
fultonarw.top/ute/jhkt/ Redirect Chain
|
8 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
s56960402459371.txt
fultonarw.top/ute/jhkt/css/ |
6 KB 2 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styles-light.css
fultonarw.top/ute/jhkt/css/ |
47 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
u.gif
fultonarw.top/ute/jhkt/css/ |
42 B 172 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
event.gif
fultonarw.top/ute/jhkt/css/ |
42 B 98 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
166354.png
fultonarw.top/ute/jhkt/css/ |
1015 KB 1016 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
933 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
XfinityStandard-Regular.woff2
sdx.xfinity.com/fonts/latest/Xfinity_Standard/ |
26 KB 26 KB |
Font
binary/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
XfinityStandard-Light.woff2
sdx.xfinity.com/fonts/latest/Xfinity_Standard/ |
27 KB 27 KB |
Font
binary/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
XfinityStandard-Medium.woff2
sdx.xfinity.com/fonts/latest/Xfinity_Standard/ |
27 KB 27 KB |
Font
binary/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Xfinity (Consumer)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| ValidateLogin0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fultonarw.top
sdx.xfinity.com
2606:4700:30::681f:46e0
2a02:26f0:6c00:28a::1b62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