whatsappplinkxxzz-efg.pages.dev
Open in
urlscan Pro
2606:4700:310c::ac42:2f60
Malicious Activity!
Public Scan
Submission: On August 13 via api from US — Scanned from US
Summary
TLS certificate: Issued by E1 on August 13th 2023. Valid for: 3 months.
This is the only time whatsappplinkxxzz-efg.pages.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: WhatsApp (Instant Messenger)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 2606:4700:310... 2606:4700:310c::ac42:2f60 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2607:f8b0:402... 2607:f8b0:4020:807::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2607:f8b0:402... 2607:f8b0:4020:804::2003 | 15169 (GOOGLE) (GOOGLE) | |
9 | 3 |
ASN13335 (CLOUDFLARENET, US)
whatsappplinkxxzz-efg.pages.dev |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
pages.dev
whatsappplinkxxzz-efg.pages.dev |
4 MB |
1 |
gstatic.com
fonts.gstatic.com |
15 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 67 |
1009 B |
9 | 3 |
Domain | Requested by | |
---|---|---|
7 | whatsappplinkxxzz-efg.pages.dev |
whatsappplinkxxzz-efg.pages.dev
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
whatsappplinkxxzz-efg.pages.dev
|
9 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
vozkn.blisterlngdates.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
whatsappplinkxxzz-efg.pages.dev E1 |
2023-08-13 - 2023-11-11 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-07-17 - 2023-10-09 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2023-07-17 - 2023-10-09 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://whatsappplinkxxzz-efg.pages.dev/
Frame ID: 50FEA29A4EDF60D6572B343FD4F7DB7D
Requests: 9 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Title: CONTINUE
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
whatsappplinkxxzz-efg.pages.dev/ |
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
whatsappplinkxxzz-efg.pages.dev/ |
3 KB 894 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main-style.css
whatsappplinkxxzz-efg.pages.dev/ |
15 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
backoffer.js
whatsappplinkxxzz-efg.pages.dev/ |
3 KB 2 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
whatsapp_sex.png
whatsappplinkxxzz-efg.pages.dev/images/ |
57 KB 58 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
d.gif
whatsappplinkxxzz-efg.pages.dev/images/ |
4 MB 4 MB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 1009 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
gaber.png
whatsappplinkxxzz-efg.pages.dev/images/ |
212 KB 213 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6xKydSBYKcSV-LCoeQqfX1RYOo3ik4zwlxdu.woff2
fonts.gstatic.com/s/sourcesanspro/v22/ |
14 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: WhatsApp (Instant Messenger)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| disableSelection function| mousedwn0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
whatsappplinkxxzz-efg.pages.dev
2606:4700:310c::ac42:2f60
2607:f8b0:4020:804::2003
2607:f8b0:4020:807::200a
0db070652d657c32167749505a76ffc418c1a76a3a80b85bd907a8cd643aab89
3848340ea7fe631f7b14f0917c3b5c3e15da5a74a09fb3ec7ad7a2c48515cc06
4f0e71f3e3d7757fc73e39c14a23528f9e87d3f52da981c890f7f91e229c9b5f
4f8f2b35ca9d35c20a10bd75f1ff89e3e9a2c27c3d4ace0e3fbe1f95f8b9966c
6ad285d33549a15db0b47d6e0891ae4abd627c7a8f41493eb827410e8de7208a
c3de27b2cbd6deda629c9b442700cf54c0dda74e494b1c75a57d822068a047f8
c85fa8812beb466768914b1014855d2f7e65c52f8581645dbbba47f856b40265
ca6c9b2eecced538a6d8d1c3076a01336093d27e042f603855cb205cc373223c