ws.htl17.vip
Open in
urlscan Pro
172.67.186.15
Malicious Activity!
Public Scan
Submission: On July 15 via api from HK — Scanned from DE
Summary
TLS certificate: Issued by WE1 on July 13th 2024. Valid for: 3 months.
This is the only time ws.htl17.vip was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 9 | 172.67.186.15 172.67.186.15 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6811:2b8 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 104.17.3.184 104.17.3.184 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
12 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
htl17.vip
1 redirects
ws.htl17.vip |
64 KB |
2 |
cloudflare.com
challenges.cloudflare.com — Cisco Umbrella Rank: 3877 |
15 KB |
12 | 2 |
Domain | Requested by | |
---|---|---|
9 | ws.htl17.vip |
1 redirects
ws.htl17.vip
|
2 | challenges.cloudflare.com |
ws.htl17.vip
challenges.cloudflare.com |
12 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.cloudflare.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
htl17.vip WE1 |
2024-07-13 - 2024-10-11 |
3 months | crt.sh |
challenges.cloudflare.com Cloudflare Inc ECC CA-3 |
2023-08-18 - 2024-08-17 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://ws.htl17.vip/
Frame ID: B6C51782861CE8E1E56335CED7D3E088
Requests: 11 HTTP requests in this frame
Frame:
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/8yj1k/0x4AAAAAAADnPIDROrmt1Wwj/light/fbE/normal/auto/
Frame ID: AEB3D487B83ADEC83C7C80547553EA44
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Nur einen Moment…Page URL History Show full URLs
- https://ws.htl17.vip/ Page URL
-
https://ws.htl17.vip/cdn-cgi/phish-bypass?atok=8iNilvMiLsOhXw6rDXiU7_8uGZeNk9O0Ci_p9.Y2BsM-172103...
HTTP 301
https://ws.htl17.vip/ Page URL
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Cloudflare
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://ws.htl17.vip/ Page URL
-
https://ws.htl17.vip/cdn-cgi/phish-bypass?atok=8iNilvMiLsOhXw6rDXiU7_8uGZeNk9O0Ci_p9.Y2BsM-1721034698-0.0.1.1-%2F
HTTP 301
https://ws.htl17.vip/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
/
ws.htl17.vip/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
cf.errors.css
ws.htl17.vip/cdn-cgi/styles/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
icon-exclamation.png
ws.htl17.vip/cdn-cgi/images/ |
452 B 635 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
ws.htl17.vip/ |
548 B 551 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
/
ws.htl17.vip/ Redirect Chain
|
15 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
v1
ws.htl17.vip/cdn-cgi/challenge-platform/h/g/orchestrate/chl_page/ |
90 KB 35 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
api.js
challenges.cloudflare.com/turnstile/v0/g/7a55c9ccbaaa/ |
43 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
ws.htl17.vip/ |
548 B 548 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET BLOB |
eeba9362-7015-431e-98b8-f7babed3e35a
https://ws.htl17.vip/ |
13 B 0 |
Other
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
52e4cbb87f9099d
ws.htl17.vip/cdn-cgi/challenge-platform/h/g/flow/ov1/1501876706:1721030905:QFmi3dwrtg8_UeKe-5Ontm2nY6k8Y4RFVX6FhQWGO1s/8a38a0694e1c4db9/ |
16 KB 13 KB |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
/
challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/8yj1k/0x4AAAAAAADnPIDROrmt1Wwj/light/fbE/normal/auto/ Frame AEB3 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET BLOB |
91ede525-c2c6-4b8f-bad2-40b22639424c
https://ws.htl17.vip/ |
80 B 0 |
Other
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online)17 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| _cf_chl_opt function| JBytO3 function| gFgD3 function| mcFDK8 object| rKsN1 object| Qegrc3 function| yJxQG8 function| BcLub6 function| Yidy0 boolean| ZDhH3 function| NHjyJ1 object| YFEB2 number| DjQQG4 object| angular object| turnstile boolean| nDNF5 string| YuvyV31 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.ws.htl17.vip/ | Name: __cf_mw_byp Value: 8iNilvMiLsOhXw6rDXiU7_8uGZeNk9O0Ci_p9.Y2BsM-1721034698-0.0.1.1-/ |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
challenges.cloudflare.com
ws.htl17.vip
104.17.3.184
172.67.186.15
2606:4700::6811:2b8
039a089f30621c53df399ee79f143c5c64697ac3dfc22f7a952a147b7b1baf54
2f7ba5b94aff6df7eadeec50a5e3648519859e98e2b0052481e3d21d8c3537a6
84e3c77025ace5af143972b4a40fc834dcdfd4e449d4b36a57e62326f16b3091
8860e7fef89219a219cb11d18bd8e4a322f32072613f86e935e7fe162ab69c04
d465172175d35d493fb1633e237700022bd849fa123164790b168b8318acb090
de7d1e230009b19b7bbef1d1b1a7bea78e8ae39f428eb1bde0e84f0a2119fc8a
f1591a5221136c49438642155691ae6c68e25b7241f3d7ebe975b09a77662016
f3418640c1204265881221580b9d1554424f6ed49549d408da50c690ab29f400
fa2652a24da0980c9e3e5c19743ea8ce517ebfeba324b755b9eaa57f5abfe110
fce49ea9f15778f04b2d5d4a8fd10c7a63c087a95f4478632a6efb5ab8e750d9