quwelhole.site
Open in
urlscan Pro
2606:4700:3037::6815:4fb3
Malicious Activity!
Public Scan
Effective URL: https://quwelhole.site/?a464782bfaab1e64c18a941274adbd8d
Submission: On July 08 via manual from CA — Scanned from CA
Summary
TLS certificate: Issued by WE1 on July 4th 2024. Valid for: 3 months.
This is the only time quwelhole.site was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Customer Survey Spam (Consumer) Generic Scam (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 52.217.131.16 52.217.131.16 | 16509 (AMAZON-02) (AMAZON-02) | |
1 1 | 2606:4700:303... 2606:4700:3031::ac43:936f | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 1 | 2606:4700:303... 2606:4700:3035::6815:47a7 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 37.44.198.31 37.44.198.31 | 49392 (ASBAXETN) (ASBAXETN) | |
1 1 | 2606:4700:303... 2606:4700:3035::6815:51bd | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
16 | 2606:4700:303... 2606:4700:3037::6815:4fb3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700:303... 2606:4700:3037::ac43:8ef5 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2607:f8b0:400... 2607:f8b0:4004:c09::5f | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:4700:303... 2606:4700:3035::6815:6008 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2606:4700:303... 2606:4700:3036::ac43:961e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
24 | 7 |
ASN16509 (AMAZON-02, US)
PTR: s3-1.amazonaws.com
s3.amazonaws.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
quwelhole.site
quwelhole.site |
154 KB |
4 |
trk-elevostra.com
trk-elevostra.com — Cisco Umbrella Rank: 449869 event.trk-elevostra.com — Cisco Umbrella Rank: 486624 |
3 KB |
2 |
waqarraaj.com
2 redirects
mail.waqarraaj.com |
1 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 607 |
31 KB |
1 |
fontawesome.com
use.fontawesome.com — Cisco Umbrella Rank: 1886 |
426 KB |
1 |
welldigger.store
1 redirects
welldigger.store |
635 B |
1 |
brushaskcor.com
brushaskcor.com |
508 B |
1 |
amazonaws.com
s3.amazonaws.com |
499 B |
24 | 8 |
Domain | Requested by | |
---|---|---|
16 | quwelhole.site |
brushaskcor.com
quwelhole.site |
3 | event.trk-elevostra.com |
trk-elevostra.com
|
2 | mail.waqarraaj.com | 2 redirects |
1 | trk-elevostra.com |
quwelhole.site
|
1 | ajax.googleapis.com |
quwelhole.site
|
1 | use.fontawesome.com |
quwelhole.site
|
1 | welldigger.store | 1 redirects |
1 | brushaskcor.com |
s3.amazonaws.com
|
1 | s3.amazonaws.com | |
24 | 9 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
s3.amazonaws.com Amazon RSA 2048 M01 |
2024-05-25 - 2025-05-02 |
a year | crt.sh |
brushaskcor.com R3 |
2024-05-13 - 2024-08-11 |
3 months | crt.sh |
quwelhole.site WE1 |
2024-07-04 - 2024-10-02 |
3 months | crt.sh |
use.fontawesome.com Cloudflare Inc ECC CA-3 |
2023-10-12 - 2024-10-10 |
a year | crt.sh |
upload.video.google.com WR2 |
2024-06-13 - 2024-09-05 |
3 months | crt.sh |
trk-elevostra.com WE1 |
2024-06-13 - 2024-09-11 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://quwelhole.site/?a464782bfaab1e64c18a941274adbd8d
Frame ID: 935372548C3C43B9834FA3250B2C34A4
Requests: 23 HTTP requests in this frame
Screenshot
Page Title
[1] Reward Pending - Home Improvement - We Want Your Opinion!Page URL History Show full URLs
- https://s3.amazonaws.com/bp6ja4e8r7d/bp6ja4e8r7d.html Page URL
-
http://mail.waqarraaj.com/cl/106490_md/13/63812/1916/329/10871
HTTP 307
https://mail.waqarraaj.com/cl/106490_md/13/63812/1916/329/10871 HTTP 302
https://brushaskcor.com/0/2/42455/e29bba461e81e9f2b9024cc6f6e37ba1/13/106490_24/329_10871_63812_3152... HTTP 307
http://mail.waqarraaj.com/cl/106490_md/13/63812/1916/329/10871 HTTP 302
https://brushaskcor.com/0/2/42455/e29bba461e81e9f2b9024cc6f6e37ba1/13/106490_24/329_10871_63812_3152... Page URL
-
https://welldigger.store/?id=262&s1=351626&s2=1203503988&s3=6244&p=us5lowsweps7b
HTTP 302
https://quwelhole.site/?a464782bfaab1e64c18a941274adbd8d Page URL
Detected technologies
animate.css (Web Frameworks) ExpandDetected patterns
- <link [^>]+(?:/([\d.]+)/)?animate\.(?:min\.)?css
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://s3.amazonaws.com/bp6ja4e8r7d/bp6ja4e8r7d.html Page URL
-
http://mail.waqarraaj.com/cl/106490_md/13/63812/1916/329/10871
HTTP 307
https://mail.waqarraaj.com/cl/106490_md/13/63812/1916/329/10871 HTTP 302
https://brushaskcor.com/0/2/42455/e29bba461e81e9f2b9024cc6f6e37ba1/13/106490_24/329_10871_63812_315261_md HTTP 307
http://mail.waqarraaj.com/cl/106490_md/13/63812/1916/329/10871 HTTP 302
https://brushaskcor.com/0/2/42455/e29bba461e81e9f2b9024cc6f6e37ba1/13/106490_24/329_10871_63812_315262_md Page URL
-
https://welldigger.store/?id=262&s1=351626&s2=1203503988&s3=6244&p=us5lowsweps7b
HTTP 302
https://quwelhole.site/?a464782bfaab1e64c18a941274adbd8d Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 1- http://mail.waqarraaj.com/cl/106490_md/13/63812/1916/329/10871 HTTP 307
- https://mail.waqarraaj.com/cl/106490_md/13/63812/1916/329/10871 HTTP 302
- https://brushaskcor.com/0/2/42455/e29bba461e81e9f2b9024cc6f6e37ba1/13/106490_24/329_10871_63812_315261_md HTTP 307
- http://mail.waqarraaj.com/cl/106490_md/13/63812/1916/329/10871 HTTP 302
- https://brushaskcor.com/0/2/42455/e29bba461e81e9f2b9024cc6f6e37ba1/13/106490_24/329_10871_63812_315262_md
24 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
bp6ja4e8r7d.html
s3.amazonaws.com/bp6ja4e8r7d/ |
105 B 499 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
329_10871_63812_315262_md
brushaskcor.com/0/2/42455/e29bba461e81e9f2b9024cc6f6e37ba1/13/106490_24/ Redirect Chain
|
143 B 508 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
/
quwelhole.site/ Redirect Chain
|
63 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
modal.css
quwelhole.site/master/us195/ |
1 KB 955 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
style.css
quwelhole.site/master/us192/ |
15 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
animate.min.css
quwelhole.site/master/us192/ |
70 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.js
use.fontawesome.com/releases/v5.15.4/js/ |
1 MB 426 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
datehead.js
quwelhole.site/master/us192/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
msg.js
quwelhole.site/inc/ |
943 B 927 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
f_guarantee.png
quwelhole.site/master/us188/ |
6 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
f_secure_1.png
quwelhole.site/master/us188/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
scriptd.js
quwelhole.site/master/us192/ |
10 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
x.png
quwelhole.site/master/us195/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
modal.js
quwelhole.site/master/us195/ |
690 B 741 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
v9e118mez8
trk-elevostra.com/scripts/push/ |
8 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
lowesbgnew.jpeg
quwelhole.site/master/us192/ |
33 KB 33 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Lowes-Logo-2.png
quwelhole.site/master/us192/ |
20 KB 20 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
flaglogo.png
quwelhole.site/master/us192/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
product-2-min.png
quwelhole.site/master/us192/ |
49 KB 49 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
quwelhole.site/ |
0 521 B |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
v9e118mez8
event.trk-elevostra.com/register/event_log/ |
0 0 |
Fetch
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
v9e118mez8
event.trk-elevostra.com/register/event_log/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
v9e118mez8
event.trk-elevostra.com/register/event_log/ |
0 0 |
Fetch
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Customer Survey Spam (Consumer) Generic Scam (Online)42 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| datehax function| datenhax function| datenhay function| startTimer function| change object| MYCALL string| s1 string| s2 string| esource string| pshpub string| pshdomain object| answers number| lastQnum function| toNext object| states object| dones object| loadImg object| loadBgCol function| drawloader number| qn number| dsq function| urlBase64ToUint8Array function| pullUrlParams function| push_subscribe function| push_subscribe_promise function| setIfNull function| logPushEvent function| push_unsubscribe function| push_init function| setSessionId function| setUtm function| getSessionId function| getUrlVars function| getDomainName function| getStore function| setAttributes function| $ function| jQuery object| ___FONT_AWESOME___ object| FontAwesomeConfig object| FontAwesome3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
brushaskcor.com/ | Name: uid6244 Value: 1203503988-20240708105425-e3d19b39fc59bfb77dadefe180b058e8-4052 |
|
welldigger.store/ | Name: PHPSESSID Value: d3b415a1a5d237a628a039802ecc7003 |
|
quwelhole.site/ | Name: PHPSESSID Value: ae26deb591e5935ff903f92ae0ecc01f |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
brushaskcor.com
event.trk-elevostra.com
mail.waqarraaj.com
quwelhole.site
s3.amazonaws.com
trk-elevostra.com
use.fontawesome.com
welldigger.store
2606:4700:3031::ac43:936f
2606:4700:3035::6815:47a7
2606:4700:3035::6815:51bd
2606:4700:3035::6815:6008
2606:4700:3036::ac43:961e
2606:4700:3037::6815:4fb3
2606:4700:3037::ac43:8ef5
2607:f8b0:4004:c09::5f
37.44.198.31
52.217.131.16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