g0xdyxxek1.diplomater.tech
Open in
urlscan Pro
203.161.62.33
Malicious Activity!
Public Scan
Effective URL: https://g0xdyxxek1.diplomater.tech/m/fbcfaf5ffcfd9dcf1c1276f9c9c95fb8.html
Submission: On September 18 via manual from US — Scanned from US
Summary
TLS certificate: Issued by R3 on September 18th 2023. Valid for: 3 months.
This is the only time g0xdyxxek1.diplomater.tech was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 6 | 203.161.62.33 203.161.62.33 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
1 | 2607:f8b0:402... 2607:f8b0:4020:807::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 216.24.57.253 216.24.57.253 | 397273 (RENDER) (RENDER) | |
1 | 199.192.19.136 199.192.19.136 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
10 | 5 |
ASN22612 (NAMECHEAP-NET, US)
PTR: vps.mainhostpage.tech
g0xdyxxek1.diplomater.tech |
ASN22612 (NAMECHEAP-NET, US)
PTR: svr4.dkshostcook.host
vx7ncuufxw.pieterol.tech |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
diplomater.tech
1 redirects
g0xdyxxek1.diplomater.tech |
25 KB |
2 |
onrender.com
mainoffauty.onrender.com |
222 KB |
1 |
pieterol.tech
vx7ncuufxw.pieterol.tech |
5 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 720 |
30 KB |
0 |
ipify.org
Failed
api.ipify.org Failed |
|
10 | 5 |
Domain | Requested by | |
---|---|---|
6 | g0xdyxxek1.diplomater.tech |
1 redirects
g0xdyxxek1.diplomater.tech
|
2 | mainoffauty.onrender.com |
g0xdyxxek1.diplomater.tech
|
1 | vx7ncuufxw.pieterol.tech |
ajax.googleapis.com
|
1 | ajax.googleapis.com |
g0xdyxxek1.diplomater.tech
|
0 | api.ipify.org Failed |
ajax.googleapis.com
|
10 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.g0xdyxxek1.diplomater.tech R3 |
2023-09-18 - 2023-12-17 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-08-14 - 2023-11-06 |
3 months | crt.sh |
onrender.com Cloudflare Inc ECC CA-3 |
2023-09-17 - 2024-09-16 |
a year | crt.sh |
www.vx7ncuufxw.pieterol.tech R3 |
2023-09-12 - 2023-12-11 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://g0xdyxxek1.diplomater.tech/m/fbcfaf5ffcfd9dcf1c1276f9c9c95fb8.html
Frame ID: 7E0CF65D6D4155C4D175E7144FB2F487
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
WY00L8XRYH6CJMXDSOP2Page URL History Show full URLs
-
https://g0xdyxxek1.diplomater.tech/?email=
HTTP 302
https://g0xdyxxek1.diplomater.tech/m/fbcfaf5ffcfd9dcf1c1276f9c9c95fb8.html Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://g0xdyxxek1.diplomater.tech/?email=
HTTP 302
https://g0xdyxxek1.diplomater.tech/m/fbcfaf5ffcfd9dcf1c1276f9c9c95fb8.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
fbcfaf5ffcfd9dcf1c1276f9c9c95fb8.html
g0xdyxxek1.diplomater.tech/m/ Redirect Chain
|
8 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
PSDYH8Z7XLTS6KJKZ2JDX46Q1
g0xdyxxek1.diplomater.tech/m/sm/ |
106 KB 18 KB |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.7.0/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mlg.svg
g0xdyxxek1.diplomater.tech/m/mxl/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sig_op.svg
g0xdyxxek1.diplomater.tech/m/mxl/ |
2 KB 991 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
authy.js
mainoffauty.onrender.com/ |
400 KB 150 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
encrytCode.js
mainoffauty.onrender.com/ |
195 KB 72 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
PXPP081C0D32R9C2ODR46G3LD
g0xdyxxek1.diplomater.tech/m/bxg/ |
2 KB 2 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
/
api.ipify.org/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
/
vx7ncuufxw.pieterol.tech/ |
5 KB 5 KB |
XHR
application/php |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- api.ipify.org
- URL
- https://api.ipify.org/?format=json
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)105 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| $ function| jQuery string| pagemsg string| semail string| urlx string| lmode function| _0x54449b function| _0x280da7 function| _0x3d3587 function| _0xf2661e function| _0x323f6a function| _0x3e5062 function| _0x45f755 object| _0x2d0bad function| _0x1805c1 object| Errs string| email string| epass string| phone object| dVal object| lVal object| pages string| Key string| randomNum number| skip function| _0x1b727a undefined| myInterval undefined| Proofs undefined| Timeout undefined| IP undefined| GetCredential number| mhost function| _0x3fef string| pgtype function| getpage function| isEmail function| nextto function| _0x1dbff2 function| select_account function| back function| cancel function| _0x3802 number| count number| lcount function| redlogin function| setCookie function| auth function| auth_live function| getproof function| SendCodeLive function| ihacode function| VerifyCodeLive function| GotoAuth function| authback function| GotoType function| AuthEdata function| verifyOTC function| beginAuth number| PollCount function| endAuth function| processAuth function| startEndath function| stopEndath function| datetoiso function| dec2hex function| generateId string| SesIN function| _0x1f2861 function| _0x42684f function| _0x1a4ce1 function| _0x8de6f3 function| _0xc2195 function| _0x508af5 function| _0x660f function| Encrypt function| PackageSADataForProof function| parseRSAKeyFromString function| hexStringToMP function| JSMPnumber function| applyPKCSv2Padding function| SHA1 function| PadSHA1Input function| SHA1RoundFunction function| rotateLeft function| wordToBytes function| MGF function| duplicateMP function| modularMultiply function| multiplyMP function| removeLeadingZeroes function| mpToByteArray function| multiplyAndSubtract function| normalizeJSMP function| divideMP function| _0x4e53 function| modularExp function| byteArrayToMP function| XORarrays function| RSAEncrypt function| mapByteToBase64 function| base64Encode function| byteArrayToBase64 function| RSAEncryptBlock function| _0x540dfa2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
g0xdyxxek1.diplomater.tech/ | Name: PHPSESSID Value: 0b45e248218a21b2f03d38a9cbaeb216 |
|
g0xdyxxek1.diplomater.tech/ | Name: rt Value: fbcfaf5ffcfd9dcf1c1276f9c9c95fb8.html |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
api.ipify.org
g0xdyxxek1.diplomater.tech
mainoffauty.onrender.com
vx7ncuufxw.pieterol.tech
api.ipify.org
199.192.19.136
203.161.62.33
216.24.57.253
2607:f8b0:4020:807::200a
040804ec8d94dc2275eee57810badb03ab7850c894d175f7459fd3aa7c239ab5
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
270dd308b329956dcbe3a48b812f6d8b3653d1c230e64f2958d1f544011b6398
4a1327500f337d80f0abb4bd8a2b02e4beef2bc34c3961e6e0f3407da185057d
8e6db1634f1812d42516778fc890010aa57f3e39914fb4803df2c38abbf56d93
932974a2d9966e2e6e45882d3d4b8e81293c79934a0ab235e112bffcea506ce9
b294d339f709a0620968800517ed512f5ea76a8d06959ff59f6f2ec6f3fdcdb7
d8f9afbf492e4c139e9d2bcb9ba6ef7c14921eb509fb703bc7a3f911b774eff8
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855