velox-invite.com
Open in
urlscan Pro
31.177.108.214
Malicious Activity!
Public Scan
Submission: On October 19 via api from CA — Scanned from CA
Summary
TLS certificate: Issued by R10 on October 13th 2024. Valid for: 3 months.
This is the only time velox-invite.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Telegram (Instant Messenger)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 31.177.108.214 31.177.108.214 | 56694 (SMARTAPE) (SMARTAPE) | |
1 | 199.232.196.193 199.232.196.193 | 54113 (FASTLY) (FASTLY) | |
2 | 2a03:2880:f00... 2a03:2880:f003:100:face:b00c:0:3 | 32934 (FACEBOOK) (FACEBOOK) | |
2 | 2a03:2880:f10... 2a03:2880:f103:181:face:b00c:0:25de | 32934 (FACEBOOK) (FACEBOOK) | |
1 | 2001:67c:4e8:... 2001:67c:4e8:f004::9 | 62041 (TELEGRAM) (TELEGRAM) | |
14 | 5 |
ASN32934 (FACEBOOK, US)
connect.facebook.net |
ASN32934 (FACEBOOK, US)
www.facebook.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
velox-invite.com
velox-invite.com |
47 KB |
2 |
facebook.com
www.facebook.com — Cisco Umbrella Rank: 113 |
3 KB |
2 |
facebook.net
connect.facebook.net — Cisco Umbrella Rank: 180 |
71 KB |
1 |
telegram.org
telegram.org — Cisco Umbrella Rank: 10577 |
15 KB |
1 |
imgur.com
i.imgur.com — Cisco Umbrella Rank: 8556 |
26 KB |
14 | 5 |
Domain | Requested by | |
---|---|---|
8 | velox-invite.com |
velox-invite.com
|
2 | www.facebook.com |
velox-invite.com
|
2 | connect.facebook.net |
velox-invite.com
connect.facebook.net |
1 | telegram.org | |
1 | i.imgur.com |
velox-invite.com
|
14 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
telegram.org |
Subject Issuer | Validity | Valid | |
---|---|---|---|
velox-invite.com R10 |
2024-10-13 - 2025-01-11 |
3 months | crt.sh |
*.imgur.com Sectigo RSA Domain Validation Secure Server CA |
2024-02-15 - 2025-02-14 |
a year | crt.sh |
*.facebook.com DigiCert SHA2 High Assurance Server CA |
2024-07-28 - 2024-10-26 |
3 months | crt.sh |
*.telegram.org Go Daddy Secure Certificate Authority - G2 |
2024-08-10 - 2025-09-11 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://velox-invite.com/
Frame ID: D2CA4054262C1DF1B7E4AF158B5CE6EB
Requests: 14 HTTP requests in this frame
Screenshot
Page Title
Telegram: Contact @VeloxCryptoTrading_botDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Facebook (Widgets) Expand
Detected patterns
- //connect\.facebook\.([a-z]+)/[^/]*/[a-z]*\.js
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: Download
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
velox-invite.com/ |
11 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-roboto.css
velox-invite.com/index_files/ |
6 KB 932 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
velox-invite.com/index_files/ |
42 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
telegram.css
velox-invite.com/index_files/ |
117 KB 29 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bSfno4y.png
i.imgur.com/ |
26 KB 26 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tgwallpaper.min.js
velox-invite.com/index_files/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fbevents.js
connect.facebook.net/en_US/ |
227 KB 58 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pattern.svg
velox-invite.com/img/tgme/ |
279 B 279 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
KFOlCnqEu92Fr1MmWUlfBBc4AMP6lQ.woff2
velox-invite.com/fonts/Roboto/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
velox-invite.com/fonts/Roboto/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
920375426678823
connect.facebook.net/signals/config/ |
65 KB 13 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
www.facebook.com/tr/ |
0 274 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
www.facebook.com/privacy_sandbox/pixel/register/trigger/ |
67 B 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
telegram.org/img/ |
15 KB 15 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Telegram (Instant Messenger)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| fbq function| _fbq object| TWallpaper object| tme_bg function| toggleTheme object| darkMedia1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.velox-invite.com/ | Name: _fbp Value: fb.1.1729332682458.902055591584842763 |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
connect.facebook.net
i.imgur.com
telegram.org
velox-invite.com
www.facebook.com
199.232.196.193
2001:67c:4e8:f004::9
2a03:2880:f003:100:face:b00c:0:3
2a03:2880:f103:181:face:b00c:0:25de
31.177.108.214
0e968c0afb78eb1cdc6ac1fe8e1648a48655803ca7e59ebaf655577cfbff4bec
10e1a86768435af90f1f5f5fefbf81c732dccb114ba4751ae1ab1f9083ca13de
2031e418ee10af8110729b3f327b968462fc0a9d8d1da095387bb472ccd0dee6
36c267a151f5dc49c78bb2a211f597f68db9be8c7de37165daffbdcaeea85e1e
4ff54bc38c267dc3a8c95f6ed4590336baaec70433ef15d027ddca608c391e78
63db15f00ab6b5a8cf92bff0cd98448c373732d7d3d4edc9c7a3b4d129e9627c
aa7b6c81e85551eeb5c4809f1e683efa0b780c33d12ddfc2067a1b136803e45a
bf24ddc2ef325bdaeb821476dec35fa1225c85a388480a48bb57de4c509bde0d
c7ce78da4df0f9fd5ea28ecb9a9a054b56683d2e577e61e6d298ad448441afd1
d7dd646147fce06b7af83f0c22fbce34ef0d4b1301e7d6560a8bea60019cfa18
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
f4cfd4a5b95dfb31c47cd567d9719fc12a0453f6ff27e2872147a9740e4b9e56