www.reddit.zengzhelingasdfcxz.top
Open in
urlscan Pro
173.199.70.168
Malicious Activity!
Public Scan
Effective URL: https://www.reddit.zengzhelingasdfcxz.top/login/
Submission: On January 28 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on January 28th 2019. Valid for: 3 months.
This is the only time www.reddit.zengzhelingasdfcxz.top was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Reddit (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 13 | 173.199.70.168 173.199.70.168 | 20473 (AS-CHOOPA) (AS-CHOOPA - Choopa) | |
7 | 151.101.1.140 151.101.1.140 | 54113 (FASTLY) (FASTLY - Fastly) | |
17 | 2 |
ASN20473 (AS-CHOOPA - Choopa, LLC, US)
PTR: 173.199.70.168.vultr.com
www.reddit.zengzhelingasdfcxz.top | |
win.reddit.zengzhelingasdfcxz.top | |
events.reddit.zengzhelingasdfcxz.top |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
zengzhelingasdfcxz.top
3 redirects
www.reddit.zengzhelingasdfcxz.top win.reddit.zengzhelingasdfcxz.top events.reddit.zengzhelingasdfcxz.top |
388 KB |
7 |
redditstatic.com
www.redditstatic.com |
201 KB |
17 | 2 |
Domain | Requested by | |
---|---|---|
7 | www.redditstatic.com |
www.reddit.zengzhelingasdfcxz.top
|
7 | win.reddit.zengzhelingasdfcxz.top |
www.reddit.zengzhelingasdfcxz.top
|
4 | www.reddit.zengzhelingasdfcxz.top | 3 redirects |
2 | events.reddit.zengzhelingasdfcxz.top |
win.reddit.zengzhelingasdfcxz.top
|
17 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.reddithelp.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.reddit.zengzhelingasdfcxz.top Let's Encrypt Authority X3 |
2019-01-28 - 2019-04-28 |
3 months | crt.sh |
*.reddit.com DigiCert SHA2 Secure Server CA |
2018-08-17 - 2020-09-02 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.reddit.zengzhelingasdfcxz.top/login/
Frame ID: 12E8C595F2B2E6E25F59B27E7AF6AB71
Requests: 17 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://www.reddit.zengzhelingasdfcxz.top/
HTTP 302
https://www.reddit.zengzhelingasdfcxz.top/login HTTP 302
http://www.reddit.zengzhelingasdfcxz.top/login/ HTTP 302
https://www.reddit.zengzhelingasdfcxz.top/login/ Page URL
Detected technologies
Varnish (Cache Tools) ExpandDetected patterns
- headers via /.*Varnish/i
webpack (Miscellaneous) Expand
Detected patterns
- env /^webpackJsonp$/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Having trouble ?
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.reddit.zengzhelingasdfcxz.top/
HTTP 302
https://www.reddit.zengzhelingasdfcxz.top/login HTTP 302
http://www.reddit.zengzhelingasdfcxz.top/login/ HTTP 302
https://www.reddit.zengzhelingasdfcxz.top/login/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
www.reddit.zengzhelingasdfcxz.top/login/ Redirect Chain
|
6 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vendor.7749aab6f5c7d510110eaa0430cb683d.css
win.reddit.zengzhelingasdfcxz.top/accountmanager/ |
2 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.5cac6866db5d20bcb4373af1c257df64.css
win.reddit.zengzhelingasdfcxz.top/accountmanager/ |
14 KB 15 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.5d548fad4637c6ba118ebcf590a30611.css
win.reddit.zengzhelingasdfcxz.top/accountmanager/ |
1 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
common.920e6ca07b9488e8bffc.js
win.reddit.zengzhelingasdfcxz.top/accountmanager/ |
2 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vendor.02e70b0510146f5c6a8c.js
win.reddit.zengzhelingasdfcxz.top/accountmanager/ |
95 KB 95 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.f03d466e68261629ed71.js
win.reddit.zengzhelingasdfcxz.top/accountmanager/ |
144 B 630 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.cd55f0447472f8b1a34f.js
win.reddit.zengzhelingasdfcxz.top/accountmanager/ |
262 KB 263 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bbb584033aa89e39bad69436c504c9bd.png
www.redditstatic.com/accountmanager/ |
87 KB 87 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
18e257d5fdea817c0f12cccf8867d930.svg
www.redditstatic.com/accountmanager/ |
812 B 633 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
d489caa9704588f7b7e1d7e1ea7b38b8.svg
www.redditstatic.com/accountmanager/ |
1 KB 692 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
90a416eeb64d4d6ecd46c53d4ee11975.svg
www.redditstatic.com/accountmanager/ |
1 KB 600 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
c4b185e25a4dde85a29f902cd5ce5360.woff2
www.redditstatic.com/accountmanager/ |
49 KB 49 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
abc24b0f77dd16d0b4ea7cbe4a1082b0.woff2
www.redditstatic.com/accountmanager/ |
15 KB 16 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
875de5047556e7c822519d95d7ee692d.woff2
www.redditstatic.com/accountmanager/ |
47 KB 47 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H/1.1 |
v2
events.reddit.zengzhelingasdfcxz.top/ |
0 566 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
v2
events.reddit.zengzhelingasdfcxz.top/ |
2 B 576 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Reddit (Online)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask object| ___r function| webpackJsonp object| core object| __core-js_shared__ object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill5 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.reddit.zengzhelingasdfcxz.top/ | Name: session Value: 72895a59bfe9855baf2e256292fd63edb51cbaaagAJK0KROXEdB1xOpNAE1sX1xAVUHX2NzcmZ0X3ECWCgAAAA5NzAyNGRmODI2MDlkMGM3N2QxZjg3NTQ1Yzc3MzhlMThlZjc4OTIycQNzh3EELg== |
|
.reddit.zengzhelingasdfcxz.top/ | Name: rabt Value: |
|
.reddit.zengzhelingasdfcxz.top/ | Name: rseor3 Value: true |
|
.reddit.zengzhelingasdfcxz.top/ | Name: edgebucket Value: 9cdpEXfrDvPHyBMa7E |
|
.reddit.zengzhelingasdfcxz.top/ | Name: wPUY Value: fb2c00cddf84acc9b534eeb59caf1dc98444eab3e963f5c45f9b9a8ee0031b25 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
events.reddit.zengzhelingasdfcxz.top
win.reddit.zengzhelingasdfcxz.top
www.reddit.zengzhelingasdfcxz.top
www.redditstatic.com
151.101.1.140
173.199.70.168
03b32efed48b8de2b872300cc1a2c4918e067ab616f82d78755ec74f7b50b3ff
14831847513c6721b08a2e223754a5d735c9e8cac4f95722a2875986be38fdd4
2f4d0fa6b9e68d7a038933a792a18bbdbb4d9ac0ebd0dd52a66b66572173cc14
3ee26114feb214d4f102e98ad8009b27d374efff10b05095e9bebc8df74c15b9
424ab07c3f5decf55dc7bf9ff763ed6f8ac1c24aded6708160eb4bb94e2225ce
44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
47d0880913058312bf847a8f2d95af7ed6adc65b0cf0ad9ea166fdd08cfa622d
52c6f27e81bb880d4fb6ce2383104a52055c049da49770a3f30f91af6e58e40e
54bd57caa7049e31f1cf1578a5b1cf551f61a5add88719dc229fa9e76dbf8d80
6d348de31b44c93bbd2231f4e64a01130009a81ee830220cb79d5058552eea42
78b269382ca9de0232b8df6f8d72d627e51d455610161e9c35ec421e9ca26ab9
93cde5cb70bd771eb4da4454e87018953019eb0b30a9d223ee2016682de4c392
c52ea94142ae7f1cd040030f7eaa73b162a0d7e27bd34b2cf0b46d2e5566d114
cb585d8ded1147a5299c3402ccebb9a08ab27385faf1e9a919572434c177e8ee
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e99dc31a7ed79adf1a638363662f08984a11067e7d641bf6feaf4cead6fd0693
eb8255a05ae40013cdc1714607975339a75a76845a2e0773b419b0d8fb69fb5d