syzphlapxc.cf
Open in
urlscan Pro
2606:4700:3034::681f:4799
Malicious Activity!
Public Scan
Submission: On July 28 via automatic, source openphish
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on July 27th 2020. Valid for: a year.
This is the only time syzphlapxc.cf was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 2606:4700:303... 2606:4700:3034::681f:4799 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 176.88.217.73 176.88.217.73 | 34984 (TELLCOM-AS) (TELLCOM-AS) | |
1 | 2a00:1450:400... 2a00:1450:4001:800::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2a00:1450:400... 2a00:1450:4001:824::2003 | 15169 (GOOGLE) (GOOGLE) | |
9 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
syzphlapxc.cf
syzphlapxc.cf |
27 KB |
2 |
gstatic.com
fonts.gstatic.com |
22 KB |
1 |
googleapis.com
fonts.googleapis.com |
821 B |
1 |
wirecard.com.tr
www.wirecard.com.tr |
2 KB |
9 | 4 |
Domain | Requested by | |
---|---|---|
5 | syzphlapxc.cf |
syzphlapxc.cf
|
2 | fonts.gstatic.com |
syzphlapxc.cf
|
1 | fonts.googleapis.com |
syzphlapxc.cf
|
1 | www.wirecard.com.tr |
syzphlapxc.cf
|
9 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-07-27 - 2021-07-27 |
a year | crt.sh |
*.wirecard.com.tr COMODO RSA Organization Validation Secure Server CA |
2019-04-01 - 2021-03-31 |
2 years | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-07-07 - 2020-09-29 |
3 months | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-07-07 - 2020-09-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://syzphlapxc.cf/incorrec1.html?type=68v3oWMXCKK_tLsDeLwd3VAxU9liAXf6jAuMsUDt2Bqkz9pszbcR5nARJnptToTOAO21psT53EcviRl
Frame ID: 44A43A7ED1B232671BBF3A29C2CD91C9
Requests: 9 HTTP requests in this frame
Screenshot
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
incorrec1.html
syzphlapxc.cf/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
botsda.css
syzphlapxc.cf/ |
118 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wirecard.css
syzphlapxc.cf/ |
9 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
webtot.css
syzphlapxc.cf/ |
108 B 219 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wd.jpg
syzphlapxc.cf/ |
5 KB 6 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon-secure.png
www.wirecard.com.tr/pgate/Assets/cppflex/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
7 KB 821 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmWUlfBBc4AMP6lQ.woff2
fonts.gstatic.com/s/roboto/v20/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| theForm function| __doPostBack2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.syzphlapxc.cf/ | Name: ARRAffinity Value: 25219d42372719c342ab17825deca2d04d9499b63d31c4c4373465aaa122c1a4 |
|
.syzphlapxc.cf/ | Name: __cfduid Value: dcd6abaa6362b5dbd5303cae470ab9c041595900199 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
syzphlapxc.cf
www.wirecard.com.tr
176.88.217.73
2606:4700:3034::681f:4799
2a00:1450:4001:800::200a
2a00:1450:4001:824::2003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