secure.qqp.zle.temporary.site
Open in
urlscan Pro
192.185.41.218
Malicious Activity!
Public Scan
Submission: On August 13 via api from US — Scanned from IT
Summary
TLS certificate: Issued by R10 on August 11th 2024. Valid for: 3 months.
This is the only time secure.qqp.zle.temporary.site was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 192.185.41.218 192.185.41.218 | 19871 (NETWORK-S...) (NETWORK-SOLUTIONS-HOSTING) | |
9 | 1 |
ASN19871 (NETWORK-SOLUTIONS-HOSTING, US)
PTR: 192-185-41-218.unifiedlayer.com
secure.qqp.zle.temporary.site |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
temporary.site
secure.qqp.zle.temporary.site |
341 KB |
9 | 1 |
Domain | Requested by | |
---|---|---|
9 | secure.qqp.zle.temporary.site |
secure.qqp.zle.temporary.site
|
9 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.qqp.zle.temporary.site R10 |
2024-08-11 - 2024-11-09 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://secure.qqp.zle.temporary.site/
Frame ID: DAD67E56345BE15F1CBF67866B581ED1
Requests: 9 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
secure.qqp.zle.temporary.site/ |
17 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fusion.css
secure.qqp.zle.temporary.site/ |
86 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fusion.js
secure.qqp.zle.temporary.site/ |
85 KB 37 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fusion.png
secure.qqp.zle.temporary.site/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fusion3.png
secure.qqp.zle.temporary.site/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fusion2.png
secure.qqp.zle.temporary.site/ |
265 KB 265 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fusion.php
secure.qqp.zle.temporary.site/ |
25 B 74 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fusion.ico
secure.qqp.zle.temporary.site/ |
8 KB 8 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fusion.php
secure.qqp.zle.temporary.site/ |
25 B 97 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| validateEcode function| meetU function| meetData function| meetP1 function| meetData1 function| meetP function| meetData20 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
secure.qqp.zle.temporary.site
192.185.41.218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