www.girlsgroupwhtsapponlysexxy.xxuz.com
Open in
urlscan Pro
178.18.252.45
Malicious Activity!
Public Scan
Submission: On May 04 via automatic, source openphish
Summary
This is the only time www.girlsgroupwhtsapponlysexxy.xxuz.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: WhatsApp (Instant Messenger)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 178.18.252.45 178.18.252.45 | 51167 (CONTABO) (CONTABO) | |
1 | 2606:4700::68... 2606:4700::6810:125e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:82f::200a | 15169 (GOOGLE) (GOOGLE) | |
12 | 3 |
ASN51167 (CONTABO, DE)
PTR: vmi579602.contaboserver.net
www.girlsgroupwhtsapponlysexxy.xxuz.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
xxuz.com
www.girlsgroupwhtsapponlysexxy.xxuz.com |
543 KB |
1 |
googleapis.com
fonts.googleapis.com |
546 B |
1 |
cloudflare.com
cdnjs.cloudflare.com |
6 KB |
12 | 3 |
Domain | Requested by | |
---|---|---|
10 | www.girlsgroupwhtsapponlysexxy.xxuz.com |
www.girlsgroupwhtsapponlysexxy.xxuz.com
|
1 | fonts.googleapis.com |
www.girlsgroupwhtsapponlysexxy.xxuz.com
|
1 | cdnjs.cloudflare.com |
www.girlsgroupwhtsapponlysexxy.xxuz.com
|
12 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-10-21 - 2021-10-20 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2021-04-13 - 2021-07-06 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.girlsgroupwhtsapponlysexxy.xxuz.com/
Frame ID: 6433654473FD859A9EAF0E9EDE6C3DC5
Requests: 12 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.girlsgroupwhtsapponlysexxy.xxuz.com/ |
3 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
www.girlsgroupwhtsapponlysexxy.xxuz.com/css/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
material-design-iconic-font.min.css
cdnjs.cloudflare.com/ajax/libs/material-design-iconic-font/2.2.0/css/ |
69 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon.png
www.girlsgroupwhtsapponlysexxy.xxuz.com/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
imahe20.jpg
www.girlsgroupwhtsapponlysexxy.xxuz.com/img/ |
309 KB 310 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
imahe21.jpg
www.girlsgroupwhtsapponlysexxy.xxuz.com/img/ |
25 KB 25 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
imahe22.jpg
www.girlsgroupwhtsapponlysexxy.xxuz.com/img/ |
32 KB 32 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
imahe23.jpg
www.girlsgroupwhtsapponlysexxy.xxuz.com/img/ |
51 KB 52 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
5.png
www.girlsgroupwhtsapponlysexxy.xxuz.com/img/ |
58 KB 58 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
6.png
www.girlsgroupwhtsapponlysexxy.xxuz.com/img/ |
17 KB 18 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
1 KB 546 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
google.ttf
www.girlsgroupwhtsapponlysexxy.xxuz.com/fonts/ |
40 KB 40 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: WhatsApp (Instant Messenger)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
fonts.googleapis.com
www.girlsgroupwhtsapponlysexxy.xxuz.com
178.18.252.45
2606:4700::6810:125e
2a00:1450:4001:82f::200a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